Journal articles on the topic 'Software based face antispoofing techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Software based face antispoofing techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Vinutha, H., and G. Thippeswamy. "Antispoofing in face biometrics: a comprehensive study on software-based techniques." Computer Science and Information Technologies 4, no. 1 (2023): 1–13. https://doi.org/10.11591/csit.v4i1.pp1-13.
Full textH, Vinutha, and Thippeswamy G. "Antispoofing in face biometrics: a comprehensive study on software-based techniques." Computer Science and Information Technologies 4, no. 1 (2023): 1–13. http://dx.doi.org/10.11591/csit.v4i1.p1-13.
Full textH, Vinutha, and Thippeswamy G. "Antispoofing in face biometrics: a comprehensive study on software-based techniques." Computer Science and Information Technologies 4, no. 1 (2023): 1–13. http://dx.doi.org/10.11591/csit.v4i1.pp1-13.
Full textV. Chakole, Vijay, and Swati R. Dixit. "MLbFA." International journal of electrical and computer engineering systems 16, no. 4 (2025): 321–32. https://doi.org/10.32985/ijeces.16.4.5.
Full textRen, Hanchi, Yi Hu, San Hlaing Myint, et al. "A Real-Time and Long-Term Face Tracking Method Using Convolutional Neural Network and Optical Flow in IoT-Based Multimedia Communication Systems." Wireless Communications and Mobile Computing 2021 (October 31, 2021): 1–15. http://dx.doi.org/10.1155/2021/6711561.
Full textShivani, Dugyala. "Attention-Oriented Two-Stream Convolutional Networks for the Identification of Face Spoofing." International Journal for Research in Applied Science and Engineering Technology 12, no. 12 (2024): 176–81. https://doi.org/10.22214/ijraset.2024.65732.
Full textAkhtar, Zahid, and Gian Luca Foresti. "Face Spoof Attack Recognition Using Discriminative Image Patches." Journal of Electrical and Computer Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/4721849.
Full textKadar, Rozita, Jamal Othman, and Naemah Abdul Wahab. "Survey on Ontology-Based Visualization Techniques towards Program Comprehension Application." Journal of Computing Research and Innovation 3, no. 1 (2018): 19–29. http://dx.doi.org/10.24191/jcrinn.v3i1.66.
Full textDeshmukh, Amar B., and N. Usha Rani. "Optimization-Driven Kernel and Deep Convolutional Neural Network for Multi-View Face Video Super Resolution." International Journal of Digital Crime and Forensics 12, no. 3 (2020): 77–95. http://dx.doi.org/10.4018/ijdcf.2020070106.
Full textPeng, Peng, Ivens Portugal, Paulo Alencar, and Donald Cowan. "A face recognition software framework based on principal component analysis." PLOS ONE 16, no. 7 (2021): e0254965. http://dx.doi.org/10.1371/journal.pone.0254965.
Full textBarman, Shohag, Hira Lal Gope, M. M. Manjurul Islam, Md Mehedi Hasan, and Umme Salma. "Clustering Techniques for Software Engineering." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 2 (2016): 465. http://dx.doi.org/10.11591/ijeecs.v4.i2.pp465-472.
Full textCHEN, PEI, and DAVID SUTER. "SUBSPACE-BASED FACE RECOGNITION: OUTLIER DETECTION AND A NEW DISTANCE CRITERION." International Journal of Pattern Recognition and Artificial Intelligence 19, no. 04 (2005): 479–93. http://dx.doi.org/10.1142/s0218001405004174.
Full textYadav, Sujit. "Face Recognition Based Attendance System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29402.
Full textHachim, Ethar Abdul Wahhab, Yasmin Makki Mohialden, Zeyad Farooq Lutfi, and Nadia Mahmood Hussien. "Green Software Engineering: Cloud-based Face Detection and Static Code Analysis." Aug-Sept 2023, no. 35 (August 16, 2023): 26–34. http://dx.doi.org/10.55529/ijitc.35.26.34.
Full textRehman, Bacha, Wee Hong Ong, Abby Chee Hong Tan, and Trung Dung Ngo. "Face detection and tracking using hybrid margin-based ROI techniques." Visual Computer 36, no. 3 (2019): 633–47. http://dx.doi.org/10.1007/s00371-019-01649-y.
Full textKhachouch, Mohamed Karim, Ayoub Korchi, and Younes Lakhrissi. "Architecture Driven Modernization: A Review on Reverse Engineering Techniques based on Models’ Approach." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 20 (October 11, 2023): 293–302. http://dx.doi.org/10.37394/23209.2023.20.32.
Full textLEE, SANG-WOONG, PATRICK S. P. WANG, SVETLANA N. YANUSHKEVICH, and SEONG-WHAN LEE. "NONITERATIVE 3D FACE RECONSTRUCTION BASED ON PHOTOMETRIC STEREO." International Journal of Pattern Recognition and Artificial Intelligence 22, no. 03 (2008): 389–410. http://dx.doi.org/10.1142/s0218001408006272.
