Spoofing Face Recognition With 3D Masks

Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still an open security issue in biometrics domain and among all biometric traits, face is exposed to the most seri...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IEEE transactions on information forensics and security Ročník 9; číslo 7; s. 1084 - 1097
Hlavní autori: Erdogmus, Nesli, Marcel, Sebastien
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: New York, NY IEEE 01.07.2014
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Predmet:
ISSN:1556-6013, 1556-6021
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still an open security issue in biometrics domain and among all biometric traits, face is exposed to the most serious threat, since it is particularly easy to access and reproduce. In this paper, many different types of face spoofing attacks have been examined and various algorithms have been proposed to detect them. Mainly focusing on 2D attacks forged by displaying printed photos or replaying recorded videos on mobile devices, a significant portion of these studies ground their arguments on the flatness of the spoofing material in front of the sensor. However, with the advancements in 3D reconstruction and printing technologies, this assumption can no longer be maintained. In this paper, we aim to inspect the spoofing potential of subject-specific 3D facial masks for different recognition systems and address the detection problem of this more complex attack type. In order to assess the spoofing performance of 3D masks against 2D, 2.5D, and 3D face recognition and to analyze various texture-based countermeasures using both 2D and 2.5D data, a parallel study with comprehensive experiments is performed on two data sets: the Morpho database which is not publicly available and the newly distributed 3D mask attack database.
AbstractList Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still an open security issue in biometrics domain and among all biometric traits, face is exposed to the most serious threat, since it is particularly easy to access and reproduce. In this paper, many different types of face spoofing attacks have been examined and various algorithms have been proposed to detect them. Mainly focusing on 2D attacks forged by displaying printed photos or replaying recorded videos on mobile devices, a significant portion of these studies ground their arguments on the flatness of the spoofing material in front of the sensor. However, with the advancements in 3D reconstruction and printing technologies, this assumption can no longer be maintained. In this paper, we aim to inspect the spoofing potential of subject-specific 3D facial masks for different recognition systems and address the detection problem of this more complex attack type. In order to assess the spoofing performance of 3D masks against 2D, 2.5D, and 3D face recognition and to analyze various texture-based countermeasures using both 2D and 2.5D data, a parallel study with comprehensive experiments is performed on two data sets: the Morpho database which is not publicly available and the newly distributed 3D mask attack database.
Author Marcel, Sebastien
Erdogmus, Nesli
Author_xml – sequence: 1
  givenname: Nesli
  surname: Erdogmus
  fullname: Erdogmus, Nesli
  email: nesli.erdogmus@idiap.ch
  organization: Idiap Res. Inst., Martigny, Switzerland
– sequence: 2
  givenname: Sebastien
  surname: Marcel
  fullname: Marcel, Sebastien
  email: sebastien.marcel@idiap.ch
  organization: Idiap Res. Inst., Martigny, Switzerland
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28696640$$DView record in Pascal Francis
BookMark eNp9kEFPwjAUgBuDiYD-AONliTF6Afu6tWuPBkVJMCaC8dh05Q2LY8V1HPz3boFw4OCp7_B97zVfj3RKXyIhl0CHAFTdzyfj2ZBRSIYsZoxxfkK6wLkYCMqgc5ghPiO9EFaUJgkI2SW3s433uSuX0dhYjN7R-mXpaufL6NPVX1H8GL2a8B3OyWluioAX-7dPPsZP89HLYPr2PBk9TAc2VqoeIMUFQ5GkmAPIlEuacsaQLxZZlgi7MCLNGKICRpUyCDI3eaJykVGUSsY27pO73d5N5X-2GGq9dsFiUZgS_TZoEELJBqW8Qa-P0JXfVmXzOw084UqlSqiGutlTJlhT5JUprQt6U7m1qX41k0IJkdCGgx1nKx9ChfkBAarbxLpNrNvEep-4cdIjx7ratPHqyrjiX_NqZzpEPFwSEqhkKv4D2kaH0A
