2018 International Carnahan Conference on Security Technology (ICCST) 2018
DOI: 10.1109/ccst.2018.8585637
|View full text |Cite
|
Sign up to set email alerts
|

An Ear Anti-Spoofing Database with Various Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Ref. [40] collected a database of ear presentation attack detection, including three types of fake ear attacks-display attacks, print attacks, and video attacks-and used image quality assessment techniques to extract ear features of interest. Ref.…”
Section: Related Workmentioning
confidence: 99%
“…Ref. [40] collected a database of ear presentation attack detection, including three types of fake ear attacks-display attacks, print attacks, and video attacks-and used image quality assessment techniques to extract ear features of interest. Ref.…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, these models still suffer in unconstrained environments where performance results can be significantly affected by pose, illumination, variation of sensors, and occlusion [9][10][11]. Moreover, imposters can circumvent some of these systems using spoof attacks due to the high dependence on the complex geometrical shape of the ear, which often being obscured by hair, hoodies, tattoos, and similar [12]. Hence, they might sometimes fail to meet the high-security accuracy requirements.…”
Section: Introductionmentioning
confidence: 99%