A competition on generalized software-based face presentation attack detection in mobile scenarios
In recent years, software-based face presentation attack detection (PAD) methods have
seen a great progress. However, most existing schemes are not able to generalize well in …
seen a great progress. However, most existing schemes are not able to generalize well in …
Face presentation attack detection across spectrum using time-frequency descriptors of maximal response in laplacian scale-space
Multi-spectral face recognition has been an active area of research over the past few
decades. However, the vulnerability of multi-spectral face recognition systems is a growing …
decades. However, the vulnerability of multi-spectral face recognition systems is a growing …
Data-fusion-based two-stage cascade framework for multimodality face anti-spoofing
Existing face anti-spoofing models using deep learning for multimodality data suffer from low
generalization in the case of using variety of presentation attacks, such as 2-D printing and …
generalization in the case of using variety of presentation attacks, such as 2-D printing and …
Face presentation attack detection using deep background subtraction
Currently, face recognition technology is the most widely used method for verifying an
individual's identity. Nevertheless, it has increased in popularity, raising concerns about face …
individual's identity. Nevertheless, it has increased in popularity, raising concerns about face …
Face presentation attack detection in mobile scenarios: A comprehensive evaluation
The vulnerability of face recognition systems to different presentation attacks has aroused
increasing concern in the biometric community. Face presentation detection (PAD) …
increasing concern in the biometric community. Face presentation detection (PAD) …
Face antispoofing based on frame difference and multilevel representation
Due to advances in technology, today's biometric systems become vulnerable to spoof
attacks made by fake faces. These attacks occur when an intruder attempts to fool an …
attacks made by fake faces. These attacks occur when an intruder attempts to fool an …
A database for face presentation attack using wax figure faces
Compared to 2D face presentation attacks (eg printed photos and video replays), 3D type
attacks are more challenging to face recognition systems (FRS) by presenting 3D …
attacks are more challenging to face recognition systems (FRS) by presenting 3D …
[PDF][PDF] Multi-modal and anti-spoofing person identification
A Benlamoudi - University of Kasdi Merbah, 2018 - researchgate.net
Because of its natural and non-intrusive interaction, identity verification and recognition
using facial information is among the most active areas in computer vision research …
using facial information is among the most active areas in computer vision research …
Spoofing and anti-spoofing with wax figure faces
We have witnessed rapid advances in both face presentation attack models and
presentation attack detection (PAD) in recent years. Compared to widely studied 2D face …
presentation attack detection (PAD) in recent years. Compared to widely studied 2D face …
[PDF][PDF] Face anti-spoofing combining mllbp and mlbsif
The Face recognition applications are the used way of authentication identity verification of
mobile payment. This popularity of face recognition is easy to raise concerns about face …
mobile payment. This popularity of face recognition is easy to raise concerns about face …