Sébastien Marcel

According to our database1, Sébastien Marcel authored at least 150 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
A Cross-Database Study of Voice Presentation Attack Detection.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019

Remote Blood Pulse Analysis for Face Presentation Attack Detection.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019

Evaluation Methodologies for Biometric Presentation Attack Detection.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019

Recent Advances in Face Presentation Attack Detection.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019

An Introduction to Vein Presentation Attacks and Detection.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019

Heterogeneous Face Recognition Using Domain Specific Units.
IEEE Trans. Information Forensics and Security, 2019

Biometric Face Presentation Attack Detection with Multi-Channel Convolutional Neural Network.
CoRR, 2019

Domain Adaptation in Multi-Channel Autoencoder based Features for Robust Face Anti-Spoofing.
CoRR, 2019

Deep Pixel-wise Binary Supervision for Face Presentation Attack Detection.
CoRR, 2019

Enhancing Trust in eAssessment - the TeSLA System Solution.
CoRR, 2019

Custom silicone Face Masks: Vulnerability of Commercial Face Recognition Systems & Presentation Attack Detection.
Proceedings of the 7th International Workshop on Biometrics and Forensics, 2019

2018
Deeply vulnerable: a study of the robustness of face recognition to presentation attacks.
IET Biometrics, 2018

Biometrics: In Search of Identity and Security (Q & A).
IEEE MultiMedia, 2018

DeepFakes: a New Threat to Face Recognition? Assessment and Detection.
CoRR, 2018

Low-latency speaker spotting with online diarization and detection.
Proceedings of the Odyssey 2018: The Speaker and Language Recognition Workshop, 2018

Fast cross-correlation based wrist vein recognition algorithm with rotation and translation compensation.
Proceedings of the 2018 International Workshop on Biometrics and Forensics, 2018

Towards quantifying the entropy of fingervein patterns across different feature extractors.
Proceedings of the IEEE 4th International Conference on Identity, 2018

On the use of convolutional neural networks for speech presentation attack detection.
Proceedings of the IEEE 4th International Conference on Identity, 2018

On Learning Vocal Tract System Related Speaker Discriminative Information from Raw Signal Using CNNs.
Proceedings of the Interspeech 2018, 2018

On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-spoofing.
Proceedings of the 2018 International Conference on Biometrics, 2018

Towards Directly Modeling Raw Speech Signal for Speaker Verification Using CNNS.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Speaker Inconsistency Detection in Tampered Video.
Proceedings of the 26th European Signal Processing Conference, 2018

Pulse-based Features for Face Presentation Attack Detection.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018

Spoofing Deep Face Recognition with Custom Silicone Masks.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018

2017
Long-Term Spectral Statistics for Voice Presentation Attack Detection.
IEEE/ACM Trans. Audio, Speech & Language Processing, 2017

Impact of Score Fusion on Voice Biometrics and Presentation Attack Detection in Cross-Database Evaluations.
J. Sel. Topics Signal Processing, 2017

A Reproducible Study on Remote Heart Rate Measurement.
CoRR, 2017

BEAT: An Open-Source Web-Based Open-Science Platform.
CoRR, 2017

Bob Speaks Kaldi.
Proceedings of the Interspeech 2017, 2017

Cross-eyed 2017: Cross-spectral iris/periocular recognition competition.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

End-to-End convolutional neural network-based voice presentation attack detection.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017


Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017

On the Generalization of Fused Systems in Voice Presentation Attack Detection.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017

What You Can't See Can Help You - Extended-Range Imaging for 3D-Mask Presentation Attack Detection.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017

2016
Keystroke Biometrics Ongoing Competition.
IEEE Access, 2016

Face presentation attack detection across spectrum using time-frequency descriptors of maximal response in Laplacian scale-space.
Proceedings of the Sixth International Conference on Image Processing Theory, 2016

Cross-Database Evaluation of Audio-Based Spoofing Detection Systems.
Proceedings of the Interspeech 2016, 2016

Heterogeneous Face Recognition Using Inter-Session Variability Modelling.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016


Joint operation of voice biometrics and presentation attack detection.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

Presentation Attack Detection Using Long-Term Spectral Statistics for Trustworthy Speaker Verification.
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016

The Replay-Mobile Face Presentation-Attack Database.
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016

Face Recognition in Challenging Environments: An Experimental and Reproducible Research Survey.
Proceedings of the Face Recognition Across the Imaging Spectrum, 2016

Face Recognition Systems Under Spoofing Attacks.
Proceedings of the Face Recognition Across the Imaging Spectrum, 2016

2015
Anti-spoofing, Evaluation Methodologies.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Anti-spoofing, Face Databases.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Joint Speaker Verification and Antispoofing in the i-Vector Space.
IEEE Trans. Information Forensics and Security, 2015