CODEN ITIFA6
CitedBy_id crossref_primary_10_1109_TIFS_2023_3293949
crossref_primary_10_1109_TIFS_2019_2916652
crossref_primary_10_1109_ACCESS_2024_3513795
crossref_primary_10_1109_TMC_2023_3289708
crossref_primary_10_1109_JIOT_2023_3289573
crossref_primary_10_1109_JIOT_2023_3264274
crossref_primary_10_1016_j_patcog_2025_111905
crossref_primary_10_1109_TIP_2023_3330108
crossref_primary_10_1109_LSP_2021_3089908
crossref_primary_10_1016_j_patrec_2021_01_021
crossref_primary_10_1109_TMC_2025_3565689
crossref_primary_10_1109_TCSVT_2020_3044986
crossref_primary_10_1007_s11042_022_13245_9
crossref_primary_10_1007_s00521_021_06416_6
crossref_primary_10_1049_bme2_12041
crossref_primary_10_3390_info14020065
crossref_primary_10_1007_s10044_017_0606_y
crossref_primary_10_1016_j_patrec_2015_07_034
crossref_primary_10_1109_TMC_2024_3367781
crossref_primary_10_1145_3643510
crossref_primary_10_1016_j_micpro_2022_104750
crossref_primary_10_1016_j_jvcir_2019_01_031
crossref_primary_10_3390_info16070581
crossref_primary_10_1049_iet_bmt_2017_0089
crossref_primary_10_3233_IDT_220197
crossref_primary_10_1007_s00371_024_03675_x
crossref_primary_10_1109_TIFS_2017_2676720
crossref_primary_10_3233_HIS_240014
crossref_primary_10_1145_3264950
crossref_primary_10_1016_j_comnet_2020_107118
crossref_primary_10_1016_j_cose_2023_103698
crossref_primary_10_1109_ACCESS_2024_3421345
crossref_primary_10_1109_ACCESS_2020_2980755
crossref_primary_10_3390_sym11030360
crossref_primary_10_1109_TDSC_2022_3186999
crossref_primary_10_1109_TIFS_2018_2868230
crossref_primary_10_1049_iet_bmt_2014_0075
crossref_primary_10_1109_ACCESS_2025_3569881
crossref_primary_10_1109_TDSC_2022_3168345
crossref_primary_10_1016_j_ins_2025_121904
crossref_primary_10_1109_TPAMI_2020_3036338
crossref_primary_10_1016_j_ins_2016_03_005
crossref_primary_10_1109_TIFS_2020_3013214
crossref_primary_10_1109_TPAMI_2022_3215850
crossref_primary_10_1016_j_eswa_2021_115883
crossref_primary_10_1049_iet_bmt_2018_5235
crossref_primary_10_1109_TIFS_2015_2404294
crossref_primary_10_1016_j_bspc_2023_104922
crossref_primary_10_1049_iet_bmt_2019_0155
crossref_primary_10_1186_s41235_017_0079_y
crossref_primary_10_1145_3534575
crossref_primary_10_3390_s21082799
crossref_primary_10_1007_s11760_018_1253_5
crossref_primary_10_1145_3309550
crossref_primary_10_3390_s22176364
crossref_primary_10_1002_cpe_4641
crossref_primary_10_3390_app15126891
crossref_primary_10_1016_j_patcog_2019_107032
crossref_primary_10_1109_ACCESS_2021_3088786
crossref_primary_10_1109_JIOT_2022_3196143
crossref_primary_10_1109_TPAMI_2024_3370721
crossref_primary_10_1007_s13042_025_02773_z
crossref_primary_10_1109_TIFS_2016_2578288
crossref_primary_10_3390_sym12030376
crossref_primary_10_1145_3432192
crossref_primary_10_1109_TIFS_2022_3197335
crossref_primary_10_1109_TIFS_2015_2458700
crossref_primary_10_1145_3575660
crossref_primary_10_1109_TMC_2022_3214846
crossref_primary_10_1109_TMC_2022_3216868
crossref_primary_10_1016_j_neucom_2021_06_033
crossref_primary_10_1145_3749546
crossref_primary_10_1016_j_knosys_2025_113059
crossref_primary_10_1109_TIFS_2020_2988168
crossref_primary_10_1016_j_jisa_2025_104142
crossref_primary_10_1016_j_eswa_2025_127610
crossref_primary_10_1109_ACCESS_2014_2381273
crossref_primary_10_1109_ACCESS_2024_3396632
crossref_primary_10_1007_s00530_023_01070_5
crossref_primary_10_1109_TIM_2023_3304683
crossref_primary_10_3390_s24134051
crossref_primary_10_1109_TMC_2022_3186614
crossref_primary_10_3390_bdcc7010037
crossref_primary_10_1016_j_patcog_2019_01_005
crossref_primary_10_1002_dac_4441
crossref_primary_10_1016_j_cose_2024_103828
crossref_primary_10_1111_coin_12244
crossref_primary_10_1016_j_jnca_2021_103162
crossref_primary_10_1016_j_neucom_2024_128992
crossref_primary_10_1007_s00371_025_04166_3
