Verifying liveness by multiple experts in face biometrics

K Kollreider, H Fronthaler… - 2008 IEEE Computer …, 2008 - ieeexplore.ieee.org
Resisting spoofing attempts via photographs and video playbacks is a vital issue for the
success of face biometrics. Yet, the ldquolivenessrdquo topic has only been partially studied …

Face liveness detection under bad illumination conditions

B Peixoto, C Michelassi, A Rocha - 2011 18th IEEE …, 2011 - ieeexplore.ieee.org
Spoofing face recognition systems with photos or videos of someone else is not difficult.
Sometimes, all one needs is to display a picture on a laptop monitor or a printed photograph …

Face liveness detection using variable focusing

S Kim, S Yu, K Kim, Y Ban, S Lee - … International Conference on …, 2013 - ieeexplore.ieee.org
As Face Recognition (FR) technology becomes more mature and commercially available in
the market, many different anti-spoofing techniques have been recently developed to …

Face liveness detection using 3D structure recovered from a single camera

T Wang, J Yang, Z Lei, S Liao… - … conference on biometrics …, 2013 - ieeexplore.ieee.org
Face recognition, which is security-critical, has been widely deployed in our daily life.
However, traditional face recognition technologies in practice can be spoofed easily, for …

Face recognition with liveness detection using eye and mouth movement

AK Singh, P Joshi, GC Nandi - 2014 international conference …, 2014 - ieeexplore.ieee.org
The recent literature on face recognition technology discusses the issue of face spoofing
which can bypass the authentication system by placing a photo/video/mask of the enrolled …

Generalized face anti-spoofing by detecting pulse from face videos

X Li, J Komulainen, G Zhao, PC Yuen… - 2016 23rd …, 2016 - ieeexplore.ieee.org
Face biometric systems are vulnerable to spoofing attacks. Such attacks can be performed in
many ways, including presenting a falsified image, video or 3D mask of a valid user. A …

A discriminative spatio-temporal mapping of face for liveness detection

NN Lakshminarayana, N Narayan… - … on Identity, Security …, 2017 - ieeexplore.ieee.org
The proposed system aims to boost the performance of a face anti-spoofing system by fusing
pulse based features with other spatial and temporal information that markedly define …

A comparative study on face spoofing attacks

S Kumar, S Singh, J Kumar - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
In the last 57 years, face biometrie researchers have achieved many successes. Face
recognition systems have been extensively used in government as well as commercial …

Liveness detection based on 3D face shape analysis

A Lagorio, M Tistarelli, M Cadoni… - … on Biometrics and …, 2013 - ieeexplore.ieee.org
In recent years face recognition systems have been applied in various useful applications,
such as surveillance, access control, criminal investigations, law enforcement, and others …

Face biometrics under spoofing attacks: Vulnerabilities, countermeasures, open issues, and research directions

A Hadid - Proceedings of the IEEE Conference on Computer …, 2014 - cv-foundation.org
Among tangible threats and vulnerabilities facing current biometric systems are spoofing
attacks. A spoofing attack occurs when a person tries to masquerade as someone else by …