Current face biometric systems are vulnerable to spoofing attacks. A spoofing attack occurs when a person tries to masquerade as someone else by falsifying data and thereby gaining illegitimate access.
Inspired by image quality assessment, characterization of printing artefacts, and differences in light reflection, we propose to approach the prob...
|