Full textDubovečak, Mario, Emil Dumić, and Andrija Bernik. "Face Detection and Recognition Using Raspberry PI Computer." Tehnički glasnik 17, no. 3 (2023): 346–52. http://dx.doi.org/10.31803/tg-20220321232047.
Full textToderici, George, Sean M. O’Malley, George Passalis, Theoharis Theoharis, and Ioannis A. Kakadiaris. "Ethnicity- and Gender-based Subject Retrieval Using 3-D Face-Recognition Techniques." International Journal of Computer Vision 89, no. 2-3 (2010): 382–91. http://dx.doi.org/10.1007/s11263-009-0300-7.
Full textSilviana, Mery, Rina Mirdayanti, Lindawati Lindawati, Wiwin Apriani, and Fitri Yunina. "PELATIHAN PENGGUNAAN SOFTWARE AUDACITY SEBAGAI MEDIA PENGEMAS MATERI AJAR YANG MENARIK." RAMBIDEUN : Jurnal Pengabdian Kepada Masyarakat 5, no. 2 (2022): 151–54. http://dx.doi.org/10.51179/pkm.v5i2.1087.
Full textRaden Andy Kurniawan and Umar Zaky. "RADIO FREQUENCY IDENTIFICATION AND IMAGE-BASED FACIAL IDENTIFICATION AS AN EMPLOYEE ATTENDANCE SYSTEM." International Journal of Engineering Technology and Natural Sciences 2, no. 1 (2020): 18–26. http://dx.doi.org/10.46923/ijets.v2i1.67.
Full textS, Haseena, Saroja S, Shri Dharshini D, and Nivetha A. "TVN: Detect Deepfakes Images using Texture Variation Network." Inteligencia Artificial 26, no. 72 (2023): 1–14. http://dx.doi.org/10.4114/intartif.vol26iss72pp1-14.
Full textWasim, Muhammad. "A Comparative Study of Curvature-Based and Differential Versions of Dotter Raster-stereography Techniques." KIET Journal of Computing and Information Sciences 1, no. 1 (2021): 01–12. http://dx.doi.org/10.51153/kjcis.v4i1.37.
Full textMureno, Althaf Dhava, and Aede Hatib Musta'amal. "Engaging Vocational Students with Construct-Based Games: A Study on Software and Game Development Interest." Letters in Information Technology Education (LITE) 6, no. 2 (2023): 51. https://doi.org/10.17977/um010v6i22023p51-58.
Full textZhang, Yulin, Yong Hu, and Xiao Chen. "Context and Multi-Features-Based Vulnerability Detection: A Vulnerability Detection Frame Based on Context Slicing and Multi-Features." Sensors 24, no. 5 (2024): 1351. http://dx.doi.org/10.3390/s24051351.
Full textGhorbel, Ahmed, Walid Aydi, Imen Tajouri, and Nouri Masmoudi. "Hybrid Approach for Face Recognition from a Single Sample per Person by Combining VLC and GOM." Journal of Intelligent Systems 29, no. 1 (2019): 1523–34. http://dx.doi.org/10.1515/jisys-2018-0380.
Full textAbhinav, Balasubramanian. "Hybrid Machine Learning Framework For Test Case Generation." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 9, no. 5 (2021): 1–12. https://doi.org/10.5281/zenodo.14565859.
Full textZhou, Binpeng, Junrui Chai, Jing Wang, Heng Zhou, and Lifeng Wen. "An XFEM-Based Analysis of Concrete Face Cracking in Rockfill Dams." Mathematical Problems in Engineering 2021 (July 29, 2021): 1–12. http://dx.doi.org/10.1155/2021/6640668.
Full textMamieva, Dilnoza, Akmalbek Bobomirzaevich Abdusalomov, Mukhriddin Mukhiddinov, and Taeg Keun Whangbo. "Improved Face Detection Method via Learning Small Faces on Hard Images Based on a Deep Learning Approach." Sensors 23, no. 1 (2023): 502. http://dx.doi.org/10.3390/s23010502.
Full textVargas, Hector, and Aldo Martinez. "Hybrid Algorithm for Face Recognition Using an Evolutionary Software Engineering." Applied Mechanics and Materials 423-426 (September 2013): 2543–46. http://dx.doi.org/10.4028/www.scientific.net/amm.423-426.2543.
Full textNeha, Pradyumna Bora and Dr. Dinesh Chandra Jain. "CAPTCHA Designing techniques and development of CAPTCHA System based on B3AC Algorithm." Scandinavian Journal of Information Systems 35, no. 1 (2023): 707–15. https://doi.org/10.5281/zenodo.7795505.
Full textMahmoud, Tarek M., Tarek Abd-El-Hafeez, and Ahmed Omar. "A Highly Efficient Content Based Approach to Filter Pornography Websites." International Journal of Computer Vision and Image Processing 2, no. 1 (2012): 75–90. http://dx.doi.org/10.4018/ijcvip.2012010105.
Full textSOUNDAR, K. RUBA, and K. MURUGESAN. "CORRELATION BASED FACE MATCHING IN COMBINED GLOBAL AND LOCAL PRESERVING FEATURE SPACE." International Journal of Pattern Recognition and Artificial Intelligence 24, no. 08 (2010): 1281–94. http://dx.doi.org/10.1142/s021800141000838x.
