Spoofing Face Recognition With 3D Masks
Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still an open security issue in biometrics domain and among all biometric traits, face is exposed to the most seri...
Uloženo v:
| Vydáno v: | IEEE transactions on information forensics and security Ročník 9; číslo 7; s. 1084 - 1097 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New York, NY
IEEE
01.07.2014
Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Témata: | |
| ISSN: | 1556-6013, 1556-6021 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still an open security issue in biometrics domain and among all biometric traits, face is exposed to the most serious threat, since it is particularly easy to access and reproduce. In this paper, many different types of face spoofing attacks have been examined and various algorithms have been proposed to detect them. Mainly focusing on 2D attacks forged by displaying printed photos or replaying recorded videos on mobile devices, a significant portion of these studies ground their arguments on the flatness of the spoofing material in front of the sensor. However, with the advancements in 3D reconstruction and printing technologies, this assumption can no longer be maintained. In this paper, we aim to inspect the spoofing potential of subject-specific 3D facial masks for different recognition systems and address the detection problem of this more complex attack type. In order to assess the spoofing performance of 3D masks against 2D, 2.5D, and 3D face recognition and to analyze various texture-based countermeasures using both 2D and 2.5D data, a parallel study with comprehensive experiments is performed on two data sets: the Morpho database which is not publicly available and the newly distributed 3D mask attack database. |
|---|---|
| AbstractList | Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still an open security issue in biometrics domain and among all biometric traits, face is exposed to the most serious threat, since it is particularly easy to access and reproduce. In this paper, many different types of face spoofing attacks have been examined and various algorithms have been proposed to detect them. Mainly focusing on 2D attacks forged by displaying printed photos or replaying recorded videos on mobile devices, a significant portion of these studies ground their arguments on the flatness of the spoofing material in front of the sensor. However, with the advancements in 3D reconstruction and printing technologies, this assumption can no longer be maintained. In this paper, we aim to inspect the spoofing potential of subject-specific 3D facial masks for different recognition systems and address the detection problem of this more complex attack type. In order to assess the spoofing performance of 3D masks against 2D, 2.5D, and 3D face recognition and to analyze various texture-based countermeasures using both 2D and 2.5D data, a parallel study with comprehensive experiments is performed on two data sets: the Morpho database which is not publicly available and the newly distributed 3D mask attack database. |
| Author | Marcel, Sebastien Erdogmus, Nesli |
| Author_xml | – sequence: 1 givenname: Nesli surname: Erdogmus fullname: Erdogmus, Nesli email: nesli.erdogmus@idiap.ch organization: Idiap Res. Inst., Martigny, Switzerland – sequence: 2 givenname: Sebastien surname: Marcel fullname: Marcel, Sebastien email: sebastien.marcel@idiap.ch organization: Idiap Res. Inst., Martigny, Switzerland |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28696640$$DView record in Pascal Francis |
