2d face liveness detection: An overview

O Kähm, N Damer - 2012 BIOSIG-Proceedings of the …, 2012 - ieeexplore.ieee.org
Face recognition based on 2D images is a widely used biometric approach. This is mainly
due to the simplicity and high usability of this approach. Nonetheless, those solutions are …

Non-intrusive liveness detection by face images

K Kollreider, H Fronthaler, J Bigun - Image and Vision Computing, 2009 - Elsevier
A technique evaluating liveness in face image sequences is presented. To ensure the actual
presence of a live face in contrast to a photograph (playback attack), is a significant problem …

A comparative study on face spoofing attacks

S Kumar, S Singh, J Kumar - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
In the last 57 years, face biometrie researchers have achieved many successes. Face
recognition systems have been extensively used in government as well as commercial …

Deep learning based face liveness detection in videos

Y Akbulut, A Şengür, Ü Budak… - 2017 international artificial …, 2017 - ieeexplore.ieee.org
The human face is an important biometric quantity which can be used to access a user-
based system. As human face images can easily be obtained via mobile cameras and social …

A discriminative spatio-temporal mapping of face for liveness detection

NN Lakshminarayana, N Narayan… - … on Identity, Security …, 2017 - ieeexplore.ieee.org
The proposed system aims to boost the performance of a face anti-spoofing system by fusing
pulse based features with other spatial and temporal information that markedly define …

Face liveness detection from a single image via diffusion speed model

W Kim, S Suh, JJ Han - IEEE transactions on Image processing, 2015 - ieeexplore.ieee.org
Spoofing using photographs or videos is one of the most common methods of attacking face
recognition and verification systems. In this paper, we propose a real-time and nonintrusive …

Continuous face authentication scheme for mobile devices with tracking and liveness detection

M Smith-Creasey, FA Albalooshi… - Microprocessors and …, 2018 - Elsevier
We present a novel scheme for continuous face authentication using mobile device cameras
that addresses the issue of spoof attacks and attack windows in state-of-the-art approaches …

Face spoof attack recognition using discriminative image patches

Z Akhtar, GL Foresti - Journal of electrical and Computer …, 2016 - Wiley Online Library
Face recognition systems are now being used in many applications such as border
crossings, banks, and mobile payments. The wide scale deployment of facial recognition …

Face live detection method based on physiological motion analysis

L Wang, X Ding, C Fang - Tsinghua Science & Technology, 2009 - Elsevier
In recent years, face recognition has often been proposed for personal identification.
However, there are many difficulties with face recognition systems. For example, an imposter …

Face liveness detection based on skin blood flow analysis

SY Wang, SH Yang, YP Chen, JW Huang - symmetry, 2017 - mdpi.com
Face recognition systems have been widely adopted for user authentication in security
systems due to their simplicity and effectiveness. However, spoofing attacks, including …