|
|
|
Fei Wang, Lu Leng, Andrew Beng Jin Teoh and Jun Chu
Biometric-based authentication is widely deployed on multimedia systems currently; however, biometric systems are vulnerable to image-level attacks for impersonation. Reconstruction attack (RA) and presentation attack (PA) are two typical instances for i...
ver más
|
|
|