Guest Editorial Special Issue on Biometric Spoofing and Countermeasures.
IEEE Trans. Information Forensics and Security, 2015

Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned.
IEEE Signal Process. Mag., 2015

Biometrics Security and Privacy Protection [From the Guest Editors].
IEEE Signal Process. Mag., 2015

Impact of eye detection error on face recognition performance.
IET Biometrics, 2015

Gender Classification by LUT Based Boosting of Overlapping Block Patterns.
Proceedings of the Image Analysis - 19th Scandinavian Conference, 2015

The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks.
Proceedings of the International Conference on Biometrics, 2015

On the vulnerability of palm vein recognition to spoofing attacks.
Proceedings of the International Conference on Biometrics, 2015

Finger vein liveness detection using motion magnification.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

Periocular biometrics in mobile environment.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

On the vulnerability of speaker verification to realistic voice spoofing.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

Palm Vein Database and Experimental Framework for Reproducible Research.
Proceedings of the BIOSIG 2015, 2015

2014
Introduction.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2014

Evaluation Methodologies.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2014

Face Anti-spoofing: Visual Approach.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2014

Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.
IEEE Trans. Image Processing, 2014

Spoofing Face Recognition With 3D Masks.
IEEE Trans. Information Forensics and Security, 2014

Biometrics Evaluation Under Spoofing Attacks.
IEEE Trans. Information Forensics and Security, 2014

Bi-modal biometric authentication on mobile phones in challenging conditions.
Image Vision Comput., 2014

Score calibration in face recognition.
IET Biometrics, 2014

Motion-based counter-measures to photo attacks in face recognition.
IET Biometrics, 2014

Face liveness detection using dynamic texture.
EURASIP J. Image and Video Processing, 2014

Biometric Antispoofing Methods: A Survey in Face Recognition.
IEEE Access, 2014

Swiss French Regional Accent Identification.
Proceedings of the Odyssey 2014: The Speaker and Language Recognition Workshop, 2014

Hierarchical speaker clustering methods for the NIST i-vector Challenge.
Proceedings of the Odyssey 2014: The Speaker and Language Recognition Workshop, 2014

Within- and cross- database evaluations for face gender classification via befit protocols.
Proceedings of the IEEE 16th International Workshop on Multimedia Signal Processing, 2014

Introducing i-vectors for joint anti-spoofing and speaker verification.
Proceedings of the INTERSPEECH 2014, 2014

Face Anti-spoofing Based on General Image Quality Assessment.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Audio-visual gender recognition in uncontrolled environment using variability modeling techniques.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Spear: An open source toolbox for speaker recognition based on Bob.
Proceedings of the IEEE International Conference on Acoustics, 2014

On the Vulnerability of Finger Vein Recognition to Spoofing.
Proceedings of the BIOSIG 2014, 2014

2013
Mobile Biometrics: Combined Face and Voice Verification for a Mobile Platform.
IEEE Pervasive Computing, 2013

A Scalable Formulation of Probabilistic Linear Discriminant Analysis: Applied to Face Recognition.
IEEE Trans. Pattern Anal. Mach. Intell., 2013

Session variability modelling for face authentication.
IET Biometrics, 2013

Alternative search techniques for face detection using location estimation and binary features.
Computer Vision and Image Understanding, 2013


Can face anti-spoofing countermeasures work in a real world scenario?
Proceedings of the International Conference on Biometrics, 2013

Complementary countermeasures for detecting scenic face spoofing attacks.
Proceedings of the International Conference on Biometrics, 2013




Anti-spoofing in Action: Joint Operation with a Verification System.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013

Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

Spoofing 2D Face Recognition Systems with 3D Masks.
Proceedings of the 2013 BIOSIG, 2013

2012
Cross-Pollination of Normalization Techniques From Speaker to Face Authentication Using Gaussian Mixture Models.
IEEE Trans. Information Forensics and Security, 2012

A Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers.
IEEE Trans. Information Forensics and Security, 2012

Bob: a free signal processing and machine learning toolbox for researchers.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Boosting localized binary features for speech recognition.
Proceedings of the 2012 Symposium on Machine Learning in Speech and Language Processing, 2012

Bi-modal authentication in mobile environments using session variability modelling.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

An Open Source Framework for Standardized Comparisons of Face Recognition Algorithms.
Proceedings of the Computer Vision - ECCV 2012. Workshops and Demonstrations, 2012

Face Verification using Gabor filtering and adapted Gaussian Mixture Models.
Proceedings of the 2012 BIOSIG, 2012

On the effectiveness of local binary patterns in face anti-spoofing.
Proceedings of the 2012 BIOSIG, 2012

LBP - TOP Based Countermeasure against Face Spoofing Attacks.
Proceedings of the Computer Vision - ACCV 2012 Workshops, 2012

