A competition on generalized software-based face presentation attack detection in mobile scenarios

Z Boulkenafet, J Komulainen, Z Akhtar… - … joint conference on …, 2017 - ieeexplore.ieee.org
In recent years, software-based face presentation attack detection (PAD) methods have
seen a great progress. However, most existing schemes are not able to generalize well in …

Face presentation attack detection across spectrum using time-frequency descriptors of maximal response in laplacian scale-space

R Raghavendra, KB Raja, S Marcel… - 2016 Sixth International …, 2016 - ieeexplore.ieee.org
Multi-spectral face recognition has been an active area of research over the past few
decades. However, the vulnerability of multi-spectral face recognition systems is a growing …

Data-fusion-based two-stage cascade framework for multimodality face anti-spoofing

W Liu, X Wei, T Lei, X Wang, H Meng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Existing face anti-spoofing models using deep learning for multimodality data suffer from low
generalization in the case of using variety of presentation attacks, such as 2-D printing and …

Face presentation attack detection using deep background subtraction

A Benlamoudi, SE Bekhouche, M Korichi, K Bensid… - Sensors, 2022 - mdpi.com
Currently, face recognition technology is the most widely used method for verifying an
individual's identity. Nevertheless, it has increased in popularity, raising concerns about face …

Face presentation attack detection in mobile scenarios: A comprehensive evaluation

S Jia, G Guo, Z Xu, Q Wang - Image and Vision Computing, 2020 - Elsevier
The vulnerability of face recognition systems to different presentation attacks has aroused
increasing concern in the biometric community. Face presentation detection (PAD) …

Face antispoofing based on frame difference and multilevel representation

A Benlamoudi, KE Aiadi, A Ouafi… - Journal of …, 2017 - spiedigitallibrary.org
Due to advances in technology, today's biometric systems become vulnerable to spoof
attacks made by fake faces. These attacks occur when an intruder attempts to fool an …

A database for face presentation attack using wax figure faces

S Jia, C Hu, G Guo, Z Xu - … Conference on Image Analysis and Processing, 2019 - Springer
Compared to 2D face presentation attacks (eg printed photos and video replays), 3D type
attacks are more challenging to face recognition systems (FRS) by presenting 3D …

[PDF][PDF] Multi-modal and anti-spoofing person identification

A Benlamoudi - University of Kasdi Merbah, 2018 - researchgate.net
Because of its natural and non-intrusive interaction, identity verification and recognition
using facial information is among the most active areas in computer vision research …

Spoofing and anti-spoofing with wax figure faces

S Jia, X Li, C Hu, Z Xu - arXiv preprint arXiv:1910.05457, 2019 - arxiv.org
We have witnessed rapid advances in both face presentation attack models and
presentation attack detection (PAD) in recent years. Compared to widely studied 2D face …

[PDF][PDF] Face anti-spoofing combining mllbp and mlbsif

A Benlamoudi, F Bougourzi, M Zighem… - Proceedings of the …, 2017 - salah.bekhouche.com
The Face recognition applications are the used way of authentication identity verification of
mobile payment. This popularity of face recognition is easy to raise concerns about face …