[1].鄭文昌,“低成本之3D人臉辨識系統”,資訊科技國際研討會暨第二屆網路智能與應用研討會論
文集, 2012年
[2].吳明芳, et al. "多人臉影像視覺辨識技術." Journal of Kun Shan University 8
(2011): 75-95.
[3].彭國達,”一種以特徵點為基礎的新穎性人臉辨識技術”,中華大學資訊工程學系研究所,2012年
[4].李武军,王崇骏,张 炜,陈世福, “人脸识别研究综述”, 模式识别与人工智能, 第 19 卷, 第
1 期, 2006 年 2 月
[5].林苑卿,”人臉辨識大躍進科技巨擘搶卡位刷臉商機上千億”,財訊雙周刊,第487期,2015年
[6].林宗勳, “Support Vector Machines 簡介”
[7].薛傑仁, “生物辨識之人臉辨識的方式”, 亞洲大學生物與醫學資訊系碩士論文, 2010年7月[8].黄非非, and 李见为. 基于 LBP 的人脸识别研究 [D]. Diss. 重庆: 重庆大学, 2009.
[9].S. Bharadwaj, T. I. Dhamecha, M. Vatsa, and R. Singh, “Computationally
efficient face spoofing detection with motion magnification,” in Proc.
CVPR Workshops, 2013, pp. 105–110.
[10].G. Pan, L. Sun, Z. Wu, and S. Lao, “Eyeblink-based anti-spoofing in face
recognition from a generic webcamera,” in Proc. ICCV, 2007, pp. 1–8.
[11].S. Tirunagari, N. Poh, D. Windridge, A. Iorliam, N. Suki, and A. Ho,
“Detection of face spoofing using visual dynamics,” IEEE Trans. Inf.
Forensics Security, vol. 10, no. 4, pp. 762–777, Apr. 2015.
[12].W. Bao, H. Li, N. Li, and W. Jiang, “A liveness detection method for face
recognition based on optical flow field,” in Proc. IASP, 2009, pp. 233–
236.
[13].J. M¨a¨atta, A. Hadid, and M. Pietik¨ainen, “Face spoofing detection from
single images using micro-texture analysis,” in Proc. IJCB, 2011, pp. 1–7.
[14].Chingovska, A. Anjos, and S. Marcel, “On the effectiveness of local
binary patterns in face anti-spoofing,” in Proc. IEEE BIOSIG, 2012, pp. 1–
7.
[15].J. Li, Y. Wang, T. Tan, and A. K. Jain, “Live face detection based on the
analysis of fourier spectra,” in Proc. SPIE: Biometric Technology for
Human Identification, 2004, pp. 296–303.
[16].J. Yang, Z. Lei, S. Liao, and S. Li, “Face liveness detection with
component dependent descriptor,” in Proc. ICB, 2013, pp. 1–6.
[17].Mohan, K., P. Chandrasekhar, and S. A. K. Jilani. "Object Face Liveness
Detection with Combined HOGlocal Phase Quantization using Fuzzy based SVM
Classifier." Indian Journal of Science and Technology 10.3 (2017).
[18].Wen, Di, Hu Han, and Anil K. Jain. "Face spoof detection with image
distortion analysis." IEEE Transactions on Information Forensics and
Security 10.4 (2015): 746-761.
[19].Patel, Keyurkumar, Hu Han, and Anil K. Jain. "Secure face unlock: Spoof
detection on smartphones." IEEE Transactions on Information Forensics and
Security 11.10 (2016): 2268-2283.
[20].Hadid, A., "Face biometrics under spoofing attacks: Vulnerabilities,
countermeasures, open issues, and research directions" Proceedings of the
IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp.
113-118, 2014.
[21]. Benlamoudi, A., Samai, D., Ouafi, A., Bekhouche, S. E., Taleb-Ahmed, A.,
& Hadid, A., "Face spoofing detection using Local binary patterns and
Fisher Score", Control, Engineering & Information Technology (CEIT), 2015
3rd International Conference on IEEE. pp. 1-5, 2015.
