000 03829nam a22006375i 4500
001 978-3-031-32906-7
003 DE-He213
005 20240730164515.0
007 cr nn 008mamaa
008 230706s2023 sz | s |||| 0|eng d
020 _a9783031329067
_9978-3-031-32906-7
024 7 _a10.1007/978-3-031-32906-7
_2doi
050 4 _aTA1634
072 7 _aUYQV
_2bicssc
072 7 _aCOM016000
_2bisacsh
072 7 _aUYQV
_2thema
082 0 4 _a006.37
_223
100 1 _aWan, Jun.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_984884
245 1 0 _aAdvances in Face Presentation Attack Detection
_h[electronic resource] /
_cby Jun Wan, Guodong Guo, Sergio Escalera, Hugo Jair Escalante, Stan Z. Li.
250 _a2nd ed. 2023.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2023.
300 _aVIII, 111 p. 52 illus., 48 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSynthesis Lectures on Computer Vision,
_x2153-1064
505 0 _aIntroduction -- Face Presentation Attack Detection (PAD) Challenges -- Winners' Methods -- Challenge Performances -- Conclusions and Future Works.
520 _aThis book revises and expands upon the prior edition of Multi-Modal Face Presentation Attack Detection. The authors begin with fundamental and foundational information on face spoofing attack detection, explaining why the computer vision community has intensively studied it for the last decade. The authors also discuss the reasons that cause face anti-spoofing to be essential for preventing security breaches in face recognition systems. In addition, the book describes the factors that make it difficult to design effective methods of face presentation attack detection challenges. The book presents a thorough review and evaluation of current techniques and identifies those that have achieved the highest level of performance in a series of ChaLearn face anti-spoofing challenges at CVPR and ICCV. The authors also highlight directions for future research in face anti-spoofing that would lead to progress in the field. Additional analysis, new methodologies, and a more comprehensive survey of solutions are included in this new edition.
650 0 _aComputer vision.
_984885
650 0 _aBiometric identification.
_911407
650 0 _aPattern recognition systems.
_93953
650 0 _aImage processing
_xDigital techniques.
_94145
650 0 _aArtificial intelligence.
_93407
650 0 _aData protection.
_97245
650 1 4 _aComputer Vision.
_984888
650 2 4 _aBiometrics.
_932763
650 2 4 _aAutomated Pattern Recognition.
_931568
650 2 4 _aComputer Imaging, Vision, Pattern Recognition and Graphics.
_931569
650 2 4 _aArtificial Intelligence.
_93407
650 2 4 _aData and Information Security.
_931990
700 1 _aGuo, Guodong.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_984893
700 1 _aEscalera, Sergio.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_984896
700 1 _aEscalante, Hugo Jair.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_984897
700 1 _aLi, Stan Z.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_984898
710 2 _aSpringerLink (Online service)
_984901
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031329050
776 0 8 _iPrinted edition:
_z9783031329074
776 0 8 _iPrinted edition:
_z9783031329081
830 0 _aSynthesis Lectures on Computer Vision,
_x2153-1064
_984902
856 4 0 _uhttps://doi.org/10.1007/978-3-031-32906-7
912 _aZDB-2-SXSC
942 _cEBK
999 _c85740
_d85740