Academic literature on the topic 'Software based face antispoofing techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software based face antispoofing techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Software based face antispoofing techniques"
Vinutha, H., and G. Thippeswamy. "Antispoofing in face biometrics: a comprehensive study on software-based techniques." Computer Science and Information Technologies 4, no. 1 (2023): 1–13. https://doi.org/10.11591/csit.v4i1.pp1-13.
Full textH, Vinutha, and Thippeswamy G. "Antispoofing in face biometrics: a comprehensive study on software-based techniques." Computer Science and Information Technologies 4, no. 1 (2023): 1–13. http://dx.doi.org/10.11591/csit.v4i1.p1-13.
Full textH, Vinutha, and Thippeswamy G. "Antispoofing in face biometrics: a comprehensive study on software-based techniques." Computer Science and Information Technologies 4, no. 1 (2023): 1–13. http://dx.doi.org/10.11591/csit.v4i1.pp1-13.
Full textV. Chakole, Vijay, and Swati R. Dixit. "MLbFA." International journal of electrical and computer engineering systems 16, no. 4 (2025): 321–32. https://doi.org/10.32985/ijeces.16.4.5.
Full textRen, Hanchi, Yi Hu, San Hlaing Myint, et al. "A Real-Time and Long-Term Face Tracking Method Using Convolutional Neural Network and Optical Flow in IoT-Based Multimedia Communication Systems." Wireless Communications and Mobile Computing 2021 (October 31, 2021): 1–15. http://dx.doi.org/10.1155/2021/6711561.
Full textShivani, Dugyala. "Attention-Oriented Two-Stream Convolutional Networks for the Identification of Face Spoofing." International Journal for Research in Applied Science and Engineering Technology 12, no. 12 (2024): 176–81. https://doi.org/10.22214/ijraset.2024.65732.
Full textAkhtar, Zahid, and Gian Luca Foresti. "Face Spoof Attack Recognition Using Discriminative Image Patches." Journal of Electrical and Computer Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/4721849.
Full textKadar, Rozita, Jamal Othman, and Naemah Abdul Wahab. "Survey on Ontology-Based Visualization Techniques towards Program Comprehension Application." Journal of Computing Research and Innovation 3, no. 1 (2018): 19–29. http://dx.doi.org/10.24191/jcrinn.v3i1.66.
Full textDeshmukh, Amar B., and N. Usha Rani. "Optimization-Driven Kernel and Deep Convolutional Neural Network for Multi-View Face Video Super Resolution." International Journal of Digital Crime and Forensics 12, no. 3 (2020): 77–95. http://dx.doi.org/10.4018/ijdcf.2020070106.
Full textPeng, Peng, Ivens Portugal, Paulo Alencar, and Donald Cowan. "A face recognition software framework based on principal component analysis." PLOS ONE 16, no. 7 (2021): e0254965. http://dx.doi.org/10.1371/journal.pone.0254965.
Full textBook chapters on the topic "Software based face antispoofing techniques"
Bernier, Téo, Yani Ziani, Nikolai Kosmatov, and Frédéric Loulergue. "Combining Deductive Verification with Shape Analysis." In Fundamental Approaches to Software Engineering. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57259-3_14.
Full textBeyer, Dirk, Thomas Lemberger, and Henrik Wachowitz. "CPA-Daemon: Mitigating Tool Restarts for Java-Based Verifiers." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-78750-8_8.
Full textSanderson, David, Emma Shires, Jack C. Chaplin, Harvey Brookes, Amer Liaqat, and Svetan Ratchev. "Context-Aware Plug and Produce for Robotic Aerospace Assembly." In IFIP Advances in Information and Communication Technology. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72632-4_13.
Full textLu, Junyi, Xiaojia Li, Zihan Hua, et al. "DeepCRCEval: Revisiting the Evaluation of Code Review Comment Generation." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-90900-9_3.
Full textSanchez-Moreno, Alejandra Sarahi, Hector Manuel Perez-Meana, Jesus Olivares-Mercado, Gabriel Sanchez-Perez, and Karina Toscano-Medina. "Comparison of Face Detection and Recognition Algorithms in Real-Time Video." In Knowledge Innovation Through Intelligent Software Methodologies, Tools and Techniques. IOS Press, 2020. http://dx.doi.org/10.3233/faia200567.
Full textMadhusudan, D., and Prudhvi Raj Budumuru. "FACE RECOGNITION WITH VOICE APPLICATION." In Artificial Intelligence and Emerging Technologies. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/nbennurch306.
