Searching central difference convolutional networks for face anti-spoofing

Z Yu, C Zhao, Z Wang, Y Qin, Z Su… - Proceedings of the …, 2020 - openaccess.thecvf.com
Face anti-spoofing (FAS) plays a vital role in face recognition systems. Most state-of-the-art
FAS methods 1) rely on stacked convolutions and expert-designed network, which is weak …

NAS-FAS: Static-dynamic central difference network search for face anti-spoofing

Z Yu, J Wan, Y Qin, X Li, SZ Li… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Face anti-spoofing (FAS) plays a vital role in securing face recognition systems. Existing
methods heavily rely on the expert-designed networks, which may lead to a sub-optimal …

Face anti-spoofing with human material perception

Z Yu, X Li, X Niu, J Shi, G Zhao - … Conference, Glasgow, UK, August 23–28 …, 2020 - Springer
Face anti-spoofing (FAS) plays a vital role in securing the face recognition systems from
presentation attacks. Most existing FAS methods capture various cues (eg, texture, depth …

The fall of one, the rise of many: a survey on multi-biometric fusion methods

LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

Context based face anti-spoofing

J Komulainen, A Hadid… - 2013 IEEE sixth …, 2013 - ieeexplore.ieee.org
The face recognition community has finally started paying more attention to the long-
neglected problem of spoofing attacks and the number of countermeasures is gradually …

Can face anti-spoofing countermeasures work in a real world scenario?

T de Freitas Pereira, A Anjos… - … on biometrics (ICB), 2013 - ieeexplore.ieee.org
User authentication is an important step to protect information and in this field face
biometrics is advantageous. Face biometrics is natural, easy to use and less human …

Computationally efficient face spoofing detection with motion magnification

S Bharadwaj, TI Dhamecha, M Vatsa… - Proceedings of the IEEE …, 2013 - cv-foundation.org
For a robust face biometric system, a reliable antispoofing approach must be deployed to
circumvent the print and replay attacks. Several techniques have been proposed to counter …

Face liveness detection using dynamic texture

T Freitas Pereira, J Komulainen, A Anjos… - EURASIP Journal on …, 2014 - Springer
User authentication is an important step to protect information, and in this context, face
biometrics is potentially advantageous. Face biometrics is natural, intuitive, easy to use, and …

Face spoofing detection through visual codebooks of spectral temporal cubes

A Pinto, H Pedrini, WR Schwartz… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Despite important recent advances, the vulnerability of biometric systems to spoofing attacks
is still an open problem. Spoof attacks occur when impostor users present synthetic …