crossref_primary_10_1007_s11042_023_14453_7
crossref_primary_10_1109_TMC_2024_3474673
crossref_primary_10_3390_jimaging6120139
crossref_primary_10_3390_s20143988
crossref_primary_10_1145_3411806
crossref_primary_10_1109_TDSC_2024_3352049
crossref_primary_10_1109_ACCESS_2020_3004464
crossref_primary_10_1109_TIFS_2018_2799427
crossref_primary_10_1016_j_dib_2020_106281
crossref_primary_10_3390_electronics9040661
crossref_primary_10_1007_s11042_017_4780_0
crossref_primary_10_1016_j_compeleceng_2016_05_004
crossref_primary_10_1109_TIFS_2021_3134869
crossref_primary_10_3390_s18082601
crossref_primary_10_1016_j_dsp_2020_102809
crossref_primary_10_1016_j_jvcir_2018_01_001
crossref_primary_10_1155_2024_8436216
crossref_primary_10_1109_TIFS_2021_3050060
crossref_primary_10_1109_COMST_2014_2386915
crossref_primary_10_1049_iet_bmt_2017_0185
crossref_primary_10_1109_JIOT_2025_3575010
crossref_primary_10_1016_j_bspc_2021_103306
crossref_primary_10_1007_s10462_022_10213_5
crossref_primary_10_1145_3572909
crossref_primary_10_1109_ACCESS_2024_3478814
Cites_doi 10.1016/j.patrec.2010.01.029
10.1109/34.121791
10.1364/JOSAA.26.000760
10.1109/ICASSP.2013.6638076
10.1109/ICB.2012.6199754
10.1109/IJCB.2011.6117503
10.1117/12.933650
10.1109/ICIEV.2012.6317338
10.1109/BTAS.2013.6712688
10.1109/CVBVS.2000.855246
10.1016/0031-3203(95)00067-4
10.1007/978-0-387-71041-9_20
10.1049/iet-bmt.2011.0012
10.1109/ICDSP.2013.6622704
10.1109/ICPR.2006.855
10.1109/ICCV.2007.4409068
10.1109/WIAMIS.2007.11
10.1109/FG.2013.6553761
10.1109/IJCB.2011.6117510
10.1109/AMFG.2003.1240848
10.1016/j.cviu.2005.05.005
10.1109/FG.2011.5771438
10.1109/CVPRW.2008.4563115
10.1109/BCC.2006.4341615
10.1109/CVPRW.2013.24
10.1109/IJCB.2011.6117509
10.1117/12.541955
10.1109/ISCAS.2010.5537866
10.1109/AUTOID.2005.20
10.1109/ICARCV.2012.6485156
10.1109/IJCB.2011.6117599
ContentType Journal Article
Copyright 2015 INIST-CNRS
Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2014
Copyright_xml – notice: 2015 INIST-CNRS
– notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2014
DBID 97E
RIA
RIE
AAYXX
CITATION
IQODW
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
DOI 10.1109/TIFS.2014.2322255
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE/IET Electronic Library
CrossRef
Pascal-Francis
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Civil Engineering Abstracts

Civil Engineering Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
Applied Sciences
EISSN 1556-6021
EndPage 1097
ExternalDocumentID 3377774241
28696640
10_1109_TIFS_2014_2322255
6810829
Genre orig-research
GrantInformation_xml – fundername: FP7 Programme through the European TABULA RASA Project
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
IQODW
RIG
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
ID FETCH-LOGICAL-c399t-e0ed2e647ef11875807522e5ddbb46cda67b2ee912099ae18faf49f6b0e8983c3
IEDL.DBID RIE
ISICitedReferencesCount 219
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000338117000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1556-6013
IngestDate Sun Sep 28 11:26:02 EDT 2025
Mon Jun 30 03:38:42 EDT 2025
Wed Apr 02 07:17:46 EDT 2025
Sat Nov 29 03:49:35 EST 2025
Tue Nov 18 22:18:26 EST 2025
Tue Aug 26 16:49:25 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 7
Keywords Spoofing
face recognition
mask attack
presentation attack
Biometrics
Computer vision
Image processing
Face recognition
Distributed database
Countermeasurement
Mask
Spoofing attack
Video cameras
Vulnerability
Texture
Image reconstruction
Facies
Rapid prototyping
Tridimensional image
Safety
Computer aided design
Computer attack
Flatness
Intrusion detection systems
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c399t-e0ed2e647ef11875807522e5ddbb46cda67b2ee912099ae18faf49f6b0e8983c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
OpenAccessLink https://infoscience.epfl.ch/handle/20.500.14299/103411
PQID 1545997969
PQPubID 85506
PageCount 14
