[HTML][HTML] Face liveness detection using artificial intelligence techniques: A systematic literature review and future directions

S Khairnar, S Gite, K Kotecha, SD Thepade - Big Data and Cognitive …, 2023 - mdpi.com
Biometrics has been evolving as an exciting yet challenging area in the last decade. Though
face recognition is one of the most promising biometrics techniques, it is vulnerable to …

[HTML][HTML] A survey on face presentation attack detection mechanisms: hitherto and future perspectives

D Sharma, A Selwal - Multimedia Systems, 2023 - Springer
The advances in human face recognition (FR) systems have recorded sublime success for
automatic and secured authentication in diverse domains. Although the traditional methods …

[HTML][HTML] Deep transfer learning on the aggregated dataset for face presentation attack detection

F Abdullakutty, E Elyan, P Johnston, A Ali-Gombe - Cognitive computation, 2022 - Springer
Presentation attacks are becoming a serious threat to one of the most common biometric
applications, namely face recognition (FR). In recent years, numerous methods have been …

Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns

M Zhou, Q Wang, Q Li, W Zhou… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Face authentication usually utilizes deep learning models to verify users with high accuracy.
However, it is vulnerable to various attacks that cheat the models by manipulating the digital …

A Novel Deep Ensemble Learning to Enhance User Authentication in Autonomous Vehicles

HP Du, AD Nguyen, DT Nguyen… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
For autonomous vehicles, face-based authentication is one of the best ways to identify or
verify a user. Deep learning methods, such as Deep Convolutional Neural Networks …

Implicit Mutual Learning With Dual-Branch Networks for Face Super-Resolution

K Zengy, Z Wang, T Luz, J Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Face super-resolution (SR) algorithms have recently made significant progress. However,
most existing methods prefer to employ texture and structure information together to promote …

Can personalised hygienic masks be used to attack face recognition systems?

A Komaty, VK Hahn, C Ecabert… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The proliferation of automated face recognition (FR) necessitates increasingly accurate
person identification. The COVID-19 pandemic has exposed the limitations of FR systems …

Polarized Image Translation From Nonpolarized Cameras for Multimodal Face Anti-Spoofing

Y Tian, Y Huang, K Zhang, Y Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In face antispoofing, it is desirable to have multimodal images to demonstrate liveness cues
from various perspectives. However, in most face recognition scenarios, only a single …

Securing Phygital Gameplay: Strategies for Video-Replay Spoofing Detection

VD Huszár, VK Adhikarla - IEEE Access, 2024 - ieeexplore.ieee.org
Physical Virtual Sports (PVS) utilize digital technologies for the analysis and evaluation of
sports performances. This research article addresses the challenge of detecting video …

Unmasking the Imposters: Task-specific feature learning for face presentation attack detection

F Abdullakutty, E Elyan… - 2023 International Joint …, 2023 - ieeexplore.ieee.org
Presentation attacks pose a threat to the reliability of face recognition systems. A
photograph, a video, or a mask representing an authorised user can be used to circumvent …