作者: Zahid Akhtar , Christian Micheloni , Gian Luca Foresti
DOI: 10.1109/MSP.2015.116
关键词:
摘要: In a spoofing attack, an impostor masquerades as legitimate user by replicating that user's biometrics. Although methods exist to determine whether live person or biometric artifact is in front of sensor, attacks remain problem.