Designing a facial spoofing database for processed image attacks
(2016)
Presentation / Conference Contribution
Face recognition systems are used for user authentication in everyday applications such as logging into a laptop or smartphone without need to memorize a password. However, they are still vulnerable to spoofing attacks, as for example when an imposte... Read More about Designing a facial spoofing database for processed image attacks.