java 视频人脸检测cnn算法,基于LBP-MDCT和CNN的人脸活体检测算法

[1] Souza L, Oliveira L, Pamplona M, et al. How far did we get in face spoofing detection?[J]. Engineering Applications of Artificial Intelligence, 2018, 72:368-381.

[2] Zhao W Y, Chellappa R, Phillips P J, et al. Face recognition:a literature survey[J]. ACM Computing Surveys, 2003, 35(4):399-458.

[3] Feng L T, Po L M, Li Y M, et al. Integration of image quality and motion cues for face anti-spoofing:a neural network approach[J]. Journal of Visual Communication and Image Representation, 2016, 38:451-460.

[4] Dora L, Agrawal S, Panda R, et al. An evolutionary single Gabor kernel based filter approach to face recognition[J]. Engineering Applications of Artificial Intelligence, 2017, 62:286-301.

[5] Hasan H, Abdul-Kareem S. Fingerprint image enhancement and recognition algorithms:a survey[J]. Neural Computing and Applications, 2013, 23(6):1605-1610.

[6] Marasco E, Ross A. A survey on antispoofing schemes for fingerprint recognition systems[J]. ACM Computing Surveys, 2014, 47(28):1-36.

[7] Choi D J, Park J S, Oh Y H. Unsupervised rapid speaker adaptation based on selective eigenvoice merging for user-specific voice interaction[J]. Engineering Applications of Artificial Intelligence, 2015, 40:95-102.

[8] De L, Pucher M, Yamagishi J, et al. Evaluation of speaker verification security and detection of HMM-based synthetic speech[J]. IEEE Transactions on Audio, Speech, and Language Processing, 2012, 20(8):2280-2290.

[9] Ma L, Tan T N, Wang Y L, et al. Personal identification based on iris texture analysis[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(12):1519-1533.

[10] Wang L, Tan T, Ning H, et al. Silhouette analysis-based gait recognition for human identification[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(12):1505-1518.

[11] 杨健伟. 面向人脸识别的人脸活体检测方法研究[D]. 北京:北京邮电大学,2014.

[12] 孙霖. 人脸识别中的活体检测技术研究[D]. 浙江:浙江大学,2010

[13] Pinto A, Schwartz W R, Pedrini H, et al. Using visual rhythms for detecting video-based facial spoof attacks[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(5):1025-1038

[14] 田野,项世军. 基于LBP和多层DCT的人脸活体检测算法[J]. 计算机研究与发展,2018, 55(3):643-650. Tian Y, Xiang S J. LBP and multilayer DCT based anti-spoofing countermeasure in face liveness detection[J]. Journal of Computer Research and Development, 2018, 55(3):643-650. (in Chinese)

[15] Yang J, Lei Z, Li S Z. Learn convolutional neural network for face anti-spoofing[DB/OL]. 2014[2014-08-24]. arXiv:1408.5601.

[16] Määttä J, Hadid A, Pietikäinen M. Face spoofing detection from single images using microtexture analysis[C]//International Joint Conference on Biometrics. IEEE, 2011:1-7.

[17] Chingovska I, Anjos A, Marcel S. On the effectiveness of local binary patterns in face anti-spoofing[C]//BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group. IEEE, 2012:1-7.

[18] Määttä J, Hadid A, PietikäInen M. Face spoofing detection from single images using texture and local shape analysis[J]. IET Biometrics, 2012, 1(1):3-10

[19] Yang J W, Lei Z, Liao S C, et al. Face liveness detection with component dependent descriptor[C]//2013 International Conference on Biometrics. IEEE, 2013:1-6.

[20] Zhang Z W, Yan J J, Liu S F, et al. A face antispoofing database with diverse attacks[C]//20125th IAPR International Conference on Biometrics. IEEE, 2012:26-31.

[21] Patel K, Han H, Jain A K. Secure face unlock:spoof detection on smartphones[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(10):2268-2283.

[22] Boulkenafet Z, Komulainen J, Hadid A. Face antispoofing using speeded-up robust features and fisher vector encoding[J]. IEEE Signal Processing Letters, 2017, 24(1):141-145.

[23] Pereira T D F, André A, José M D M, et al. LBP-TOP based countermeasure against face spoofing attacks[C]//Asian Conference on Computer Vision. Springer, 2012:121-132.

[24] Tirunagari S, Poh N, Windridge D, et al. Detection of face spoofing using visual dynamics[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(4):762-777.

[25] Xu Z Q, Li S, Deng W H. Learning temporal features using LSTM-CNN architecture for face anti-spoofing[C]//20153rd IAPR Asian Conference on Pattern Recognition. IEEE, 2015:141-145.

[26] Atoum Y, Liu Y, Jourabloo A, et al. Face anti-spoofing using patch and depth-based CNNs[C]//2017 IEEE International Joint Conference on Biometrics. IEEE, 2017:319-328.

[27] Asim M, Ming Z, Javed M Y. CNN based spatio-temporal feature extraction for face antispoofing[C]//20172nd International Conference on Image, Vision and Computing. IEEE, 2017:234-238.

[28] Zhang S F, Wang X B, Liu A J, et al. A dataset and benchmark for large-scale multi-modal face anti-spoofing[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019:919-928.

[29] Viola P, Jones M J. Robust real-time face detection[J]. International Journal of Computer Vision, 2004, 57(2):137-154

[30] Cortes C, Vapnik V. Support-vector networks[J]. Machine Learning, 1995, 20(3):273-297

[31] Yang J, Yang J Y, Zhang D, et al. Feature fusion:parallel strategy vs. serial strategy[J]. Pattern Recognition, 2003, 36(6):1369-1381.

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值