| BookMark | eNp9kEFPwjAUgBuDiYD-AONliTF6Afu6tWuPBkVJMCaC8dh05Q2LY8V1HPz3boFw4OCp7_B97zVfj3RKXyIhl0CHAFTdzyfj2ZBRSIYsZoxxfkK6wLkYCMqgc5ghPiO9EFaUJgkI2SW3s433uSuX0dhYjN7R-mXpaufL6NPVX1H8GL2a8B3OyWluioAX-7dPPsZP89HLYPr2PBk9TAc2VqoeIMUFQ5GkmAPIlEuacsaQLxZZlgi7MCLNGKICRpUyCDI3eaJykVGUSsY27pO73d5N5X-2GGq9dsFiUZgS_TZoEELJBqW8Qa-P0JXfVmXzOw084UqlSqiGutlTJlhT5JUprQt6U7m1qX41k0IJkdCGgx1nKx9ChfkBAarbxLpNrNvEep-4cdIjx7ratPHqyrjiX_NqZzpEPFwSEqhkKv4D2kaH0A |
| CODEN | ITIFA6 |
| CitedBy_id | crossref_primary_10_1109_TIFS_2023_3293949 crossref_primary_10_1109_TIFS_2019_2916652 crossref_primary_10_1109_ACCESS_2024_3513795 crossref_primary_10_1109_TMC_2023_3289708 crossref_primary_10_1109_JIOT_2023_3289573 crossref_primary_10_1109_JIOT_2023_3264274 crossref_primary_10_1016_j_patcog_2025_111905 crossref_primary_10_1109_TIP_2023_3330108 crossref_primary_10_1109_LSP_2021_3089908 crossref_primary_10_1016_j_patrec_2021_01_021 crossref_primary_10_1109_TMC_2025_3565689 crossref_primary_10_1109_TCSVT_2020_3044986 crossref_primary_10_1007_s11042_022_13245_9 crossref_primary_10_1007_s00521_021_06416_6 crossref_primary_10_1049_bme2_12041 crossref_primary_10_3390_info14020065 crossref_primary_10_1007_s10044_017_0606_y crossref_primary_10_1016_j_patrec_2015_07_034 crossref_primary_10_1109_TMC_2024_3367781 crossref_primary_10_1145_3643510 crossref_primary_10_1016_j_micpro_2022_104750 crossref_primary_10_1016_j_jvcir_2019_01_031 crossref_primary_10_3390_info16070581 crossref_primary_10_1049_iet_bmt_2017_0089 crossref_primary_10_3233_IDT_220197 crossref_primary_10_1007_s00371_024_03675_x crossref_primary_10_1109_TIFS_2017_2676720 crossref_primary_10_3233_HIS_240014 crossref_primary_10_1145_3264950 crossref_primary_10_1016_j_comnet_2020_107118 crossref_primary_10_1016_j_cose_2023_103698 crossref_primary_10_1109_ACCESS_2024_3421345 crossref_primary_10_1109_ACCESS_2020_2980755 crossref_primary_10_3390_sym11030360 crossref_primary_10_1109_TDSC_2022_3186999 crossref_primary_10_1109_TIFS_2018_2868230 crossref_primary_10_1049_iet_bmt_2014_0075 crossref_primary_10_1109_ACCESS_2025_3569881 crossref_primary_10_1109_TDSC_2022_3168345 crossref_primary_10_1016_j_ins_2025_121904 crossref_primary_10_1109_TPAMI_2020_3036338 crossref_primary_10_1016_j_ins_2016_03_005 crossref_primary_10_1109_TIFS_2020_3013214 crossref_primary_10_1109_TPAMI_2022_3215850 crossref_primary_10_1016_j_eswa_2021_115883 crossref_primary_10_1049_iet_bmt_2018_5235 crossref_primary_10_1109_TIFS_2015_2404294 crossref_primary_10_1016_j_bspc_2023_104922 crossref_primary_10_1049_iet_bmt_2019_0155 crossref_primary_10_1186_s41235_017_0079_y crossref_primary_10_1145_3534575 crossref_primary_10_3390_s21082799 crossref_primary_10_1007_s11760_018_1253_5 crossref_primary_10_1145_3309550 crossref_primary_10_3390_s22176364 crossref_primary_10_1002_cpe_4641 crossref_primary_10_3390_app15126891 crossref_primary_10_1016_j_patcog_2019_107032 crossref_primary_10_1109_ACCESS_2021_3088786 crossref_primary_10_1109_JIOT_2022_3196143 crossref_primary_10_1109_TPAMI_2024_3370721 crossref_primary_10_1007_s13042_025_02773_z crossref_primary_10_1109_TIFS_2016_2578288 crossref_primary_10_3390_sym12030376 crossref_primary_10_1145_3432192 crossref_primary_10_1109_TIFS_2022_3197335 crossref_primary_10_1109_TIFS_2015_2458700 crossref_primary_10_1145_3575660 crossref_primary_10_1109_TMC_2022_3214846 crossref_primary_10_1109_TMC_2022_3216868 crossref_primary_10_1016_j_neucom_2021_06_033 crossref_primary_10_1145_3749546 crossref_primary_10_1016_j_knosys_2025_113059 crossref_primary_10_1109_TIFS_2020_2988168 crossref_primary_10_1016_j_jisa_2025_104142 crossref_primary_10_1016_j_eswa_2025_127610 crossref_primary_10_1109_ACCESS_2014_2381273 crossref_primary_10_1109_ACCESS_2024_3396632 crossref_primary_10_1007_s00530_023_01070_5 crossref_primary_10_1109_TIM_2023_3304683 crossref_primary_10_3390_s24134051 