ParticipantIDs ieee_primary_6810829
proquest_miscellaneous_1669889805
crossref_citationtrail_10_1109_TIFS_2014_2322255
crossref_primary_10_1109_TIFS_2014_2322255
pascalfrancis_primary_28696640
proquest_journals_1545997969
PublicationCentury 2000
PublicationDate 2014-07-01
PublicationDateYYYYMMDD 2014-07-01
PublicationDate_xml – month: 07
  year: 2014
  text: 2014-07-01
  day: 01
PublicationDecade 2010
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
– name: New York
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2014
Publisher IEEE
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: Institute of Electrical and Electronics Engineers
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref34
ref12
ref15
ref31
doddington (ref37) 0
prokoski (ref17) 0; 339
ref30
ref33
ref11
ref32
ref10
li (ref4) 0; 5404
ref2
ref1
ref19
ref18
chingovska (ref35) 0
chingovska (ref14) 0
erdogmus (ref16) 0
ref24
ref23
ref26
ref25
ref20
ref22
ref21
trefn? (ref36) 0
ref28
ref27
ref29
ref8
ref9
ref3
ref6
ref5
de marsico (ref7) 0
References_xml – ident: ref32
  doi: 10.1016/j.patrec.2010.01.029
– ident: ref33
  doi: 10.1109/34.121791
– ident: ref19
  doi: 10.1364/JOSAA.26.000760
– start-page: 1
  year: 0
  ident: ref35
  article-title: On the effectiveness of local binary patterns in face anti-spoofing
  publication-title: Proc IEEE Int Conf Biometr Special Interest Group
– ident: ref22
  doi: 10.1109/ICASSP.2013.6638076
– ident: ref25
  doi: 10.1109/ICB.2012.6199754
– ident: ref13
  doi: 10.1109/IJCB.2011.6117503
– volume: 339
  start-page: 27
  year: 0
  ident: ref17
  article-title: Disguise detection and identification using infrared imagery
  publication-title: Proc SPIE
  doi: 10.1117/12.933650
– ident: ref28
  doi: 10.1109/ICIEV.2012.6317338
– ident: ref26
  doi: 10.1109/BTAS.2013.6712688
– ident: ref18
  doi: 10.1109/CVBVS.2000.855246
– ident: ref34
  doi: 10.1016/0031-3203(95)00067-4
– year: 0
  ident: ref16
  article-title: Spoofing 2D face recognition systems with 3D masks
  publication-title: Proc IEEE Int Conf Biometr Special Interest Group
– ident: ref1
  doi: 10.1007/978-0-387-71041-9_20
– ident: ref2
  doi: 10.1049/iet-bmt.2011.0012
– ident: ref24
  doi: 10.1109/ICDSP.2013.6622704
– ident: ref29
  doi: 10.1109/ICPR.2006.855
– ident: ref8
  doi: 10.1109/ICCV.2007.4409068
– ident: ref15
  doi: 10.1109/WIAMIS.2007.11
– ident: ref21
  doi: 10.1109/FG.2013.6553761
– ident: ref5
  doi: 10.1109/IJCB.2011.6117510
– ident: ref31
  doi: 10.1109/AMFG.2003.1240848
– year: 0
  ident: ref36
  article-title: Extended set of local binary patterns for rapid object detection
  publication-title: Proc Comput Vis Winter Workshop
– ident: ref30
  doi: 10.1016/j.cviu.2005.05.005
– start-page: 73
  year: 0
  ident: ref7
  article-title: Moving face spoofing detection via 3D projective invariants
  publication-title: Proc 5th IAPR ICB
– ident: ref11
  doi: 10.1109/FG.2011.5771438
– ident: ref10
  doi: 10.1109/CVPRW.2008.4563115
– ident: ref9
  doi: 10.1109/BCC.2006.4341615
– start-page: 1
  year: 0
  ident: ref14
  article-title: On the effectiveness of local binary patterns in face anti-spoofing
  publication-title: Proc IEEE Int Conf Biometr Special Interest Group
– ident: ref23
  doi: 10.1109/CVPRW.2013.24
– ident: ref12
  doi: 10.1109/IJCB.2011.6117509
– volume: 5404
  start-page: 296
  year: 0
  ident: ref4
  article-title: Live face detection based on the analysis of fourier spectra
  publication-title: Proc SPIE
  doi: 10.1117/12.541955
– ident: ref3
  doi: 10.1109/ISCAS.2010.5537866
– ident: ref6
  doi: 10.1109/AUTOID.2005.20
– start-page: 5
  year: 0
  ident: ref37
  article-title: Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation
  publication-title: Proc Int Conf Spoken Lang Process
– ident: ref20
  doi: 10.1109/ICARCV.2012.6485156
– ident: ref27
  doi: 10.1109/IJCB.2011.6117599
SSID ssj0044168
Score 2.5466568
Snippet Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks...
