On the use of client identity information for face antispoofing

I Chingovska, AR Dos Anjos - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
With biometrics playing the role of a password which cannot be replaced if stolen, the
necessity of establishing counter-measures to biometric spoofing attacks has been …

FASS: Face anti-spoofing system using image quality features and deep learning

E Solomon, KJ Cios - Electronics, 2023 - mdpi.com
Face recognition technology has been widely used due to the convenience it provides.
However, face recognition is vulnerable to spoofing attacks which limits its usage in …

On the effectiveness of local binary patterns in face anti-spoofing

I Chingovska, A Anjos, S Marcel - 2012 BIOSIG-proceedings of …, 2012 - ieeexplore.ieee.org
Spoofing attacks are one of the security traits that biometric recognition systems are proven
to be vulnerable to. When spoofed, a biometric recognition system is bypassed by …

A new approach for face anti-spoofing using handcrafted and deep network features

PK Das, B Hu, C Liu, K Cui, P Ranjan… - … Conference on Service …, 2019 - ieeexplore.ieee.org
In biometrics, face recognition methods are achieving momentum with recent progress in the
computer vision (CV). Face recognition is widely used in the identification of an individual's …

Specular-and diffuse-reflection-based face spoofing detection for mobile devices

AF Ebihara, K Sakurai, H Imaoka - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
In light of the rising demand for biometric-authentication systems, preventing face spoofing
attacks is a critical issue for the safe deployment of face recognition systems. Here, we …

Lightweight face anti-spoofing network for telehealth applications

JD Lin, HH Lin, J Dy, JC Chen… - IEEE Journal of …, 2021 - ieeexplore.ieee.org
Online healthcare applications have grown more popular over the years. For instance,
telehealth is an online healthcare application that allows patients and doctors to schedule …

Computationally efficient face spoofing detection with motion magnification

S Bharadwaj, TI Dhamecha, M Vatsa… - Proceedings of the IEEE …, 2013 - cv-foundation.org
For a robust face biometric system, a reliable antispoofing approach must be deployed to
circumvent the print and replay attacks. Several techniques have been proposed to counter …

Face spoofing detection based on multi-scale color inversion dual-stream convolutional neural network

X Shu, X Li, X Zuo, D Xu, J Shi - Expert Systems with Applications, 2023 - Elsevier
Currently, face recognition technology (FRT) has been applied ubiquitously. However, due
to the abuse of personal face photos on social media, FRT has encountered unprecedented …

Face spoofing detection based on improved local graph structure

KB Housam, SH Lau, YH Pang… - 2014 International …, 2014 - ieeexplore.ieee.org
Face spoofing attack is one of the recent security problems that face recognition systems are
proven to be vulnerable to. The spoofing occurs when an attacker bypass the authentication …

Face de-spoofing: Anti-spoofing via noise modeling

A Jourabloo, Y Liu, X Liu - Proceedings of the European …, 2018 - openaccess.thecvf.com
Many prior face anti-spoofing works develop discriminative models for recognizing the
subtle differences between live and spoof faces. Those approaches often regard the image …