Full textRenna, Paolo. "Learning Methodologies to Support E-Business in the Automated Negotiation Process." In Intelligent Technologies and Techniques for Pervasive Computing. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4038-2.ch003.
Full textJuneja, Sonia. "Efficient Software Cost Estimation Using Artificial Intelligence." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-3502-4.ch009.
Full textRakesh B S, Sujay K, and Anushree Raj. "SURVEY ON FACE DETECTION AND RECOGNITION ALGORITHMS USING DEEP LEARNING." In INFORMATION TECHNOLOGY & BIOINFORMATICS: INTERNATIONAL CONFERENCE ON ADVANCE IT, ENGINEERING AND MANAGEMENT - SACAIM-2022 (VOL 1). REDSHINE India, 2020. http://dx.doi.org/10.25215/8119070682.19.
Full textSingh, Baldev, and Surya Narayan Panda. "A Proactive Approach to Intrusion Detection in Cloud Software as a Service." In Achieving Enterprise Agility through Innovative Software Development. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8510-9.ch013.
Full textConference papers on the topic "Software based face antispoofing techniques"
Kimbrough, Turhan, Pu Tian, Weixian Liao, and Wei Yu. "Performance of GAN-Based Denoising and Restoration Techniques for Adversarial Face Images." In 2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, 2023. http://dx.doi.org/10.1109/sera57763.2023.10197680.
Full textHelfstein, Lucas, and Kelly Rosa Braghetto. "An Empirical Analysis of Data Drift Detection Techniques in Machine Learning Systems." In Simpósio Brasileiro de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbbd.2024.240606.
Full textFuentes, Arturo A., and Stephen Crown. "Enhancing the Teaching and Practice of Finite Element Analysis Using Asynchronous Computer-Based Instruction." In ASME 2004 International Mechanical Engineering Congress and Exposition. ASMEDC, 2004. http://dx.doi.org/10.1115/imece2004-60423.
Full textWahba, Khaled, and Sherif Kamel. "A Virtual Research Model to Help Academics Face the Challenges of the 21st Century." In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2401.
Full textKalaitzi, Despoina, Evridiki Papachristou, and Spyridon Spiros Papadimitriou. "Architecture Techniques Merge with 3D Apparel Draping (to Create a Collection)." In 20th AUTEX World Textile Conference - Unfolding the future. Trans Tech Publications Ltd, 2022. http://dx.doi.org/10.4028/p-gm606z.
Full textWilson, Nathan M., Ana K. Ortiz, Allison B. Johnson, et al. "A Public Repository of Image-Based Computational Models for Patient-Specific Blood Flow Simulation." In ASME 2012 Summer Bioengineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/sbc2012-80916.
Full textSu, Yi-Feng, Chih-Yuan Hsu, Yu-Chieh Wang, and Chung-Yu Yeh. "Image-Based Driver Status Monitoring System for Determining the Transfer of Dynamic Driving Tasks in Autonomous Vehicles." In WCX SAE World Congress Experience. SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2397.
Full textLi, Hua, and Yiming Rong. "Unified Modeling Language and Object-Oriented Design Pattern Based Computer-Aided Welding Fixture Design System." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28294.
Full textAhmed, Ali, Sadia Tasneem, and Ataur Rahman. "Challenges in application of statistical techniques in hydrology: A case study on regional flood modelling in southeast Australia." In International Conference on Advancements in Engineering Education. Science Technology and Management Crescent Australia, 2024. https://doi.org/10.71427/icaeed2025/35.
Full textDubovik, A. S., A. Y. Altynova, R. L. Khudorozhkov, A. A. Kozhevin, and D. V. Novikov. "Applied Generative AI and Deep Learning Techniques to Optimize and Automate Geophysical Workflows." In International Petroleum Technology Conference. IPTC, 2025. https://doi.org/10.2523/iptc-24677-ms.
Full textReports on the topic "Software based face antispoofing techniques"
Heng, Kimkong. Cambodia’s Aspirations to Become a Knowledge-Based Society: Perspectives of Cambodian University Students. Cambodia Development Resource Institute, 2023. https://doi.org/10.64202/wp.138.202305.
Full textLunn, Pete, Marek Bohacek, Jason Somerville, Áine Ní Choisdealbha, and Féidhlim McGowan. PRICE Lab: An Investigation of Consumers’ Capabilities with Complex Products. ESRI, 2016. https://doi.org/10.26504/bkmnext306.
Full text