ГОСТ Р 58624.3—2019
Библиография
[1]
Н.М. Костылев, А.В. Гэревой «Модуль обнаружения витальностилица по спектральнымхарактеристи
кам отражения кожи человека». Инженерныйжурнал: «Наука и инновации», 2013, вып. 9.
http://engjournal
.
ru/catalog/pribor/optica/925.html
[2]
И.А. Калиновский, Г.М. Лаврентьева «Обнаружение спуфинг-атакна системулицевой биометрии». Com
puter Vision, 2018, с. 204
—
207,
http://www.graphicon.ru/html/2018/papers/204-207.pdf
[3] Marcialis G.L., LewickeA., Tan В., Coli P., Grimberg D., CongiuA. First International Fingerprint Liveness Detection
Competition — LivDet 2009,
http://www.clarkson.edu/biosal/pdf/first.pdf
[4] Line M., OtsukaA., Imai H. Wolf attack probability: a new security measure in biometric authentication systems. In:
Advances in Biometrics, 2007, pp. 396—406
[5] Barral C., & Tria A. Fake fingers in fingerprint recognition: glycerin supersedes gelatin. In: Formal to Practical Se
curity, Vol. 5458, Springer Berlin, Heidelberg, 2009, pp. 57—69
[6] Lefohn A., Budge B., Shirley P., Caruso R., Reinhard E. An ocularist’s approach to human iris synthesis. IEEE
Comput. Graph. Appl. 2003, pp. 70—75
[7]
http://findbiometrics.com/million-dollar-border-security-machines-fooled-with-ten-cent-tape/
[8] Matsumoto T, Matsumoto H., Yamada K., Yoshino S. Impact of Artificial «Gummy» Fingers on Fingerprint Systems,
Proc. Of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, Vol. 4677, January 2002, pp. 275—289
[9] Cappelli R., Maio D., Maltoni D., Erol A. «Synthetic fingerprint-image generation», 15th International Conference
on Pattern Recognition, Vol. 3, pp. 471—474, 2000
[10] Bunnell H.T., Pennington C., Yarrington D., Gray J. «Automatic personal synthetic voice construction», Ninth Euro
pean Conference on Speech Communication and Technology, 2005
[11]AdlerA. «Can Images be Regenerated from Biometric Templates?», Biometrics Conference, Vol. 1, Sept. 22—24,
2003
[12] Saintourens M., Tramus M.H., Huitric H., Nahas M. «Creation of a synthetic face speaking in real time with a syn
thetic voice», The ESCA Workshop on Speech Synthesis, 1991
[13] Makthal S., & Ross A. «Synthesis of iris images using Markov random fields», Proc. 13th European Signal Pro
cessing Conf, 2005
[14]ZwieseleA., MundeA., Busch C., Daum H. Comparative Study of Biometric Identification Systems, in: 34th Annual
2000 IEEE International Carnahan Conference on Security Technology, Ottawa, pp. 60—63, ( 2000)
[15] Pacut A., & Czajka A. «Aliveness detection for iris biometrics», 2006 IEEE International Carnahan Conference on
Security Technology, 40th Annual Conference, October 17-19, Lexington, Kentucky, IEEE 2006
[16]Thalheim L., Krissler J., Ziegler P.-M. «Body Check Biometric Access Protection Devices and their Programs Put to
the Test»,
http://www.cse.chalmers.se/edu/
course/EDA263/oh10/L03_DL2_Biometric%20access%20protec-
tion%20devices.pdf
[17]Fingerprint Spoof Detection Protection Profile (FSDPP) v1.8
[18]Fingerprint Spoof Detection Evaluation Guidance, Version 2.1, 2009-12-18
[19]Stein C., Bouatou V., Busch C. «Video-based Fingerphoto Recognition with Anti-spoofing Techniques with Smart
phone Cameras», in Proceedings of the IEEE 12th International Conference of the Biometrics Special Interest
Group (BIOSIG), Darmstadt, September 5-6, (2013), available online at
http://www.christoph-busch.de/files/
Stein-VideoFingerphoto-BIOSIG-2013.pdf
27