2007 (v1)
Publication
No description
Uploaded on: April 14, 2023
F
Last name: FADDA G
No description
No description
No description
No description
No description
No description
No description
We faced the problem of detecting 2-D face spoofing attacks performed by placing a printed photo of a real user in front of the camera. For this type of attack it is not possible to relay just on the face movements as a clue of vitality because the attacker can easily simulate such a case, and also because real users often show a "low vitality"...