Presentation attack detection methods for face recognition systems: A comprehensive survey

R Ramachandra, C Busch - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
The vulnerability of face recognition systems to presentation attacks (also known as direct
attacks or spoof attacks) has received a great deal of interest from the biometric community …

Attacks and defenses in user authentication systems: A survey

X Wang, Z Yan, R Zhang, P Zhang - Journal of Network and Computer …, 2021 - Elsevier
User authentication systems (in short authentication systems) have wide utilization in our
daily life. Unfortunately, existing authentication systems are prone to various attacks while …

Face spoofing detection using colour texture analysis

Z Boulkenafet, J Komulainen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Research on non-intrusive software-based face spoofing detection schemes has been
mainly focused on the analysis of the luminance information of the face images, hence …

Secure face unlock: Spoof detection on smartphones

K Patel, H Han, AK Jain - IEEE transactions on information …, 2016 - ieeexplore.ieee.org
With the wide deployment of the face recognition systems in applications from deduplication
to mobile device unlocking, security against the face spoofing attacks requires increased …

Face spoof detection with image distortion analysis

D Wen, H Han, AK Jain - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Automatic face recognition is now widely used in applications ranging from deduplication of
identity to authentication of mobile payment. This popularity of face recognition has raised …

Biometrics: Trust, but verify

AK Jain, D Deb, JJ Engelsma - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

Unsupervised domain adaptation for face anti-spoofing

H Li, W Li, H Cao, S Wang, F Huang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Face anti-spoofing (aka presentation attack detection) has recently emerged as an active
topic with great significance for both academia and industry due to the rapidly increasing …

A face antispoofing database with diverse attacks

Z Zhang, J Yan, S Liu, Z Lei, D Yi… - 2012 5th IAPR …, 2012 - ieeexplore.ieee.org
Face antispoofing has now attracted intensive attention, aiming to assure the reliability of
face biometrics. We notice that currently most of face antispoofing databases focus on data …

Attention-based two-stream convolutional networks for face spoofing detection

H Chen, G Hu, Z Lei, Y Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Since the human face preserves the richest information for recognizing individuals, face
recognition has been widely investigated and achieved great success in various …