• 20 Apr, 2017Camera Fingerprint Clustering — Summarization Each digital image contains a unique intrinsic trace left by the camera through the image acquisition process, the so-called camera fingerprint. Such camera fingerprint uniquely identifies the acquisition camera and can be exploited for multiple forensic purposes. Up-to-date technologies... Read more...

  • 20 Apr, 2017Face spoofing detection — Summarization Face recognition is one of the most commonly used techniques in applications of biometrics, e.g. access control, law enforcement, multimedia communication, human-computer interaction. Like other biometric modalities, however, a face recognition system can be attacked easily and at very... Read more...