Skip to main content

Introduction

  • Chapter
  • First Online:

Part of the book series: Advances in Computer Vision and Pattern Recognition ((ACVPR))

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lyons M (1994) Napoleon Bonaparte and the legacy of the French Revolution. Macmillan, London

    Google Scholar 

  2. UNFPA (2011) State of world population 2011–people and possibilities in a world of 7 billion. UN Report. http://www.unfpa.org/public/home/publications/pid/8726

  3. UNWTO (2014) International tourism exceeds expectations with arrivals up by 52 million in 2013. Press Release 14004. http://media.unwto.org/press-release/2014-01-20/international-tourism-exceeds-expectations-arrivals-52-million-2013

  4. Paullin CO, Wright JK (1932) Atlas of the historical geography of the united states. Carnegie Institution of Washington, Washington

    Google Scholar 

  5. Herley C (2009) So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Workshop on new security paradigms workshop, ACM pp 133–144

    Google Scholar 

  6. Information security survey (2003). In: Infosecurity Europe

    Google Scholar 

  7. Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. Audio-and video-based biometric person authentication. Springer, Berlin

    Google Scholar 

  8. Jain AK, Ross AA (2011) Security of biometric systems. Introduction to biometrics. Springer, Berlin, pp 259–306

    Google Scholar 

  9. Matsumoto T, Matsumoto H, Yamada K, Hoshino S (2002) Impact of artificial gummy fingers on fingerprint systems. In: Electronic imaging 2002, international society for optics and photonics, pp 275–289

    Google Scholar 

  10. Duc NM, Minh BQ (2009) Your face is not your password face authentication bypassing lenovo-asus-toshiba. Black Hat Briefings

    Google Scholar 

  11. Doctor ’used silicone fingers’ to sign in for colleagues. www.bbc.com/news/world-latin-america-21756709. Accessed 09 Apr 2014

  12. Yen portraits fool age-verification cameras. http://pinktentacle.com/2008/07/yen-portraits-fool-age-verification-cameras/. Accessed 09 Apr 2014

  13. Woman fools japan’s airport security fingerprint system. www.smh.com.au/travel/woman-fools-japans-airport-security-fingerprint-system-20090102-78rv.html. Accessed 09 Apr 2014

  14. V-series sensors. www.lumidigm.com. Accessed 17 Apr 2014

  15. Huang X, Ti C, zhen Hou Q, Tokuta A, Yang R (2013) An experimental study of pupil constriction for liveness detection. In: IEEE workshop on applications of computer vision (WACV), pp 252–258. doi:10.1109/WACV.2013.6475026

  16. Rattani A, Poh N, Ross A (2013) A bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification. In: International workshop on information forensics and security (WIFS), IEEE. pp 37–42

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank the TABULA RASA (http://www.tabularasa-euproject.org) and BEAT projects (http://www.beat-eu.org) funded under the 7th Framework Programme of the European Union (EU) (grant agreement numbers 257289 and 284989) and the Swiss Center for Biometrics Research and Testing (http://www.biometrics-center.ch) for their support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nesli Erdoğmuş .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag London

About this chapter

Cite this chapter

Erdoğmuş, N., Marcel, S. (2014). Introduction. In: Marcel, S., Nixon, M., Li, S. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, London. https://doi.org/10.1007/978-1-4471-6524-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6524-8_1

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6523-1

  • Online ISBN: 978-1-4471-6524-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics