Face recognition: Past, present and future (a review)

M Taskiran, N Kahraman, CE Erdem - Digital Signal Processing, 2020 - Elsevier
Biometric systems have the goal of measuring and analyzing the unique physical or
behavioral characteristics of an individual. The main feature of biometric systems is the use …

Presentation attack detection methods for face recognition systems: A comprehensive survey

R Ramachandra, C Busch - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
The vulnerability of face recognition systems to presentation attacks (also known as direct
attacks or spoof attacks) has received a great deal of interest from the biometric community …

Secure face unlock: Spoof detection on smartphones

K Patel, H Han, AK Jain - IEEE transactions on information …, 2016 - ieeexplore.ieee.org
With the wide deployment of the face recognition systems in applications from deduplication
to mobile device unlocking, security against the face spoofing attacks requires increased …

Integration of image quality and motion cues for face anti-spoofing: A neural network approach

L Feng, LM Po, Y Li, X Xu, F Yuan, TCH Cheung… - Journal of Visual …, 2016 - Elsevier
Many trait-specific countermeasures to face spoofing attacks have been developed for
security of face authentication. However, there is no superior face anti-spoofing technique to …

A survey on anti-spoofing methods for facial recognition with rgb cameras of generic consumer devices

Z Ming, M Visani, MM Luqman, JC Burie - Journal of imaging, 2020 - mdpi.com
The widespread deployment of facial recognition-based biometric systems has made facial
presentation attack detection (face anti-spoofing) an increasingly critical issue. This survey …

Face liveness detection by rppg features and contextual patch-based cnn

B Lin, X Li, Z Yu, G Zhao - Proceedings of the 2019 3rd international …, 2019 - dl.acm.org
Face anti-spoofing plays a vital role in security systems including face payment systems and
face recognition systems. Previous studies showed that live faces and presentation attacks …

Face liveness detection using a flash against 2D spoofing attack

PPK Chan, W Liu, D Chen, DS Yeung… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Face recognition technique has been widely applied to personal identification systems due
to its satisfying performance. However, its security may be a crucial issue, since many …

Structured light techniques and applications

T Bell, B Li, S Zhang - Wiley Encyclopedia of Electrical and …, 1999 - Wiley Online Library
Modern hardware and algorithms, developed through several decades of research in
multiple disciplines, are contributing toward the continuous advancement of 3D scanning …

Virtual u: Defeating face liveness detection by building virtual models from your public photos

Y Xu, T Price, JM Frahm, F Monrose - 25th USENIX Security Symposium …, 2016 - usenix.org
In this paper, we introduce a novel approach to bypass modern face authentication systems.
More specifically, by leveraging a handful of pictures of the target user taken from social …

An overview of face liveness detection

S Chakraborty, D Das - arXiv preprint arXiv:1405.2227, 2014 - arxiv.org
Face recognition is a widely used biometric approach. Face recognition technology has
developed rapidly in recent years and it is more direct, user friendly and convenient …