Deep learning-based gait recognition using smartphones in the wild

Q Zou, Y Wang, Q Wang, Y Zhao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Compared to other biometrics, gait is difficult to conceal and has the advantage of being
unobtrusive. Inertial sensors, such as accelerometers and gyroscopes, are often used to …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

A dataset and benchmark for large-scale multi-modal face anti-spoofing

S Zhang, X Wang, A Liu, C Zhao… - Proceedings of the …, 2019 - openaccess.thecvf.com
Face anti-spoofing is essential to prevent face recognition systems from a security breach.
Much of the progresses have been made by the availability of face anti-spoofing benchmark …

Casia-surf: A large-scale multi-modal benchmark for face anti-spoofing

S Zhang, A Liu, J Wan, Y Liang, G Guo… - … and Identity Science, 2020 - ieeexplore.ieee.org
Face anti-spoofing is essential to prevent face recognition systems from a security breach.
Much of the progresses have been made by the availability of face anti-spoofing benchmark …

Deep face liveness detection based on nonlinear diffusion using convolution neural network

A Alotaibi, A Mahmood - Signal, Image and Video Processing, 2017 - Springer
A face-spoofing attack occurs when an imposter manipulates a face recognition and
verification system to gain access as a legitimate user by presenting a 2D printed image or …

[PDF][PDF] Insight on face liveness detection: A systematic literature review.

EA Raheem, SMS Ahmad… - … of Electrical & …, 2019 - download.garuda.kemdikbud.go.id
To review researcher‟ s attempts in response to the problem of spoofing and liveness
detection, mapping the research overview from the literature survey into a suitable …

Face recognition systems under spoofing attacks

I Chingovska, N Erdogmus, A Anjos… - Face Recognition Across …, 2016 - Springer
In this chapter, we give an overview of spoofing attacks and spoofing countermeasures for
face recognition systems, with a focus on visual spectrum systems (VIS) in 2D and 3D, as …

Deep convolutional neural networks for face and iris presentation attack detection: Survey and case study

Y Safaa El‐Din, MN Moustafa, H Mahdi - IET Biometrics, 2020 - Wiley Online Library
Biometric presentation attack detection (PAD) is gaining increasing attention. Users of
mobile devices find it more convenient to unlock their smart applications with finger, face, or …

Face anti-spoofing detection based on multi-scale image quality assessment

HH Chang, CH Yeh - Image and Vision Computing, 2022 - Elsevier
This article introduces an effective face PAD algorithm based on multiscale perceptual
image quality assessment features. Unique hand-crafted texture features extracted from face …

Virtual u: Defeating face liveness detection by building virtual models from your public photos

Y Xu, T Price, JM Frahm, F Monrose - 25th USENIX Security Symposium …, 2016 - usenix.org
In this paper, we introduce a novel approach to bypass modern face authentication systems.
More specifically, by leveraging a handful of pictures of the target user taken from social …