Presentation attack detection methods for face recognition systems: A comprehensive survey

R Ramachandra, C Busch - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
The vulnerability of face recognition systems to presentation attacks (also known as direct
attacks or spoof attacks) has received a great deal of interest from the biometric community …

A survey on methods and challenges in EEG based authentication

AJ Bidgoly, HJ Bidgoly, Z Arezoumand - Computers & Security, 2020 - Elsevier
EEG is the recording of electrical activities of the brain, usually along the scalp surface,
which are the results of synaptic activations of the brain's neurons. In recent years, it has …

Deepfakes and beyond: A survey of face manipulation and fake detection

R Tolosana, R Vera-Rodriguez, J Fierrez, A Morales… - Information …, 2020 - Elsevier
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …

Single-side domain generalization for face anti-spoofing

Y Jia, J Zhang, S Shan, X Chen - Proceedings of the IEEE …, 2020 - openaccess.thecvf.com
Existing domain generalization methods for face anti-spoofing endeavor to extract common
differentiation features to improve the generalization. However, due to large distribution …

Biometric face presentation attack detection with multi-channel convolutional neural network

A George, Z Mostaani, D Geissenbuhler… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Face recognition is a mainstream biometric authentication method. However, the
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …

Spoofing detection system for e-health digital twin using EfficientNet Convolution Neural Network

H Garg, B Sharma, S Shekhar, R Agarwal - Multimedia Tools and …, 2022 - Springer
Digital Twin is the mirror image of any living or non-living objects. Digital Twin and Cyber-
physical system (CPS) provides a new era for industries especially in the healthcare sector …

Secure face unlock: Spoof detection on smartphones

K Patel, H Han, AK Jain - IEEE transactions on information …, 2016 - ieeexplore.ieee.org
With the wide deployment of the face recognition systems in applications from deduplication
to mobile device unlocking, security against the face spoofing attacks requires increased …

Face spoof detection with image distortion analysis

D Wen, H Han, AK Jain - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Automatic face recognition is now widely used in applications ranging from deduplication of
identity to authentication of mobile payment. This popularity of face recognition has raised …

Deep pixel-wise binary supervision for face presentation attack detection

A George, S Marcel - 2019 international conference on …, 2019 - ieeexplore.ieee.org
Face recognition has evolved as a prominent biometric authentication modality. However,
vulnerability to presentation attacks curtails its reliable deployment. Automatic detection of …

Deep representations for iris, face, and fingerprint spoofing detection

D Menotti, G Chiachia, A Pinto… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Biometrics systems have significantly improved person identification and authentication,
playing an important role in personal, national, and global security. However, these systems …