Home
Featured Publications
Publications
Awards
Contact
Light
Dark
Automatic
Face Recognition
Leveraging Shape, Reflectance and Albedo From Shading for Face Presentation Attack Detection
Presentation attack detection is a challenging problem that aims at exposing an impostor user seeking to deceive the authentication …
A. Pinto
,
S. Goldenstein
,
A. Ferreira
,
T. Carvalho
,
H. Pedrini
,
A. Rocha
PDF
Cite
DOI
The Rise of Data-Driven Models in Presentation Attack Detection
Biometric systems are prevalent in access control but are vulnerable to frauds. A typical attempt of violating them is through …
Luis A. M. Pereira
,
Allan Pinto.
,
Fernanda A. Andaló
,
Alexandre M. Ferreira
,
Bahram Lavi
,
Aurea Soriano-Vargas
,
Marcos V. M. Cirne
,
Anderson Rocha
PDF
Cite
DOI
Analysis of intrinsic and extrinsic properties of biometric samples for presentation attack detection
Recent advances in biometrics, information forensics, and security have improved the recognition effectiveness of biometric systems. …
Allan Pinto.
PDF
Cite
Deep Learning in Biometrics
This chapter explores data-driven approaches to presentation attack detection for three biometric modalities: face, iris, and …
Allan Pinto.
,
Helio Pedrini
,
Michael Krumdick
,
Benedict Becker
,
Adam Czajka
,
Kevin W. Bowyer
,
Anderson Rocha
PDF
Cite
Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes
Despite important recent advances, the vulnerability of biometric systems to spoofing attacks is still an open problem. Spoof attacks …
A. Pinto
,
H. Pedrini
,
W. Robson Schwartz
,
A. Rocha
PDF
Cite
DOI
Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks
Spoofing attacks or impersonation can be easily accomplished in a facial biometric system wherein users without access privileges …
A. Pinto
,
W. Robson Schwartz
,
H. Pedrini
,
A. de Rezende Rocha
PDF
Cite
DOI
Deep Representations for Iris, Face, and Fingerprint Spoofing Detection
Biometrics systems have significantly improved person identification and authentication, playing an important role in personal, …
D. Menotti
,
G. Chiachia
,
A. Pinto
,
W. Robson Schwartz
,
H. Pedrini
,
A. Xavier Falcao
,
A. Rocha
PDF
Cite
DOI
A countermeasure method for video-based face spoofing attacks
Allan Pinto.
PDF
Cite
The 2nd competition on counter measures to 2D face spoofing attacks
As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, has achieved great progress in the …
I. Chingovska
,
A. Pinto
,
H. Pedrini
,
W. S. Schwartz
,
A. Rocha
,
A. Anjos
PDF
Cite
DOI
Video-Based Face Spoofing Detection through Visual Rhythm Analysis
Recent advances on biometrics, information forensics, and security have improved the accuracy of biometric systems, mainly those based …
A. da Silva Pinto
,
H. Pedrini
,
W. Schwartz
,
A. Rocha
PDF
Cite
DOI
Cite
×