000 | 03829nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-031-32906-7 | ||
003 | DE-He213 | ||
005 | 20240730164515.0 | ||
007 | cr nn 008mamaa | ||
008 | 230706s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031329067 _9978-3-031-32906-7 |
||
024 | 7 |
_a10.1007/978-3-031-32906-7 _2doi |
|
050 | 4 | _aTA1634 | |
072 | 7 |
_aUYQV _2bicssc |
|
072 | 7 |
_aCOM016000 _2bisacsh |
|
072 | 7 |
_aUYQV _2thema |
|
082 | 0 | 4 |
_a006.37 _223 |
100 | 1 |
_aWan, Jun. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _984884 |
|
245 | 1 | 0 |
_aAdvances in Face Presentation Attack Detection _h[electronic resource] / _cby Jun Wan, Guodong Guo, Sergio Escalera, Hugo Jair Escalante, Stan Z. Li. |
250 | _a2nd ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aVIII, 111 p. 52 illus., 48 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Computer Vision, _x2153-1064 |
|
505 | 0 | _aIntroduction -- Face Presentation Attack Detection (PAD) Challenges -- Winners' Methods -- Challenge Performances -- Conclusions and Future Works. | |
520 | _aThis book revises and expands upon the prior edition of Multi-Modal Face Presentation Attack Detection. The authors begin with fundamental and foundational information on face spoofing attack detection, explaining why the computer vision community has intensively studied it for the last decade. The authors also discuss the reasons that cause face anti-spoofing to be essential for preventing security breaches in face recognition systems. In addition, the book describes the factors that make it difficult to design effective methods of face presentation attack detection challenges. The book presents a thorough review and evaluation of current techniques and identifies those that have achieved the highest level of performance in a series of ChaLearn face anti-spoofing challenges at CVPR and ICCV. The authors also highlight directions for future research in face anti-spoofing that would lead to progress in the field. Additional analysis, new methodologies, and a more comprehensive survey of solutions are included in this new edition. | ||
650 | 0 |
_aComputer vision. _984885 |
|
650 | 0 |
_aBiometric identification. _911407 |
|
650 | 0 |
_aPattern recognition systems. _93953 |
|
650 | 0 |
_aImage processing _xDigital techniques. _94145 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aComputer Vision. _984888 |
650 | 2 | 4 |
_aBiometrics. _932763 |
650 | 2 | 4 |
_aAutomated Pattern Recognition. _931568 |
650 | 2 | 4 |
_aComputer Imaging, Vision, Pattern Recognition and Graphics. _931569 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aGuo, Guodong. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _984893 |
|
700 | 1 |
_aEscalera, Sergio. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _984896 |
|
700 | 1 |
_aEscalante, Hugo Jair. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _984897 |
|
700 | 1 |
_aLi, Stan Z. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _984898 |
|
710 | 2 |
_aSpringerLink (Online service) _984901 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031329050 |
776 | 0 | 8 |
_iPrinted edition: _z9783031329074 |
776 | 0 | 8 |
_iPrinted edition: _z9783031329081 |
830 | 0 |
_aSynthesis Lectures on Computer Vision, _x2153-1064 _984902 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-32906-7 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c85740 _d85740 |