2011
Introduction to the special issue on image and video retrieval: theory and applications.
Multimedia Tools Appl., 2011

Inter-session variability modelling and joint factor analysis for face authentication.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

Fast speaker verification on mobile phone data using boosted slice classifiers.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011



Counter-measures to photo attacks in face recognition: A public database and a baseline.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

Phoneme recognition using Boosted Binary Features.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
An Evaluation of Video-to-Video Face Verification.
IEEE Trans. Information Forensics and Security, 2010

Feature distribution modelling techniques for 3D face verification.
Pattern Recognition Letters, 2010

On the vulnerability of face verification systems to hill-climbing attacks.
Pattern Recognition, 2010

A novel statistical generative model dedicated to face recognition.
Image Vision Comput., 2010

Visual processing-inspired fern-audio features for noise-robust speaker verification.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Torchvision the machine-vision package of torch.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

Crossmodal Matching of Speakers Using Lip and Voice Features in Temporally Non-overlapping Audio and Video Streams.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Model and Score Adaptation for Biometric Systems: Coping With Device Interoperability and Changing Acquisition Conditions.
Proceedings of the 20th International Conference on Pattern Recognition, 2010


An alternative scanning strategy to detect faces.
Proceedings of the IEEE International Conference on Acoustics, 2010

Boosted binary features for noise-robust speaker verification.
Proceedings of the IEEE International Conference on Acoustics, 2010

Introducing crossmodal biometrics: Person identification from distinct audio & visual streams.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

A principled approach to remove false alarms by modelling the context of a face detector.
Proceedings of the British Machine Vision Conference, 2010

2009
A comparative study of two state-of-the-art sequence processing techniques for hand gesture recognition.
Computer Vision and Image Understanding, 2009


Parts-Based Face Verification Using Local Frequency Bands.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Bayesian Networks to Combine Intensity and Color Information in Face Recognition.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Media on the web, in post-production and broadcasting: the practitioner day of the ACM 2009 International Conference on Image and Video Retrieval.
Proceedings of the 8th ACM International Conference on Image and Video Retrieval, 2009

Haar Local Binary Pattern Feature for Fast Illumination Invariant Face Detection.
Proceedings of the British Machine Vision Conference, 2009

2007
Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation.
IEEE Trans. Pattern Anal. Mach. Intell., 2007

Face Authentication with Salient Local Features and Static Bayesian Network.
Proceedings of the Advances in Biometrics, International Conference, 2007

2006

Performance Characterisation of Face Recognition Algorithms and Their Sensitivity to Severe Illumination Changes.
Proceedings of the Advances in Biometrics, International Conference, 2006

Hand Posture Classification and Recognition using the Modified Census Transform.
Proceedings of the Seventh IEEE International Conference on Automatic Face and Gesture Recognition (FGR 2006), 2006

Local Binary Patterns as an Image Preprocessing for Face Authentication.
Proceedings of the Seventh IEEE International Conference on Automatic Face and Gesture Recognition (FGR 2006), 2006

Face Authentication Using Adapted Local Binary Pattern Histograms.
Proceedings of the Computer Vision, 2006

2004
On Performance Evaluation of Face Detection and Localization Algorithms.
Proceedings of the 17th International Conference on Pattern Recognition, 2004


Face Authentication Competition on the BANCA Database.
Proceedings of the Biometric Authentication, First International Conference, 2004

A Symmetric Transformation for LDA-based Face Verification.
Proceedings of the Sixth IEEE International Conference on Automatic Face and Gesture Recognition (FGR 2004), 2004

Recognition of Isolated Complex Mono- and Bi-Manual 3D Hand Gestures.
Proceedings of the Sixth IEEE International Conference on Automatic Face and Gesture Recognition (FGR 2004), 2004

Biometric Face Authentication Using Pixel-Based Weak Classifiers.
Proceedings of the Biometric Authentication, 2004

HMM and IOHMM for the Recognition of Mono- and Bi-Manual 3D Hand Gestures.
Proceedings of the British Machine Vision Conference, 2004

2003
Speech & face based biometric authentication at IDIAP.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

Improving face authentication using virtual samples.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003


Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS.
Proceedings of the Audio-and Video-Based Biometrie Person Authentication, 2003

2002
Confidence measures for multimodal identity verification.
Information Fusion, 2002

Improving Face Verification Using Skin Color Information.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

2000
Hand Gesture Recognition Using Input-Output Hidden Markov Models.
Proceedings of the 4th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2000), 2000

1999
Hand Posture Recognition in a Body-Face Centered Space.
Proceedings of the Gesture-Based Communication in Human-Computer Interaction, 1999

Hand posture recognition in a body-face centered space.
Proceedings of the CHI '99 Extended Abstracts on Human Factors in Computing Systems, 1999


  Loading...