Presentation attack detection methods for face recognition systems: A comprehensive survey

R Ramachandra, C Busch - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
The vulnerability of face recognition systems to presentation attacks (also known as direct
attacks or spoof attacks) has received a great deal of interest from the biometric community …

Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

Learn convolutional neural network for face anti-spoofing

J Yang, Z Lei, SZ Li - arXiv preprint arXiv:1408.5601, 2014 - arxiv.org
Though having achieved some progresses, the hand-crafted texture features, eg, LBP [23],
LBP-TOP [11] are still unable to capture the most discriminative cues between genuine and …

An original face anti-spoofing approach using partial convolutional neural network

L Li, X Feng, Z Boulkenafet, Z Xia, M Li… - … conference on image …, 2016 - ieeexplore.ieee.org
Recently deep Convolutional Neural Networks have been successfully applied in many
computer vision tasks and achieved promising results. So some works have introduced the …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

A face antispoofing database with diverse attacks

Z Zhang, J Yan, S Liu, Z Lei, D Yi… - 2012 5th IAPR …, 2012 - ieeexplore.ieee.org
Face antispoofing has now attracted intensive attention, aiming to assure the reliability of
face biometrics. We notice that currently most of face antispoofing databases focus on data …

A dataset and benchmark for large-scale multi-modal face anti-spoofing

S Zhang, X Wang, A Liu, C Zhao… - Proceedings of the …, 2019 - openaccess.thecvf.com
Face anti-spoofing is essential to prevent face recognition systems from a security breach.
Much of the progresses have been made by the availability of face anti-spoofing benchmark …

Casia-surf: A large-scale multi-modal benchmark for face anti-spoofing

S Zhang, A Liu, J Wan, Y Liang, G Guo… - … and Identity Science, 2020 - ieeexplore.ieee.org
Face anti-spoofing is essential to prevent face recognition systems from a security breach.
Much of the progresses have been made by the availability of face anti-spoofing benchmark …

Spoofing face recognition with 3D masks

N Erdogmus, S Marcel - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate
access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still …

Spoofing in 2d face recognition with 3d masks and anti-spoofing with kinect

N Erdogmus, S Marcel - 2013 IEEE sixth international …, 2013 - ieeexplore.ieee.org
The problem of detecting face spoofing attacks (presentation attacks) has recently gained a
well-deserved popularity. Mainly focusing on 2D attacks forged by displaying printed photos …