A video-based face detection and recognition system using cascade face verification modules

P Zhang - 2008 37th IEEE Applied Imagery Pattern Recognition …, 2008 - ieeexplore.ieee.org
Face detection and recognition in a video is a challenging research topic as overall
processes must be done timely and efficiently. In this paper, a novel face detection and …

Competition on counter measures to 2-d facial spoofing attacks

MM Chakka, A Anjos, S Marcel, R Tronci… - … joint conference on …, 2011 - ieeexplore.ieee.org
Spoofing identities using photographs is one of the most common techniques to attack 2-D
face recognition systems. There seems to exist no comparative studies of different …

The replay-mobile face presentation-attack database

A Costa-Pazo, S Bhattacharjee… - … conference of the …, 2016 - ieeexplore.ieee.org
For face authentication to become widespread on mobile devices, robust countermeasures
must be developed for face presentation-attack detection (PAD). Existing databases for …

Face anti-spoofing based on color texture analysis

Z Boulkenafet, J Komulainen… - 2015 IEEE international …, 2015 - ieeexplore.ieee.org
Research on face spoofing detection has mainly been focused on analyzing the luminance
of the face images, hence discarding the chrominance information which can be useful for …

Face recognition system invariant to plastic surgery

NS Lakshmiprabha, S Majumder - 2012 12th international …, 2012 - ieeexplore.ieee.org
Facial plastic surgery changes facial features to large extend and thus creating a major
problem to face recognition system. This paper proposes a new face recognition system …

Face spoofing detection using dynamic texture

J Komulainen, A Hadid, M Pietikäinen - … Revised Selected Papers, Part I 11, 2013 - Springer
While there is a significant number of works addressing eg pose and illumination variation
problems in face recognition, the vulnerabilities to spoofing attacks were mostly unexplored …

Evaluating liveness by face images and the structure tensor

K Kollreider, H Fronthaler… - Fourth IEEE Workshop on …, 2005 - ieeexplore.ieee.org
A technique evaluating liveness in short face image sequences is presented The intended
purpose of the proposed system is to assist in a biometric authentication framework, by …

Diffusion-based kernel matrix model for face liveness detection

C Yu, C Yao, M Pei, Y Jia - Image and Vision Computing, 2019 - Elsevier
Face recognition and verification systems are vulnerable to video spoofing attacks. In this
paper, we present a diffusion-based kernel matrix model for face liveness detection. We use …

Face recognition and detection using Random forest and combination of LBP and HOG features

H Mady, SMS Hilles - 2018 international conference on smart …, 2018 - ieeexplore.ieee.org
The effective facial recognition method should perform well in unregulated environments
based on video broadcast to satisfy the demands of applications in real-world However, this …

Implementation of face recognition algorithm for biometrics based time attendance system

ARS Siswanto, AS Nugroho… - … Conference on ICT For …, 2014 - ieeexplore.ieee.org
Face Recognition begins with extracting the coordinates of features such as width of mouth,
width of eyes, pupil, and compare the result with the measurements stored in the database …