Full textKaburlasos, Vassilis G., Chris Lytridis, Eleni Vrochidou, et al. "Granule-Based-Classifier (GbC): A Lattice Computing Scheme Applied on Tree Data Structures." Mathematics 9, no. 22 (2021): 2889. http://dx.doi.org/10.3390/math9222889.
Full textRajkumar Rajasekaran, Et al. "Data Sharing based on Facial Recognition Clusters." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 2351–59. http://dx.doi.org/10.17762/ijritcc.v11i9.9243.
Full textAnthwal, Shivangi, and Dinesh Ganotra. "Dynamic Features Based on Flow-Correlation and HOG for Recognition of Discrete Facial Expressions." Revue d'Intelligence Artificielle 34, no. 5 (2020): 585–94. http://dx.doi.org/10.18280/ria.340508.
Full textCHEN, WEI-CHE, and MING-SHI WANG. "REGION-BASED AND CONTENT ADAPTIVE SKIN DETECTION IN COLOR IMAGES." International Journal of Pattern Recognition and Artificial Intelligence 21, no. 05 (2007): 831–53. http://dx.doi.org/10.1142/s0218001407005715.
Full textYadav, Rohit, and Raghuraj Singh. "Enhancing Software Maintainability Prediction Using Multiple Linear Regression and Predictor Importance." International Journal of Experimental Research and Review 36 (December 30, 2023): 135–46. http://dx.doi.org/10.52756/ijerr.2023.v36.013.
Full textKumar Janardan Patra, Et al. "Ensemble-Based Machine Learning Approach for Real-Time Person Counting in an Instant Attendance System." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 989–98. http://dx.doi.org/10.17762/ijritcc.v11i10.8618.
Full textG S, Monisha, M. Hari Krishnan, Vetri Selvan M, G. Nirmala, and Yogashree G S. "Visual Tracking Based on Human Feature Extraction from Surveillance Video for Human Recognition." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7 (2023): 133–41. http://dx.doi.org/10.17762/ijritcc.v11i7.7838.
Full textAlmogahed, Abdullah, Hairulnizam Mahdin, Mazni Omar, et al. "A refactoring categorization model for software quality improvement." PLOS ONE 18, no. 11 (2023): e0293742. http://dx.doi.org/10.1371/journal.pone.0293742.
Full textTommandru, Suresh, and Domnic Sandanam. "An Automated Framework for Patient Identification and Verification Using Deep Learning." Revue d'Intelligence Artificielle 34, no. 6 (2020): 709–19. http://dx.doi.org/10.18280/ria.340605.
Full textRaja, Rohit, Tilendra Shishir Sinha, Raj Kumar Patra, and Shrikant Tiwari. "Physiological trait-based biometrical authentication of human-face using LGXP and ANN techniques." International Journal of Information and Computer Security 10, no. 2/3 (2018): 303. http://dx.doi.org/10.1504/ijics.2018.10012575.
Full textDjauhari, Teuku, and Noni Rahmawati. "Smart Hotel Security: Integrating AI for Advanced Safety Solutions." Internet of Things and Artificial Intelligence Journal 5, no. 1 (2025): 14–26. https://doi.org/10.31763/iota.v5i1.787.
Full textNabat, Zahraa Modher, Mushtaq Talib Mahdi, and Shaymaa Abdul Hussein Shnain. "Face Recognition Method based on Support Vector Machine and Rain Optimization Algorithm (ROA)." Webology 19, no. 1 (2022): 2170–81. http://dx.doi.org/10.14704/web/v19i1/web19147.
Full textEl Merhebi, Souad, Jean-Christophe Hoelt, Patrice Torguet, and Jean-Pierre Jessel. "Perception-Based Filtering for MMOGs." International Journal of Computer Games Technology 2008 (2008): 1–9. http://dx.doi.org/10.1155/2008/243107.
Full textS., Dhanasekaran, V. Anjana Devi, S. Sankara Narayanan, Vijayakarthik P., Hariharasitaraman S., and Rajasekaran S. "A Smart Digital Attendance Monitoring System for Academic Institution Using Machine Learning Techniques." Webology 19, no. 1 (2022): 3109–18. http://dx.doi.org/10.14704/web/v19i1/web19205.
Full textIthaya Rani, P., and K. Muneeswaran. "Facial Emotion Recognition Based on Eye and Mouth Regions." International Journal of Pattern Recognition and Artificial Intelligence 30, no. 07 (2016): 1655020. http://dx.doi.org/10.1142/s021800141655020x.
Full textYadav, Sujit. "Survey paper on Face Recognition Based Attendance System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30710.
Full textZagane, Mohammed, Mamdouh Alenezi, and Mustapha Kamel Abdi. "Hybrid Representation to Locate Vulnerable Lines of Code." International Journal of Software Innovation 10, no. 1 (2022): 1–19. http://dx.doi.org/10.4018/ijsi.292020.
Full text