Searching central difference convolutional networks for face anti-spoofing
Face anti-spoofing (FAS) plays a vital role in face recognition systems. Most state-of-the-art
FAS methods 1) rely on stacked convolutions and expert-designed network, which is weak …
FAS methods 1) rely on stacked convolutions and expert-designed network, which is weak …
NAS-FAS: Static-dynamic central difference network search for face anti-spoofing
Face anti-spoofing (FAS) plays a vital role in securing face recognition systems. Existing
methods heavily rely on the expert-designed networks, which may lead to a sub-optimal …
methods heavily rely on the expert-designed networks, which may lead to a sub-optimal …
Face anti-spoofing with human material perception
Face anti-spoofing (FAS) plays a vital role in securing the face recognition systems from
presentation attacks. Most existing FAS methods capture various cues (eg, texture, depth …
presentation attacks. Most existing FAS methods capture various cues (eg, texture, depth …
The fall of one, the rise of many: a survey on multi-biometric fusion methods
LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
Biometric antispoofing methods: A survey in face recognition
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …
pioneering works in face and voice recognition to the current state of development wherein a …
Context based face anti-spoofing
The face recognition community has finally started paying more attention to the long-
neglected problem of spoofing attacks and the number of countermeasures is gradually …
neglected problem of spoofing attacks and the number of countermeasures is gradually …
Can face anti-spoofing countermeasures work in a real world scenario?
User authentication is an important step to protect information and in this field face
biometrics is advantageous. Face biometrics is natural, easy to use and less human …
biometrics is advantageous. Face biometrics is natural, easy to use and less human …
Computationally efficient face spoofing detection with motion magnification
For a robust face biometric system, a reliable antispoofing approach must be deployed to
circumvent the print and replay attacks. Several techniques have been proposed to counter …
circumvent the print and replay attacks. Several techniques have been proposed to counter …
Face liveness detection using dynamic texture
User authentication is an important step to protect information, and in this context, face
biometrics is potentially advantageous. Face biometrics is natural, intuitive, easy to use, and …
biometrics is potentially advantageous. Face biometrics is natural, intuitive, easy to use, and …
Face spoofing detection through visual codebooks of spectral temporal cubes
Despite important recent advances, the vulnerability of biometric systems to spoofing attacks
is still an open problem. Spoof attacks occur when impostor users present synthetic …
is still an open problem. Spoof attacks occur when impostor users present synthetic …