[22].Peixoto, B., Michelassi, C., & Rocha, A., "Face liveness detection under
bad illumination conditions", Image Processing (ICIP), 2011 18th IEEE
International Conference on. IEEE. pp. 3557-3560, 2011.
[23].Komulainen, J., Hadid, A., Pietikäinen, M., Anjos, A., & Marcel, S.,
"Complementary countermeasures for detecting scenic face spoofing
attacks", Biometrics (ICB), 2013 International Conference on. IEEE. pp.
1-7, 2013.
[24].Schwartz, W. R., Rocha, A., & Pedrini, H., "Face spoofing detection
through partial least squares and low-level descriptors", Biometrics
(IJCB), 2011 International Joint Conference on. IEEE. pp. 1-8, 2011
[25].da Silva Pinto, A., Pedrini, H., Schwartz, W., & Rocha, A., "Video-based
face spoofing detection through visual rhythm analysis", Graphics,
Patterns and Images (SIBGRAPI), 2012 25th SIBGRAPI Conference on. IEEE.
pp. 221-228, 2012
[26].De Marsico, M., Nappi, M., Riccio, D., & Dugelay, J. L., "Moving face
spoofing detection via 3D projective invariants", Biometrics (ICB), 2012
5th IAPR International Conference on. IEEE. pp. 73-78, 2012
[27].Tanaka, M. "Face parts detection." Internet:
http://www.mathworks.com/matlabcentral/fileexchange/36855-faceparts-
detection 13, 2014.
[28].Ojala, T., Pietikainen, M., & Maenpaa, T., "Multiresolution gray-scale
and rotation invariant texture classification with local binary patterns",
IEEE Transactions on pattern analysis and machine intelligence, 24(7), pp.
971-987, 2002.
[29].Ojala, T., Pietikäinen, M., & Harwood, D., "A comparative study of
texture measures with classification based on featured distributions",
Pattern recognition, 29(1), pp. 51-59, 1996.
[30].Cortes, C., & Vapnik, V., "Support-vector networks", Machine learning,
20(3), PP. 273-297, 1995.
[31].Viola, P., & Jones, M., "Rapid object detection using a boosted cascade
of simple features", Computer Vision and Pattern Recognition, 2001. CVPR
2001. Proceedings of the 2001 IEEE Computer Society Conference on. IEEE.
Vol. 1, pp. I-I, 2001.
[32].Kearns, M., "Thoughts on hypothesis boosting", Unpublished manuscript,
45, 105, 1988.
[33].支持向量機器 (Support Vector Machine):
https://cg2010studio.com/2012/05/20/%E6%94%AF%E6%8C%81%E5%90%91%E9%87%8F%E6%A9%9F%E5%99%A8-support-vector-machin
[34].維基百科編者,辨識系統:https://zh.wikipedia.org/w/index.php?
title=%E8%BE%A8%E8%AD%98%E7%B3%BB%E7%B5%B1&oldid=38955466.
[35].NEC, 人臉辨識系統解決方案:
http://tw.nec.com/zh_TW/solutions/security/neoface.html
[36].Double TECH,”認識生物辨識”: http://www.doubletech.tw/new_page_5.htm
[37].卓怡君, 《小檔案》人臉辨識:
http://news.ltn.com.tw/news/business/paper/870223
[38].壹讀, LBP紋理特徵: https://read01.com/GPjLmO.html
[39].目標偵測的圖像特徵提取之(二)LBP特徵: http://alex-
phd.blogspot.tw/2014/03/lbp.html?view=snapshot
[40].Viola-Jones人臉檢測https://read01.com/m0Na4g.html
[41].Haar分類器原理2——AdaBoost級聯分類器
https://read01.com/ggAE7B.html