How far did we get in face spoofing detection?

L Souza, L Oliveira, M Pamplona, J Papa - Engineering Applications of …, 2018 - Elsevier
The growing use of control access systems based on face recognition shed light over the
need for even more accurate systems to detect face spoofing attacks. In this paper, an …

An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol

SR Arashloo, J Kittler, W Christmas - IEEE access, 2017 - ieeexplore.ieee.org
Face spoofing detection is commonly formulated as a two-class recognition problem where
relevant features of both positive (real access) and negative samples (spoofing attempts) are …

Complementary countermeasures for detecting scenic face spoofing attacks

J Komulainen, A Hadid, M Pietikäinen… - … on biometrics (ICB), 2013 - ieeexplore.ieee.org
The face recognition community has finally started paying more attention to the long-
neglected problem of spoofing attacks. The number of countermeasures is gradually …

A study on recent trends in face spoofing detection techniques

N Daniel, A Anitha - 2018 3rd International Conference on …, 2018 - ieeexplore.ieee.org
Face recognition systems gaining significant importance in today's world as it has numerous
applications such as surveillance, forensic investigations, access control etc. Face …

Review of face presentation attack detection competitions

J Komulainen, Z Boulkenafet, Z Akhtar - Handbook of Biometric Anti …, 2019 - Springer
Face presentation attack detection has received increasing attention ever since the
vulnerabilities to spoofing have been widely recognized. The state of the art in software …

Texture and quality analysis for face spoofing detection

N Daniel, A Anitha - Computers & Electrical Engineering, 2021 - Elsevier
Due to the increasing importance of security and access restrictions, the urge for
implementing face recognition systems is increasing at an unprecedented rate. However …

A comparative study on face spoofing attacks

S Kumar, S Singh, J Kumar - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
In the last 57 years, face biometrie researchers have achieved many successes. Face
recognition systems have been extensively used in government as well as commercial …

Context based face anti-spoofing

J Komulainen, A Hadid… - 2013 IEEE sixth …, 2013 - ieeexplore.ieee.org
The face recognition community has finally started paying more attention to the long-
neglected problem of spoofing attacks and the number of countermeasures is gradually …

Face recognition under spoofing attacks: countermeasures and research directions

L Li, PL Correia, A Hadid - Iet Biometrics, 2018 - Wiley Online Library
Among tangible threats facing current biometric systems are spoofing attacks. A spoofing
attack occurs when a person tries to masquerade as someone else by falsifying data and …

On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing

O Nikisins, A Mohammadi, A Anjos… - … on Biometrics (ICB), 2018 - ieeexplore.ieee.org
While face recognition systems got a significant boost in terms of recognition performance in
recent years, they are known to be vulnerable to presentation attacks. Up to date, most of the …