crossref_primary_10_1109_TMC_2022_3186614 crossref_primary_10_3390_bdcc7010037 crossref_primary_10_1016_j_patcog_2019_01_005 crossref_primary_10_1002_dac_4441 crossref_primary_10_1016_j_cose_2024_103828 crossref_primary_10_1111_coin_12244 crossref_primary_10_1016_j_jnca_2021_103162 crossref_primary_10_1016_j_neucom_2024_128992 crossref_primary_10_1007_s00371_025_04166_3 crossref_primary_10_1007_s11042_023_14453_7 crossref_primary_10_1109_TMC_2024_3474673 crossref_primary_10_3390_jimaging6120139 crossref_primary_10_3390_s20143988 crossref_primary_10_1145_3411806 crossref_primary_10_1109_TDSC_2024_3352049 crossref_primary_10_1109_ACCESS_2020_3004464 crossref_primary_10_1109_TIFS_2018_2799427 crossref_primary_10_1016_j_dib_2020_106281 crossref_primary_10_3390_electronics9040661 crossref_primary_10_1007_s11042_017_4780_0 crossref_primary_10_1016_j_compeleceng_2016_05_004 crossref_primary_10_1109_TIFS_2021_3134869 crossref_primary_10_3390_s18082601 crossref_primary_10_1016_j_dsp_2020_102809 crossref_primary_10_1016_j_jvcir_2018_01_001 crossref_primary_10_1155_2024_8436216 crossref_primary_10_1109_TIFS_2021_3050060 crossref_primary_10_1109_COMST_2014_2386915 crossref_primary_10_1049_iet_bmt_2017_0185 crossref_primary_10_1109_JIOT_2025_3575010 crossref_primary_10_1016_j_bspc_2021_103306 crossref_primary_10_1007_s10462_022_10213_5 crossref_primary_10_1145_3572909 crossref_primary_10_1109_ACCESS_2024_3478814 |
| Cites_doi | 10.1016/j.patrec.2010.01.029 10.1109/34.121791 10.1364/JOSAA.26.000760 10.1109/ICASSP.2013.6638076 10.1109/ICB.2012.6199754 10.1109/IJCB.2011.6117503 10.1117/12.933650 10.1109/ICIEV.2012.6317338 10.1109/BTAS.2013.6712688 10.1109/CVBVS.2000.855246 10.1016/0031-3203(95)00067-4 10.1007/978-0-387-71041-9_20 10.1049/iet-bmt.2011.0012 10.1109/ICDSP.2013.6622704 10.1109/ICPR.2006.855 10.1109/ICCV.2007.4409068 10.1109/WIAMIS.2007.11 10.1109/FG.2013.6553761 10.1109/IJCB.2011.6117510 10.1109/AMFG.2003.1240848 10.1016/j.cviu.2005.05.005 10.1109/FG.2011.5771438 10.1109/CVPRW.2008.4563115 10.1109/BCC.2006.4341615 10.1109/CVPRW.2013.24 10.1109/IJCB.2011.6117509 10.1117/12.541955 10.1109/ISCAS.2010.5537866 10.1109/AUTOID.2005.20 10.1109/ICARCV.2012.6485156 10.1109/IJCB.2011.6117599 |
| ContentType | Journal Article |
| Copyright | 2015 INIST-CNRS Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2014 |
| Copyright_xml | – notice: 2015 INIST-CNRS – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2014 |
| DBID | 97E RIA RIE AAYXX CITATION IQODW 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
| DOI | 10.1109/TIFS.2014.2322255 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Pascal-Francis Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitleList | Civil Engineering Abstracts Civil Engineering Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science Applied Sciences |
| EISSN | 1556-6021 |
| EndPage | 1097 |
| ExternalDocumentID | 3377774241 28696640 10_1109_TIFS_2014_2322255 6810829 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: FP7 Programme through the European TABULA RASA Project |
| GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION IQODW RIG 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
| ID | FETCH-LOGICAL-c399t-e0ed2e647ef11875807522e5ddbb46cda67b2ee912099ae18faf49f6b0e8983c3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 219 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000338117000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1556-6013 |
| IngestDate | Sun Sep 28 11:26:02 EDT 2025 Mon Jun 30 03:38:42 EDT 2025 Wed Apr 02 07:17:46 EDT 2025 Sat Nov 29 03:49:35 EST 2025 Tue Nov 18 22:18:26 EST 2025 Tue Aug 26 16:49:25 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 7 |
