A face anti-spoofing method based on optical flow field

W Yin, Y Ming, L Tian - 2016 IEEE 13th International …, 2016 - ieeexplore.ieee.org
Spoofing attack can easily deceive face recognition system. In this paper, we explore the
issue of face anti-spoofing with good performance in accuracy by utilizing optical flow vector …

Avoiding replay-attacks in a face recognition system using head-pose estimation

RW Frischholz, A Werner - 2003 IEEE International SOI …, 2003 - ieeexplore.ieee.org
The subject is a challenge response mechanism used as an optional add-on to the face
recognition part of the multi modal biometric authentication system" BioID". This mechanism …

Face spoofing detection through partial least squares and low-level descriptors

WR Schwartz, A Rocha… - 2011 International Joint …, 2011 - ieeexplore.ieee.org
Personal identity verification based on biometrics has received increasing attention since it
allows reliable authentication through intrinsic characteristics, such as face, voice, iris …

Moving face spoofing detection via 3D projective invariants

M De Marsico, M Nappi, D Riccio… - 2012 5th IAPR …, 2012 - ieeexplore.ieee.org
Face recognition provides many advantages compared with other available biometrics, but it
is particularly subject to spoofing. The most accurate methods in literature addressing this …

Towards face unlock: on the difficulty of reliably detecting faces on mobile phones

RD Findling, R Mayrhofer - … of the 10th International Conference on …, 2012 - dl.acm.org
Currently, reliable face detection and recognition are becoming more important on mobile
devices--eg to unlock the screen. However, using only frontal face images for authentication …

Seeing your face is not enough: An inertial sensor-based liveness detection for face authentication

Y Li, Y Li, Q Yan, H Kong, RH Deng - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
Leveraging built-in cameras on smartphones and tablets, face authentication provides an
attractive alternative of legacy passwords due to its memory-less authentication process …

Complementary countermeasures for detecting scenic face spoofing attacks

J Komulainen, A Hadid, M Pietikäinen… - … on biometrics (ICB), 2013 - ieeexplore.ieee.org
The face recognition community has finally started paying more attention to the long-
neglected problem of spoofing attacks. The number of countermeasures is gradually …

A liveness detection method for face recognition based on optical flow field

W Bao, H Li, N Li, W Jiang - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
It is a common spoof to use a photograph to fool face recognition algorithm. In light of
differences in optical flow fields generated by movements of two-dimensional planes and …

Face liveness detection from a single image with sparse low rank bilinear discriminative model

X Tan, Y Li, J Liu, L Jiang - Computer Vision–ECCV 2010: 11th European …, 2010 - Springer
Spoofing with photograph or video is one of the most common manner to circumvent a face
recognition system. In this paper, we present a real-time and non-intrusive method to …

Countermeasure for the protection of face recognition systems against mask attacks

N Kose, JL Dugelay - … and Workshops on Automatic Face and …, 2013 - ieeexplore.ieee.org
There are several types of spoofing attacks to face recognition systems such as photograph,
video or mask attacks. Recent studies show that face recognition systems are vulnerable to …