Deep representations for iris, face, and fingerprint spoofing detection. Menotti, D., Chiachia, G., Pinto, A., Robson Schwartz, W., Pedrini, H., Xavier Falcao, A., & Rocha, A. IEEE Transactions on Information Forensics and Security, 10(4):864-879, April, 2015. doi bibtex @Article{Menotti_2015_16631,
author = {Menotti, D. and Chiachia, G. and Pinto, A. and Robson Schwartz, W. and Pedrini, H. and Xavier Falcao, A. and Rocha, A.},
journal = {IEEE Transactions on Information Forensics and Security},
month = {April},
number = {4},
pages = {864-879},
title = {Deep representations for iris, face, and fingerprint spoofing detection},
volume = {10},
year = {2015},
issn = {1556-6013},
keywords = {biometrics (access control);face recognition;fingerprint identification;iris recognition;biometric reading systems;biometric spoofing benchmarks;convolutional network architectures;deep representations;domain knowledge;face detection;fingerprint spoofing detection;global security;image based attacks;iris detection;national security;person authentication;person identification;personal security;spoofing detection;Benchmark testing;Computer architecture;Face;Feature extraction;Fingerprint recognition;Iris recognition;Optimization;Back-propagation;Convolutional Networks;Deep Learning;Deep learning;Filter Weights Learning;Hyperparameter Architecture Optimization;Spoofing Detection;back-propagation;convolutional networks;filter weights learning;hyperparameter architecture optimization;spoofing detection},
doi = {10.1109/TIFS.2015.2398817},
title_with_no_special_chars = {Deep Representations for Iris Face and Fingerprint Spoofing Detection}
}
Downloads: 0
{"_id":"EQJysAxvYjkRJ2Gte","bibbaseid":"menotti-chiachia-pinto-robsonschwartz-pedrini-xavierfalcao-rocha-deeprepresentationsforirisfaceandfingerprintspoofingdetection-2015","downloads":0,"creationDate":"2018-01-22T16:01:12.809Z","title":"Deep representations for iris, face, and fingerprint spoofing detection","author_short":["Menotti, D.","Chiachia, G.","Pinto, A.","Robson Schwartz, W.","Pedrini, H.","Xavier Falcao, A.","Rocha, A."],"year":2015,"bibtype":"article","biburl":"http://www.uh.edu/bti/_files/bibsync_export2018-01-19.bib","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Menotti"],"firstnames":["D."],"suffixes":[]},{"propositions":[],"lastnames":["Chiachia"],"firstnames":["G."],"suffixes":[]},{"propositions":[],"lastnames":["Pinto"],"firstnames":["A."],"suffixes":[]},{"propositions":[],"lastnames":["Robson","Schwartz"],"firstnames":["W."],"suffixes":[]},{"propositions":[],"lastnames":["Pedrini"],"firstnames":["H."],"suffixes":[]},{"propositions":[],"lastnames":["Xavier","Falcao"],"firstnames":["A."],"suffixes":[]},{"propositions":[],"lastnames":["Rocha"],"firstnames":["A."],"suffixes":[]}],"journal":"IEEE Transactions on Information Forensics and Security","month":"April","number":"4","pages":"864-879","title":"Deep representations for iris, face, and fingerprint spoofing detection","volume":"10","year":"2015","issn":"1556-6013","keywords":"biometrics (access control);face recognition;fingerprint identification;iris recognition;biometric reading systems;biometric spoofing benchmarks;convolutional network architectures;deep representations;domain knowledge;face detection;fingerprint spoofing detection;global security;image based attacks;iris detection;national security;person authentication;person identification;personal security;spoofing detection;Benchmark testing;Computer architecture;Face;Feature extraction;Fingerprint recognition;Iris recognition;Optimization;Back-propagation;Convolutional Networks;Deep Learning;Deep learning;Filter Weights Learning;Hyperparameter Architecture Optimization;Spoofing Detection;back-propagation;convolutional networks;filter weights learning;hyperparameter architecture optimization;spoofing detection","doi":"10.1109/TIFS.2015.2398817","title_with_no_special_chars":"Deep Representations for Iris Face and Fingerprint Spoofing Detection","bibtex":"@Article{Menotti_2015_16631,\r\n author = {Menotti, D. and Chiachia, G. and Pinto, A. and Robson Schwartz, W. and Pedrini, H. and Xavier Falcao, A. and Rocha, A.},\r\n journal = {IEEE Transactions on Information Forensics and Security},\r\n month = {April},\r\n number = {4},\r\n pages = {864-879},\r\n title = {Deep representations for iris, face, and fingerprint spoofing detection},\r\n volume = {10},\r\n year = {2015},\r\n issn = {1556-6013},\r\n keywords = {biometrics (access control);face recognition;fingerprint identification;iris recognition;biometric reading systems;biometric spoofing benchmarks;convolutional network architectures;deep representations;domain knowledge;face detection;fingerprint spoofing detection;global security;image based attacks;iris detection;national security;person authentication;person identification;personal security;spoofing detection;Benchmark testing;Computer architecture;Face;Feature extraction;Fingerprint recognition;Iris recognition;Optimization;Back-propagation;Convolutional Networks;Deep Learning;Deep learning;Filter Weights Learning;Hyperparameter Architecture Optimization;Spoofing Detection;back-propagation;convolutional networks;filter weights learning;hyperparameter architecture optimization;spoofing detection},\r\n doi = {10.1109/TIFS.2015.2398817},\r\n title_with_no_special_chars = {Deep Representations for Iris Face and Fingerprint Spoofing Detection}\r\n}\r\n\r\n","author_short":["Menotti, D.","Chiachia, G.","Pinto, A.","Robson Schwartz, W.","Pedrini, H.","Xavier Falcao, A.","Rocha, A."],"key":"Menotti_2015_16631","id":"Menotti_2015_16631","bibbaseid":"menotti-chiachia-pinto-robsonschwartz-pedrini-xavierfalcao-rocha-deeprepresentationsforirisfaceandfingerprintspoofingdetection-2015","role":"author","urls":{},"keyword":["biometrics (access control);face recognition;fingerprint identification;iris recognition;biometric reading systems;biometric spoofing benchmarks;convolutional network architectures;deep representations;domain knowledge;face detection;fingerprint spoofing detection;global security;image based attacks;iris detection;national security;person authentication;person identification;personal security;spoofing detection;Benchmark testing;Computer architecture;Face;Feature extraction;Fingerprint recognition;Iris recognition;Optimization;Back-propagation;Convolutional Networks;Deep Learning;Deep learning;Filter Weights Learning;Hyperparameter Architecture Optimization;Spoofing Detection;back-propagation;convolutional networks;filter weights learning;hyperparameter architecture optimization;spoofing detection"],"downloads":0},"search_terms":["deep","representations","iris","face","fingerprint","spoofing","detection","menotti","chiachia","pinto","robson schwartz","pedrini","xavier falcao","rocha"],"keywords":["biometrics (access control);face recognition;fingerprint identification;iris recognition;biometric reading systems;biometric spoofing benchmarks;convolutional network architectures;deep representations;domain knowledge;face detection;fingerprint spoofing detection;global security;image based attacks;iris detection;national security;person authentication;person identification;personal security;spoofing detection;benchmark testing;computer architecture;face;feature extraction;fingerprint recognition;iris recognition;optimization;back-propagation;convolutional networks;deep learning;deep learning;filter weights learning;hyperparameter architecture optimization;spoofing detection;back-propagation;convolutional networks;filter weights learning;hyperparameter architecture optimization;spoofing detection"],"authorIDs":[],"dataSources":["9cexBw6hrwgyZphZZ"]}