[HTML][HTML] Face presentation attack identification optimization with adjusting convolution blocks in VGG networks

SD Thepade, M Dindorkar, P Chaudhari… - Intelligent Systems with …, 2022 - Elsevier
Advancement in deep learning is mapping to every field of life and applying it to almost all
research problems. Numerous Deep Convolutional Neural Network (DCNN) architectures …

Phone pick-up authentication: A gesture-based smartphone authentication mechanism

D Boshoff, A Scriba, R Nkrow… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Passcodes, fingerprints and now facial scans, smart-phone authentication is becoming ever
faster and faster and easier to use. Providing one time authentication mechanism that …

Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms

A Castelblanco, E Rivera, J Solano, L Tengana… - Computers & …, 2022 - Elsevier
The popularity of face-authentication systems has also generated interest in the study of
malicious authentication attempts, such as face spoofing attacks. In this study we investigate …

Enhanced deep learning architectures for face liveness detection for static and video sequences

R Koshy, A Mahmood - Entropy, 2020 - mdpi.com
Face liveness detection is a critical preprocessing step in face recognition for avoiding face
spoofing attacks, where an impostor can impersonate a valid user for authentication. While …

Enhanced face presentation attack prevention employing feature fusion of pre-trained deep convolutional neural network model and thepade's sorted block truncation …

SD Thepade, MR Dindorkar, PR Chaudhari… - International Journal of …, 2023 - ije.ir
The evolution and improvements of deep learning are being used to tackle any research
obstacles that could be converted into classification problems in all spheres of life. Each …

Knock-to-enter authentication: A rhythm-based smartphone authentication mechanism

D Boshoff, R Nkrow, GP Hancke - IECON 2023-49th Annual …, 2023 - ieeexplore.ieee.org
With 2-factor authentication practices becoming ever more popular, the need for developing
new authentication procedures is gaining ever more traction. Rhythm-based gesture …

Flickr-PAD: New Face High-Resolution Presentation Attack Detection Database

D Pasmino, C Aravena, JE Tapia… - 2023 11th International …, 2023 - ieeexplore.ieee.org
Nowadays, Presentation Attack Detection is a very active research area. Several databases
are constituted in the state-of-the-art using images extracted from videos. One of the main …

Dual-stream correlation exploration for face anti-Spoofing

Y Liu, L Wu, Z Li, Z Wang - Pattern Recognition Letters, 2023 - Elsevier
Face anti-spoofing (FAS) is an important technology to ensure the security of face
recognition system. Previous methods generally focus on the representation of the spoof …

Lightweight 3D-StudentNet for defending against face replay attacks

PJ Seegehalli, BN Krupa - Signal, Image and Video Processing, 2024 - Springer
Biometric face and lip-reading systems are susceptible to face replay attacks. Where the
intruder presents a recorded video of a legitimate user or presents printed photos to gain …

Secure eKYC: Blockchain Integration with Facial Recognition and FASNet-Based Anti-Spoofing Mechanism

J Ramteke, S Zutshi, V Tamhankar… - 2024 5th International …, 2024 - ieeexplore.ieee.org
The banking sector, a cornerstone of our society, witnesses a staggering volume of digital
transactions annually, with approximately 8,804 crore transactions valued at 3,021 lakh …