Nowadays, we are experiencing an increasing demand for highly secure identification and personal verification technologies. This demand becomes even more apparent as we become aware of new security breaches and transaction frauds. In this context, biometrics has played a key role over the last decade, providing tools and solutions either to verify or recognize the identity of a person based on physiological or behavioral characteristics. Among the used features are face, fingerprints, hand geometry, handwriting, iris, retinal vein, and voice. Such methods, however, can sometimes be fooled (spoofed) by an identity thief, specially the ones based on face recognition, in which the thief can obtain a photo of an authentic user from a significant distance, or even from the Internet.
In: Image Processing, IEEE Transactions on, 24 (12), pp. 4726-4740, 2015, ISSN: 1057-7149.
In: Information Forensics and Security, IEEE Transactions on, 10 (4), pp. 864-879, 2015, ISSN: 1556-6013.
In: Information Forensics and Security, IEEE Transactions on, 10 (5), pp. 1025-1038, 2015, ISSN: 1556-6013.
In: International Joint Conference on Biometrics, 2013.
In: Conference on Graphics, Patterns and Images, 2012.
In: International Conference on Biometrics, pp. 1-6, 2011.
In: International Joint Conference on Biometrics, 2011.