Presentation attack detection methods for face recognition systems: A comprehensive survey
R Ramachandra, C Busch - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
The vulnerability of face recognition systems to presentation attacks (also known as direct
attacks or spoof attacks) has received a great deal of interest from the biometric community …
attacks or spoof attacks) has received a great deal of interest from the biometric community …
A comprehensive overview of biometric fusion
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …
fingerprints only) is often stymied by various factors such as poor data quality or limited …
UrbanLF: A comprehensive light field dataset for semantic segmentation of urban scenes
As one of the fundamental technologies for scene understanding, semantic segmentation
has been widely explored in the last few years. Light field cameras encode the geometric …
has been widely explored in the last few years. Light field cameras encode the geometric …
Deep learning for face anti-spoofing: A survey
Face anti-spoofing (FAS) has lately attracted increasing attention due to its vital role in
securing face recognition systems from presentation attacks (PAs). As more and more …
securing face recognition systems from presentation attacks (PAs). As more and more …
Biometric face presentation attack detection with multi-channel convolutional neural network
A George, Z Mostaani, D Geissenbuhler… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Face recognition is a mainstream biometric authentication method. However, the
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …
Toward understanding and boosting adversarial transferability from a distribution perspective
Transferable adversarial attacks against Deep neural networks (DNNs) have received broad
attention in recent years. An adversarial example can be crafted by a surrogate model and …
attention in recent years. An adversarial example can be crafted by a surrogate model and …
A review on automatic facial expression recognition systems assisted by multimodal sensor data
Facial Expression Recognition (FER) can be widely applied to various research areas, such
as mental diseases diagnosis and human social/physiological interaction detection. With the …
as mental diseases diagnosis and human social/physiological interaction detection. With the …
Casia-surf: A large-scale multi-modal benchmark for face anti-spoofing
Face anti-spoofing is essential to prevent face recognition systems from a security breach.
Much of the progresses have been made by the availability of face anti-spoofing benchmark …
Much of the progresses have been made by the availability of face anti-spoofing benchmark …
Comprehensive survey: Biometric user authentication application, evaluation, and discussion
R Alrawili, AAS AlQahtani, MK Khan - Computers and Electrical …, 2024 - Elsevier
In this paper, we present a comprehensive review of the literature on biometric user
authentication, encompassing an analysis of key aspects such as the selection of biometric …
authentication, encompassing an analysis of key aspects such as the selection of biometric …
Light field saliency detection with deep convolutional networks
Light field imaging presents an attractive alternative to RGB imaging because of the
recording of the direction of the incoming light. The detection of salient regions in a light field …
recording of the direction of the incoming light. The detection of salient regions in a light field …