| Keywords | Spoofing face recognition mask attack presentation attack Biometrics Computer vision Image processing Face recognition Distributed database Countermeasurement Mask Spoofing attack Video cameras Vulnerability Texture Image reconstruction Facies Rapid prototyping Tridimensional image Safety Computer aided design Computer attack Flatness Intrusion detection systems |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html CC BY 4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c399t-e0ed2e647ef11875807522e5ddbb46cda67b2ee912099ae18faf49f6b0e8983c3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| OpenAccessLink | https://infoscience.epfl.ch/handle/20.500.14299/103411 |
| PQID | 1545997969 |
| PQPubID | 85506 |
| PageCount | 14 |
| ParticipantIDs | ieee_primary_6810829 proquest_miscellaneous_1669889805 crossref_citationtrail_10_1109_TIFS_2014_2322255 crossref_primary_10_1109_TIFS_2014_2322255 pascalfrancis_primary_28696640 proquest_journals_1545997969 |
| PublicationCentury | 2000 |
| PublicationDate | 2014-07-01 |
| PublicationDateYYYYMMDD | 2014-07-01 |
| PublicationDate_xml | – month: 07 year: 2014 text: 2014-07-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York, NY |
| PublicationPlace_xml | – name: New York, NY – name: New York |
| PublicationTitle | IEEE transactions on information forensics and security |
| PublicationTitleAbbrev | TIFS |
| PublicationYear | 2014 |
| Publisher | IEEE Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref34 ref12 ref15 ref31 doddington (ref37) 0 prokoski (ref17) 0; 339 ref30 ref33 ref11 ref32 ref10 li (ref4) 0; 5404 ref2 ref1 ref19 ref18 chingovska (ref35) 0 chingovska (ref14) 0 erdogmus (ref16) 0 ref24 ref23 ref26 ref25 ref20 ref22 ref21 trefn? (ref36) 0 ref28 ref27 ref29 ref8 ref9 ref3 ref6 ref5 de marsico (ref7) 0 |
| References_xml | – ident: ref32 doi: 10.1016/j.patrec.2010.01.029 – ident: ref33 doi: 10.1109/34.121791 – ident: ref19 doi: 10.1364/JOSAA.26.000760 – start-page: 1 year: 0 ident: ref35 article-title: On the effectiveness of local binary patterns in face anti-spoofing publication-title: Proc IEEE Int Conf Biometr Special Interest Group – ident: ref22 doi: 10.1109/ICASSP.2013.6638076 – ident: ref25 doi: 10.1109/ICB.2012.6199754 – ident: ref13 doi: 10.1109/IJCB.2011.6117503 – volume: 339 start-page: 27 year: 0 ident: ref17 article-title: Disguise detection and identification using infrared imagery publication-title: Proc SPIE doi: 10.1117/12.933650 – ident: ref28 doi: 10.1109/ICIEV.2012.6317338 – ident: ref26 doi: 10.1109/BTAS.2013.6712688 – ident: ref18 doi: 10.1109/CVBVS.2000.855246 – ident: ref34 doi: 10.1016/0031-3203(95)00067-4 – year: 0 ident: ref16 article-title: Spoofing 2D face recognition systems with 3D masks publication-title: Proc IEEE Int Conf Biometr Special Interest Group – ident: ref1 doi: 10.1007/978-0-387-71041-9_20 – ident: ref2 doi: 10.1049/iet-bmt.2011.0012 – ident: ref24 doi: 10.1109/ICDSP.2013.6622704 – ident: ref29 doi: 10.1109/ICPR.2006.855 – ident: ref8 doi: 10.1109/ICCV.2007.4409068 – ident: ref15 doi: 10.1109/WIAMIS.2007.11 – ident: ref21 doi: 10.1109/FG.2013.6553761 – ident: ref5 doi: 10.1109/IJCB.2011.6117510 – ident: ref31 doi: 10.1109/AMFG.2003.1240848 – year: 0 ident: ref36 article-title: Extended set of local binary patterns for rapid object detection publication-title: Proc Comput Vis Winter Workshop – ident: ref30 doi: 10.1016/j.cviu.2005.05.005 – start-page: 73 year: 0 ident: ref7 article-title: Moving face spoofing detection via 3D projective invariants publication-title: Proc 5th IAPR ICB – ident: ref11 doi: 10.1109/FG.2011.5771438 – ident: ref10 doi: 10.1109/CVPRW.2008.4563115 – ident: ref9 doi: 10.1109/BCC.2006.4341615 – start-page: 1 year: 0 ident: