Presentation attack detection methods for face recognition systems: A comprehensive survey

R Ramachandra, C Busch - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
The vulnerability of face recognition systems to presentation attacks (also known as direct
attacks or spoof attacks) has received a great deal of interest from the biometric community …

Face image quality assessment: A literature survey

T Schlett, C Rathgeb, O Henniger, J Galbally… - ACM Computing …, 2022 - dl.acm.org
The performance of face analysis and recognition systems depends on the quality of the
acquired face data, which is influenced by numerous factors. Automatically assessing the …

Deepfakes and beyond: A survey of face manipulation and fake detection

R Tolosana, R Vera-Rodriguez, J Fierrez, A Morales… - Information …, 2020 - Elsevier
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …

Spoofing detection system for e-health digital twin using EfficientNet Convolution Neural Network

H Garg, B Sharma, S Shekhar, R Agarwal - Multimedia Tools and …, 2022 - Springer
Digital Twin is the mirror image of any living or non-living objects. Digital Twin and Cyber-
physical system (CPS) provides a new era for industries especially in the healthcare sector …

Single-side domain generalization for face anti-spoofing

Y Jia, J Zhang, S Shan, X Chen - Proceedings of the IEEE …, 2020 - openaccess.thecvf.com
Existing domain generalization methods for face anti-spoofing endeavor to extract common
differentiation features to improve the generalization. However, due to large distribution …

Biometric face presentation attack detection with multi-channel convolutional neural network

A George, Z Mostaani, D Geissenbuhler… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Face recognition is a mainstream biometric authentication method. However, the
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …

Face spoof detection with image distortion analysis

D Wen, H Han, AK Jain - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Automatic face recognition is now widely used in applications ranging from deduplication of
identity to authentication of mobile payment. This popularity of face recognition has raised …

Secure face unlock: Spoof detection on smartphones

K Patel, H Han, AK Jain - IEEE transactions on information …, 2016 - ieeexplore.ieee.org
With the wide deployment of the face recognition systems in applications from deduplication
to mobile device unlocking, security against the face spoofing attacks requires increased …

Deep pixel-wise binary supervision for face presentation attack detection

A George, S Marcel - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Face recognition has evolved as a prominent biometric authentication modality. However,
vulnerability to presentation attacks curtails its reliable deployment. Automatic detection of …

Deep representations for iris, face, and fingerprint spoofing detection

D Menotti, G Chiachia, A Pinto… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Biometrics systems have significantly improved person identification and authentication,
playing an important role in personal, national, and global security. However, these systems …