LEADER 05871nam 2200529 450 001 9910674347103321 005 20230522180700.0 010 $a981-19-5288-4 024 7 $a10.1007/978-981-19-5288-3 035 $a(MiAaPQ)EBC7207190 035 $a(Au-PeEL)EBL7207190 035 $a(CKB)26186249000041 035 $a(DE-He213)978-981-19-5288-3 035 $a(PPN)268205116 035 $a(EXLCZ)9926186249000041 100 $a20230522d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aHandbook of Biometric Anti-Spoofing $ePresentation Attack Detection and Vulnerability Assessment /$fSe?bastien Marcel, Julian Fierrez, and Nicholas Evans, editors 205 $aThird edition. 210 1$aSingapore :$cSpringer Nature Singapore Pte Ltd.,$d[2023] 210 4$d©2023 215 $a1 online resource (595 pages) 225 1 $aAdvances in Computer Vision and Pattern Recognition Series 311 08$aPrint version: Marcel, Sébastien Handbook of Biometric Anti-Spoofing Singapore : Springer,c2023 9789811952876 320 $aIncludes bibliographical references and index. 327 $aAn Introduction to Fingerprint Presentation Attack Detection -- A Study of Hand-Crafted and Naturally-Learned Features for Fingerprint Presentation Attack Detection -- Optical Coherence Tomography for Fingerprint Presentation Attack Detection -- Interoperability among Capture Devices for Fingerprint Presentation Attacks Detection -- Review of Fingerprint Presentation Attack Detection Competitions -- Introduction to Iris Presentation Attack Detection -- Application of Dynamic Features of the Pupil for Iris Presentation Attack Detection -- Review of Iris Presentation Attack Detection Competitions -- Introduction to Face Presentation Attack Detection -- Recent Advances in Face Presentation Attack Detection -- Recent Progress on Face Anti-Spoofing against 3D Mask Attack -- Challenges of Face Presentation Attack Detection in Real Scenarios -- Remote Blood Pulse Analysis for Face Presentation Attack Detection -- Review of Face Presentation Attack Detection Competitions -- Introduction to Voice Presentation Attack Detection and Recent Advances -- A Cross-Database Study of Voice Presentation Attack Detection -- Voice Presentation Attack Detection Using Convolutional Neural Networks -- An Introduction to Vein Presentation Attacks and Detection -- Presentation Attacks in Signature Biometrics: Types and Introduction to Attack Detection -- Evaluation Methodologies for Biometric Presentation Attack Detection -- A Legal Perspective on the Relevance of Biometric Presentation Attack Detection (PAD) for Payment Services Under PSDII and the GDPR -- Standards for Biometric Presentation Attack Detection. 330 $aThe third edition of this authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD) ? also known as Biometric Anti-Spoofing. Building on the success of the previous editions, this thoroughly updated third edition has been considerably revised to provide even greater coverage of PAD methods, spanning biometrics systems based on face, fingerprint, iris, voice, vein, and signature recognition. New material is also included on major PAD competitions, important databases for research, and on the impact of recent international legislation. Valuable insights are supplied by a selection of leading experts in the field, complete with results from reproducible research, supported by source code and further information available at an associated website. Topics and features: reviews the latest developments in PAD for fingerprint biometrics, covering recent technologies like Vision Transformers, and review of competition series; examines methods for PAD in iris recognition systems, the use of pupil size measurement or multiple spectra for this purpose; discusses advancements in PAD methods for face recognition-based biometrics, such as recent progress on detection of 3D facial masks and the use of multiple spectra with Deep Neural Networks; presents an analysis of PAD for automatic speaker recognition (ASV), including a study of the generalization to unseen attacks; describes the results yielded by key competitions on fingerprint liveness detection, iris liveness detection, and face anti-spoofing; provides analyses of PAD in finger-vein recognition, in signature biometrics, and in mobile biometrics; includes coverage of international standards in PAD and legal aspects of image manipulations like morphing.This text/reference is essential reading for anyone involved in biometric identity verification, be they students, researchers, practitioners, engineers, or technology consultants. Those new to the field will also benefit from a number of introductory chapters, outlining the basics for the most important biometrics. This text/reference is essential reading for anyone involved in biometric identity verification, be they students, researchers, practitioners, engineers, or technology consultants. Those new to the field will also benefit from a number of introductory chapters, outlining the basics for the most important biometrics. 410 0$aAdvances in computer vision and pattern recognition. 606 $aBiometric identification$xSecurity measures 606 $aComputer security 615 0$aBiometric identification$xSecurity measures. 615 0$aComputer security. 676 $a005.8 702 $aMarcel$b Se?bastien 702 $aFierrez$b Julian 702 $aEvans$b Nicholas 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910674347103321 996 $aHandbook of Biometric Anti-Spoofing$92025282 997 $aUNINA