ref14 article-title: On the effectiveness of local binary patterns in face anti-spoofing publication-title: Proc IEEE Int Conf Biometr Special Interest Group – ident: ref23 doi: 10.1109/CVPRW.2013.24 – ident: ref12 doi: 10.1109/IJCB.2011.6117509 – volume: 5404 start-page: 296 year: 0 ident: ref4 article-title: Live face detection based on the analysis of fourier spectra publication-title: Proc SPIE doi: 10.1117/12.541955 – ident: ref3 doi: 10.1109/ISCAS.2010.5537866 – ident: ref6 doi: 10.1109/AUTOID.2005.20 – start-page: 5 year: 0 ident: ref37 article-title: Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation publication-title: Proc Int Conf Spoken Lang Process – ident: ref20 doi: 10.1109/ICARCV.2012.6485156 – ident: ref27 doi: 10.1109/IJCB.2011.6117599 |
| SSID | ssj0044168 |
| Score | 2.5466568 |
| Snippet | Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks... |
| SourceID | proquest pascalfrancis crossref ieee |
| SourceType | Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 1084 |
| SubjectTerms | Applied sciences Artificial intelligence Biometrics Computer aided design Computer information security Computer science; control theory; systems Computer systems and distributed systems. User interface Exact sciences and technology Face Face recognition Information systems. Data bases Masks Materials Memory organisation. Data processing Pattern recognition. Digital image processing. Computational geometry Software Solid modeling Spoofing Three dimensional Three-dimensional displays Two dimensional Videos |
| Title | Spoofing Face Recognition With 3D Masks |
| URI | https://ieeexplore.ieee.org/document/6810829 https://www.proquest.com/docview/1545997969 https://www.proquest.com/docview/1669889805 |
| Volume | 9 |
| WOSCitedRecordID | wos000338117000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1556-6021 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0044168 issn: 1556-6013 databaseCode: RIE dateStart: 20060101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1ZS-UwFD6o-OA8uM7gdaMDgjBYTZs2y6OoF30YEXUY30qSnqoordh7_f3mdEMZGfCtNEkbvmzn5CwfwG5kmdHMYij9DhySyBCanNvQJdLoPBIFV0VDNiEvLtTtrb6cgf0hFgYRG-czPKDHxpafV25KV2WHlDtLxXoWZqWUbaxWv-v6U70Ne0tTEXolg3cWzIjpw5vz8TU5cSUHMdkVKKrv3RnUkKqQS6SpPSpFS2fxz87cHDfjpa91dBkWO7EyOGrnwQrMYLkKSz1lQ9Ct4FX49i7_4BrsXT9XfnKVd8HYOAyuemeiqgz-PkzuA34S_Db1Y_0d_oxPb47Pwo45IXRe4JiEyDCPUSQSC6ITTynjcBxjmufWJsLlRkgbI-omcNZgpApTJLoQlqHSijv-A-bKqsR1CLSzMePIjYhsonKlIvRfUUxp498WfASsxzJzXVpxYrd4yhr1gumM4M8I_qyDfwS_hibPbU6N_1VeI3yHih20I9j5MGBDeayE1-ASNoKtfgSzblnWGcmLWkstfPufQ7FfUGQlMSVWU19HCK08Cizd-PzXm7BAHWx9drdgbvIyxW2Yd6-Th_plp5mVb27U3ak |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da9UwFD_MKagPbm4Tr86tA0EQu6VJmiaPol42tl3E3bG9lSQ93YbSjvVe_35z-sVEEXwrTdKGX77Oyfn4AbxNHLOGOYyzsAPHJDLEthAu9jKzpkhUKXTZkk1ks5m-vDRfV-DDGAuDiK3zGe7TY2vLL2q_pKuyA8qdpbl5AA9TKXnSRWsN-24417vAtzRVcVAzRG_DTJg5mB9Nz8iNS-5zsixQXN-9U6ilVSGnSNsEXMqO0OKPvbk9cKZr_9fVdXjWC5bRx24mPIcVrDZgbSBtiPo1vAFP72Ug3IR3Z7d1mF7VVTS1HqNvgztRXUUXN4vrSHyOTm3zvdmC8-mX-afDuOdOiH0QORYxMiw4KplhSYTiKeUc5hzTonBOKl9YlTmOaNrQWYuJLm0pTakcQ2208OIFrFZ1hS8hMt5xJlBYlTipC60TDF_RTBsb3pZiAmzAMvd9YnHit_iRtwoGMznBnxP8eQ__BN6PTW67rBr_qrxJ-I4Ve2gnsPPbgI3lXKugw0k2ge1hBPN-YTY5SYzGZEaF9ntjcVhSZCexFdbLUEcpowMKLH3191_vwuPD-elJfnI0O34NT6iznQfvNqwu7pb4Bh75n4ub5m6nnaG_AB884PA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Spoofing+Face+Recognition+With+3D+Masks&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Erdogmus%2C+Nesli&rft.au=Marcel%2C+Sebastien&rft.date=2014-07-01&rft.pub=IEEE&rft.issn=1556-6013&rft.volume=9&rft.issue=7&rft.spage=1084&rft.epage=1097&rft_id=info:doi/10.1109%2FTIFS.2014.2322255&rft.externalDocID=6810829 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |