[1] |
CHINGOVSKA I, ANJOS A, MARCEL S. On the Effectiveness of Local Binary Patterns in Face Anti-Spoofing[C]// Proceedings of the International Conference of Biometrics Special Interest Group.Piscataway:IEEE, 2012:1-7.
|
[2] |
CAI R, CHEN C. Learning Deep Forest with Multi-scale Local Binary Pattern Features for Face Anti-Spoofing[J/OL]. [2020-03-05]. https://arxiv.org/abs/1910.03850.
|
[3] |
孔月萍, 刘霞, 谢心谦, 等. 基于梯度方向直方图的人脸活体检测方法[J]. 激光与光电子学进展, 2018, 55(03):237-243.
|
|
KONG Yueping, LIU Xia, XIE Xinqian, et al. Face Liveness Detection Method Based on Histogram of Oriented Gradient[J]. Laser & Optoelectronics Progress, 2018, 55(03):237-243.
|
[4] |
李素梅, 秦龙斌, 胡佳洁. 基于特定环境的面部活体检测[J]. 华中科技大学学报(自然科学版), 2018, 46(11):87-91.
|
|
LI Sumei, QIN Longbin, HU Jiajie. Face Liveness Detection System Based on Specific Environment[J]. Journal of Huazhong University of Science and Technology(Natural Science Edition), 2018, 46(11):87-91.
|
[5] |
LINN P P P, HTOON E C. Face Anti-spoofing Using Eyes Movement and CNN-based Liveness Detection[C]// Proceedings of the 2019 International Conference on Advanced Information Technologies.Piscataway:IEEE, 2019:149-154.
|
[6] |
YANG J, LEI Z, LI S Z. Learn Convolutional Neural Network for Face Anti-Spoofing[J/OL]. [2019-09-03]. https://arxiv.org/pdf/1408.5601.pdf.
|
[7] |
LI L, XIA Z Q, HADID A, et al. Replayed Video Attack Detection Based on Motion Blur Analysis[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(9):2246-2261.
doi: 10.1109/TIFS.10206
|
[8] |
WU H, ZHAO R, GAN X, et al. Measuring Surface Velocity of Water Flow by Dense Optical Flow Method[J]. Water, 2019, 11(11):2320.
doi: 10.3390/w11112320
|
[9] |
CHAUDHRY R, RAVICHANDRAN A, HAGER G, et al. Histograms of Oriented Optical Flow and Binet-Cauchy Kernels on Nonlinear Dynamical Systems for the Recognition of Human Actions[C]// Proceedings of the 2009 IEEE Conference on Computer Vision and Pattern Recognition.Piscataway:IEEE, 2009:1932-1939.
|
[10] |
ANJOS A, CHAKKA M M, MARCEL S. Motion-Based Counter-Measures to Photo Attacks in Face Recognition[J]. IET Biometrics, 2013, 3(3):147-158.
doi: 10.1049/bme2.v3.3
|
[11] |
魏冬梅, 周卫东. 近邻样本协作表示的人脸识别算法[J]. 西安电子科技大学学报, 2015, 42(03):115-121.
|
|
WEI Dongmei, ZHOU Weidong. FaceRecognition Using Collaborative Representation with Neighbors[J]. Journal of Xidian University, 2015, 42(03):115-121.
|
[12] |
ZHANG Z W, YAN JJ, LIU S F, et al. A face Antispoofing Database with Diverse Attacks[C]// Proceedings of the 2012 5th IAPR International Conference on Biometrics.Piscataway:IEEE, 2012:26-31.
|
[13] |
PATEL K, HAN H, JAIN A K, et al. Live Face Video vs.Spoof Face Video:Use of Moiré Patterns to Detect Replay Video Attacks[C]// Proceedings of the 2015 International Conference on Biometrics.Piscataway:IEEE, 2015:98-105.
|
[14] |
GAN J Y, LI S L, ZHAI Y K, et al. 3D Convolutional Neural Network Based on Face Anti-Spoofing[C]// Proceedings of the 2017 2nd International Conference on Multimedia and Image Processing.Piscataway:IEEE, 2017:1-5.
|
[15] |
PEREIRA T D F, ANJOS A, DE MARTINO J M, et al. Can Face Anti-spoofing Countermeasures Work in a Real World Scenario?[C]// Proceedings of the 2013 International Conference on Biometrics.Piscataway:IEEE, 2013:1-8.
|
[16] |
ANJOS A, MARCEL S. Counter-measures to Photo Attacks in Face Recognition:a Public Database and a Baseline[C]// Proceedings of the 2011 International Joint Conference on Biometrics.Piscataway:IEEE, 2011:1-7.
|