SourceID proquest
pascalfrancis
crossref
ieee
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 1084
SubjectTerms Applied sciences
Artificial intelligence
Biometrics
Computer aided design
Computer information security
Computer science; control theory; systems
Computer systems and distributed systems. User interface
Exact sciences and technology
Face
Face recognition
Information systems. Data bases
Masks
Materials
Memory organisation. Data processing
Pattern recognition. Digital image processing. Computational geometry
Software
Solid modeling
Spoofing
Three dimensional
Three-dimensional displays
Two dimensional
Videos
Title Spoofing Face Recognition With 3D Masks
URI https://ieeexplore.ieee.org/document/6810829
https://www.proquest.com/docview/1545997969
https://www.proquest.com/docview/1669889805
Volume 9
WOSCitedRecordID wos000338117000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE/IET Electronic Library
  customDbUrl:
  eissn: 1556-6021
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0044168
  issn: 1556-6013
  databaseCode: RIE
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS91AEB5UfGgfvLb0tCopCII0uiebbHYeS_WgUEW8oG9hk0xUKomYc_r7O5MbFkXwLbC77PLtzu5M5vIBbEcsYalG40cmT_0Qc_RZS3C-TVnXxzQgmzasJb_j01N7c4Nnc_BjyIUhoib4jPbks_Hl51U2k19l-1I7ywY4D_NxHLe5Wv2ty696m_YWRcZnI0N3Hsyxwv3L48mFBHGFe4H4FSSr79kb1JCqSEikqxmVoqWzeHEzN8_NZPl9C12BpU6t9H6252AV5qhcg-WessHrJHgNPj6rP7gOOxePFR-u8tabuIy88z6YqCq96_vpnacPvBNX_6k_wdXk8PLXkd8xJ_gZKxxTnxTlAZkwpkLoxCOpOBwEFOV5moYmy52JeRsIm8RZR2NbuCLEwqSKLFqd6c-wUFYlfQGPVTCVOyclo9iSU8TmEWtNLkCVaY1aj0D1WCZZV1Zc2C0eksa8UJgI_InAn3Twj2B3GPLY1tR4q_O64Dt07KAdwdZ_Gza0B9bwEkM1go1-B5NOLOtE9EXEGA2P_z40s0CJl8SVVM24jzFoGQUVfX196m_wQRbYxuxuwML0aUabsJj9nd7XT1vNqfwH_AHbVg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da9RAEB9qFdSHVtuKp7VGEAQx7d5usrfzWKxHi9dD7Il9C5tkoqUlKc2df78z-aKiFHwL7C67_HZndybz8QN4G7OEpQZtGNs8DSPMMWQtwYcuZV0fU00ubVhLZpP53J2f45c1-DDkwhBRE3xG-_LZ-PLzKlvJr7IDqZ3lNN6D-3EU6XGbrdXfu_yut4lvcWxDNjNM58McKzxYnEzPJIwr2tfiWZC8vluvUEOrIkGRvmZcipbQ4q-7uXlwppv_t9QnsNEplsFhexKewhqVW7DZkzYEnQxvweNbFQi34d3ZdcXHq_wRTH1Gwdc-nKgqg-8Xy5-BOQpOfX1Z78C36afFx-Ow404IM1Y5liEpyjXZaEKFEIrHUnNYa4rzPE0jm-XeTngjCJvUWU9jV_giwsKmihw6k5lnsF5WJT2HgJUwlXsvRaPYllPEBhLrTV6jyoxBY0ageiyTrCssLvwWV0ljYChMBP5E4E86-Efwfhhy3VbVuKvztuA7dOygHcHeHxs2tGtneYmRGsFuv4NJJ5h1Ihoj4gQtj38zNLNIiZ_El1StuI-16BgFFb_499Sv4eHx4nSWzE7mn1_CI1lsG8G7C-vLmxW9ggfZr-VFfbPXnNDfjonenQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Spoofing+Face+Recognition+With+3D+Masks&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Erdogmus%2C+Nesli&rft.au=Marcel%2C+Sebastien&rft.date=2014-07-01&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=9&rft.issue=7&rft.spage=1084&rft.epage=1097&rft_id=info:doi/10.1109%2FTIFS.2014.2322255&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon