references.rst 1.31 KB
Newer Older
Amir MOHAMMADI's avatar
Amir MOHAMMADI committed
1
2
.. vim: set fileencoding=utf-8 :

3
===========
Amir MOHAMMADI's avatar
Amir MOHAMMADI committed
4
References
5
6
7
8
===========

.. [CAM12]  *I. Chingovska, A. Anjos, and S. Marcel*, **On the effectiveness of local binary patterns in face anti-spoofing**,
            in: Biometrics Special Interest Group (BIOSIG), 2012 BIOSIG - Proceedings of the International Conference of the, 2012, pp. 1-7.
Amir MOHAMMADI's avatar
Amir MOHAMMADI committed
9

10
11
12
13
14
.. [WHJ15]  *Di Wen, Member, IEEE, Hu Han, Member, IEEE and Anil K. Jain, Fellow, IEEE*, **Face Spoof Detection with Image Distortion Analysis**,
            in: IEEE Transactions on Information Forensics and Security, 2015.

.. [CBVM16] *A. Costa-Pazo, S. Bhattacharjee, E. Vazquez-Fernandez and S. Marcel*, **The Replay-Mobile Face Presentation-Attack Database**,
            in: Biometrics Special Interest Group (BIOSIG), 2016 BIOSIG - Proceedings of the International Conference of the, 2016, pp. 1-7.
15
16
17

.. [AM11] *A. Anjos and S. Marcel*, **Counter-measures to photo attacks in face recognition: A public database and a baseline**,
          in: 2011 International Joint Conference on Biometrics (IJCB), Washington, DC, 2011, pp. 1-7.
David GEISSBUHLER's avatar
David GEISSBUHLER committed
18
19
20

.. [CDSR17] *C. Chen, A. Dantcheva, T. Swearingen, A. Ross, "Spoofing Faces Using Makeup: An Investigative Study,"
            in: Proc. of 3rd IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), (New Delhi, India), February 2017.