On the effectiveness of local binary patterns in face anti-spoofing

I Chingovska, A Anjos, S Marcel - 2012 BIOSIG-proceedings of …, 2012 - ieeexplore.ieee.org
Spoofing attacks are one of the security traits that biometric recognition systems are proven
to be vulnerable to. When spoofed, a biometric recognition system is bypassed by …

Can face anti-spoofing countermeasures work in a real world scenario?

T de Freitas Pereira, A Anjos… - … on biometrics (ICB), 2013 - ieeexplore.ieee.org
User authentication is an important step to protect information and in this field face
biometrics is advantageous. Face biometrics is natural, easy to use and less human …

Face spoofing detection from single images using micro-texture analysis

J Määttä, A Hadid, M Pietikäinen - 2011 international joint …, 2011 - ieeexplore.ieee.org
Current face biometric systems are vulnerable to spoo ing attacks. A spoofing attack occurs
when a person tries to masquerade as someone else by falsifying data and thereby gaining …

Face recognition under spoofing attacks: countermeasures and research directions

L Li, PL Correia, A Hadid - Iet Biometrics, 2018 - Wiley Online Library
Among tangible threats facing current biometric systems are spoofing attacks. A spoofing
attack occurs when a person tries to masquerade as someone else by falsifying data and …

Context based face anti-spoofing

J Komulainen, A Hadid… - 2013 IEEE sixth …, 2013 - ieeexplore.ieee.org
The face recognition community has finally started paying more attention to the long-
neglected problem of spoofing attacks and the number of countermeasures is gradually …

Complementary countermeasures for detecting scenic face spoofing attacks

J Komulainen, A Hadid, M Pietikäinen… - … on biometrics (ICB), 2013 - ieeexplore.ieee.org
The face recognition community has finally started paying more attention to the long-
neglected problem of spoofing attacks. The number of countermeasures is gradually …

A comparative study on face spoofing attacks

S Kumar, S Singh, J Kumar - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
In the last 57 years, face biometrie researchers have achieved many successes. Face
recognition systems have been extensively used in government as well as commercial …

A face antispoofing database with diverse attacks

Z Zhang, J Yan, S Liu, Z Lei, D Yi… - 2012 5th IAPR …, 2012 - ieeexplore.ieee.org
Face antispoofing has now attracted intensive attention, aiming to assure the reliability of
face biometrics. We notice that currently most of face antispoofing databases focus on data …

Face spoofing detection from single images using texture and local shape analysis

J Määttä, A Hadid, M Pietikäinen - IET biometrics, 2012 - IET
Current face biometric systems are vulnerable to spoofing attacks. A spoofing attack occurs
when a person tries to masquerade as someone else by falsifying data and thereby gaining …

The 2nd competition on counter measures to 2D face spoofing attacks

I Chingovska, J Yang, Z Lei, D Yi, SZ Li… - … on biometrics (ICB), 2013 - ieeexplore.ieee.org
As a crucial security problem, anti-spoofing in biometrics, and particularly for the face
modality, has achieved great progress in the recent years. Still, new threats arrive inform of …