[1] Souza L, Oliveira L, Pamplona M, et al. How far did we get in face spoofing detection?[J]. Engineering Applications of Artificial Intelligence, 2018, 72:368-381.
[2] Zhao W Y, Chellappa R, Phillips P J, et al. Face recognition:a literature survey[J]. ACM Computing Surveys, 2003, 35(4):399-458.
[3] Feng L T, Po L M, Li Y M, et al. Integration of image quality and motion cues for face anti-spoofing:a neural network approach[J]. Journal of Visual Communication and Image Representation, 2016, 38:451-460.
[4] Dora L, Agrawal S, Panda R, et al. An evolutionary single Gabor kernel based filter approach to face recognition[J]. Engineering Applications of Artificial Intelligence, 2017, 62:286-301.
[5] Hasan H, Abdul-Kareem S. Fingerprint image enhancement and recognition algorithms:a survey[J]. Neural Computing and Applications, 2013, 23(6):1605-1610.
[6] Marasco E, Ross A. A survey on antispoofing schemes for fingerprint recognition systems[J]. ACM Computing Surveys, 2014, 47(28):1-36.
[7] Choi D J, Park J S, Oh Y H. Unsupervised rapid speaker adaptation based on selective eigenvoice merging for user-specific voice interaction[J]. Engineering Applications of Artificial Intelligence, 2015, 40:95-102.
[8] De L, Pucher M, Yamagishi J, et al. Evaluation of speaker verification security and detection of HMM-based synthetic speech[J]. IEEE Transactions on Audio, Speech, and Language Processing, 2012, 20(8):2280-2290.
[9] Ma L, Tan T N, Wang Y L, et al. Personal identification based on iris texture analysis[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(12):1519-1533.
[10] Wang L, Tan T, Ning H, et al. Silhouette analysis-based gait recognition for human identification[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(12):1505-1518.
[11] 杨健伟. 面向人脸识别的人脸活体检测方法研究[D]. 北京:北京邮电大学,2014.
[12] 孙霖. 人脸识别中的活体检测技术研究[D]. 浙江:浙江大学,2010
[13] Pinto A, Schwartz W R, Pedrini H, et al. Using visual rhythms for detecting video-based facial spoof attacks[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(5):1025-1038
[14] 田野,项世军. 基于LBP和多层DCT的人脸活体检测算法[J]. 计算机研究与发展,2018, 55(3):643-650. Tian Y, Xiang S J. LBP and multilayer DCT based anti-spoofing countermeasure in face liveness detection[J]. Journal of Computer Research and Development, 2018, 55(3):643-650. (in Chinese)
[15] Yang J, Lei Z, Li S Z. Learn convolutional neural network for face anti-spoofing[DB/OL]. 2014[2014-08-24]. arXiv:1408.5601.
[16] Määttä J, Hadid A, Pietikäinen M. Face spoofing detection from single images using microtexture analysis[C]//International Joint Conference on Biometrics. IEEE, 2011:1-7.
[17] Chingovska I, Anjos A, Marcel S. On the effectiveness of local binary patterns in face anti-spoofing[C]//BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group. IEEE, 2012:1-7.
[18] Määttä J, Hadid A, PietikäInen M. Face spoofing detection from single images using texture and local shape analysis[J]. IET Biometrics, 2012, 1(1):3-10
[19] Yang J W, Lei Z, Liao S C, et al. Face liveness detection with component dependent descriptor[C]//2013 International Conference on Biometrics. IEEE, 2013:1-6.
[20] Zhang Z W, Yan J J, Liu S F, et al. A face antispoofing database with diverse attacks[C]//20125th IAPR International Conference on Biometrics. IEEE, 2012:26-31.
[21] Patel K, Han H, Jain A K. Secure face unlock:spoof detection on smartphones[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(10):2268-2283.
[22] Boulkenafet Z, Komulainen J, Hadid A. Face antispoofing using speeded-up robust features and fisher vector encoding[J]. IEEE Signal Processing Letters, 2017, 24(1):141-145.
[23] Pereira T D F, André A, José M D M, et al. LBP-TOP based countermeasure against face spoofing attacks[C]//Asian Conference on Computer Vision. Springer, 2012:121-132.
[24] Tirunagari S, Poh N, Windridge D, et al. Detection of face spoofing using visual dynamics[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(4):762-777.
[25] Xu Z Q, Li S, Deng W H. Learning temporal features using LSTM-CNN architecture for face anti-spoofing[C]//20153rd IAPR Asian Conference on Pattern Recognition. IEEE, 2015:141-145.
[26] Atoum Y, Liu Y, Jourabloo A, et al. Face anti-spoofing using patch and depth-based CNNs[C]//2017 IEEE International Joint Conference on Biometrics. IEEE, 2017:319-328.
[27] Asim M, Ming Z, Javed M Y. CNN based spatio-temporal feature extraction for face antispoofing[C]//20172nd International Conference on Image, Vision and Computing. IEEE, 2017:234-238.
[28] Zhang S F, Wang X B, Liu A J, et al. A dataset and benchmark for large-scale multi-modal face anti-spoofing[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019:919-928.
[29] Viola P, Jones M J. Robust real-time face detection[J]. International Journal of Computer Vision, 2004, 57(2):137-154
[30] Cortes C, Vapnik V. Support-vector networks[J]. Machine Learning, 1995, 20(3):273-297
[31] Yang J, Yang J Y, Zhang D, et al. Feature fusion:parallel strategy vs. serial strategy[J]. Pattern Recognition, 2003, 36(6):1369-1381.