Zinelabdine Boulkenafet
Zinelabdine Boulkenafet
Centre for Machine Vision and Signal Analysis, University ofOulu, Finland
Verified email at ee.oulu.fi
Title
Cited by
Cited by
Year
Face spoofing detection using colour texture analysis
Z Boulkenafet, J Komulainen, A Hadid
IEEE Transactions on Information Forensics and Security 11 (8), 1818-1830, 2016
2362016
Face anti-spoofing based on color texture analysis
Z Boulkenafet, J Komulainen, A Hadid
2015 IEEE international conference on image processing (ICIP), 2636-2640, 2015
1632015
Oulu-npu: A mobile face presentation attack database with real-world variations
Z Boulkenafet, J Komulainen, L Li, X Feng, A Hadid
2017 12th IEEE International Conference on Automatic Face & Gesture …, 2017
1172017
An original face anti-spoofing approach using partial convolutional neural network
L Li, X Feng, Z Boulkenafet, Z Xia, M Li, A Hadid
2016 Sixth International Conference on Image Processing Theory, Tools and …, 2016
1112016
Face antispoofing using speeded-up robust features and fisher vector encoding
Z Boulkenafet, J Komulainen, A Hadid
IEEE Signal Processing Letters 24 (2), 141-145, 2016
932016
A competition on generalized software-based face presentation attack detection in mobile scenarios
Z Boulkenafet, J Komulainen, Z Akhtar, A Benlamoudi, D Samai, ...
2017 IEEE International Joint Conference on Biometrics (IJCB), 688-696, 2017
732017
The 2013 speaker recognition evaluation in mobile environment
E Khoury, B Vesnicer, J Franco-Pedroso, R Violato, Z Boulkcnafet, ...
2013 International Conference on Biometrics (ICB), 1-8, 2013
342013
Scale space texture analysis for face anti-spoofing
Z Boulkenafet, J Komulainen, X Feng, A Hadid
2016 International Conference on Biometrics (ICB), 1-6, 2016
242016
On the generalization of color texture-based face anti-spoofing
Z Boulkenafet, J Komulainen, A Hadid
Image and Vision Computing 77, 1-9, 2018
232018
Audiovisual synchrony assessment for replay attack detection in talking face biometrics
E Boutellaa, Z Boulkenafet, J Komulainen, A Hadid
Multimedia Tools and Applications 75 (9), 5329-5343, 2016
82016
Review of face presentation attack detection competitions
J Komulainen, Z Boulkenafet, Z Akhtar
Handbook of Biometric Anti-Spoofing, 291-317, 2019
62019
Face anti-spoofing in biometric systems
Z Boulkenafet, Z Akhtar, X Feng, A Hadid
Biometric security and privacy, 299-321, 2017
62017
An efficient FPGA implementation of Gaussian mixture models based classifier: Application to face recognition
M Neggazi, M Bengherabi, Z Boulkenafet, A Amira
2013 8th International Workshop on Systems, Signal Processing and their …, 2013
52013
Face verification using local binary patterns generic histogram adaptation and Chi-square based decision
E Boutellaa, M Bengherabi, Z Boulkenafet, F Harizi, A Hadid
European Workshop on Visual Information Processing (EUVIP), 142-147, 2013
42013
Using the conformal embedding analysis to compensate the channel effect in the i-vector based speaker verification system
Z Boulkenafet, M Bengherabi, O Nouali, M Cheriet
2013 International Conference of the BIOSIG Special Interest Group (BIOSIG), 1-8, 2013
32013
Forensic evidence reporting using GMM-UBM, JFA and I-vector methods: Application to Algerian Arabic dialect
Z Boulkenafet, M Bengherabi, F Harizi, O Nouali, C Mohamed
2013 8th International Symposium on Image and Signal Processing and Analysis …, 2013
32013
Face Verification Based on Gabor Region Covariance Matrices
Z Boulkenafet, E Boutellaa, M Bengherabi, A Hadid
Scandinavian Conference on Image Analysis, 480-491, 2015
12015
An Efficient FPGA Implementation of Gaussian Mixture Models Based Classifier: Face Recognition Application
M Neggazi, M Bengherabi, A Amira, Z Boulkenafet
Systems, Signal Processing and their Applications WoSSPA, 2013
12013
IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS, IJCB 2017
D Song, J Feng, H Muckenhirn, M Magimai-Doss, S Marcel, N Srinivas, ...
2018
Alphabetical list of authors
F Abdulsattar, V Ablinger, S Ait-Aoudia, S Alkassar, F Alonso-Fernandez, ...
1995
The system can't perform the operation now. Try again later.
Articles 1–20