Face liveness detection by rppg features and contextual patch-based cnn

B Lin, X Li, Z Yu, G Zhao - Proceedings of the 2019 3rd international …, 2019 - dl.acm.org
Face anti-spoofing plays a vital role in security systems including face payment systems and
face recognition systems. Previous studies showed that live faces and presentation attacks …

Dynamic texture recognition using volume local binary count patterns with an application to 2D face spoofing detection

X Zhao, Y Lin, J Heikkilä - IEEE Transactions on Multimedia, 2017 - ieeexplore.ieee.org
In this paper, a local spatiotemporal descriptor, namely, the volume local binary count
(VLBC), is proposed for the representation and recognition of dynamic texture. This …

Face spoofing detection with local binary pattern network

L Li, X Feng, Z Xia, X Jiang, A Hadid - Journal of visual communication and …, 2018 - Elsevier
Nowadays, face biometric based access control systems are becoming ubiquitous in our
daily life while they are still vulnerable to spoofing attacks. So developing robust and reliable …

3d convolutional neural network based on face anti-spoofing

J Gan, S Li, Y Zhai, C Liu - 2017 2nd international conference …, 2017 - ieeexplore.ieee.org
Face anti-spoofing is very significant to the security of face recognition. Many existing
literatures focus on the study of photo attack. For the video attack, however, the related …

[HTML][HTML] Face presentation attack detection based on optical flow and texture analysis

L Li, Z Xia, J Wu, L Yang, H Han - … of King Saud University-Computer and …, 2022 - Elsevier
Towards the security threats brought by presented fake faces to face recognition systems,
many countermeasures have been presented to resist fake faces and achieved promising …

Dynamic texture analysis for detecting fake faces in video sequences

M Bonomi, C Pasquini, G Boato - Journal of Visual Communication and …, 2021 - Elsevier
The creation of manipulated multimedia content involving human characters has reached in
the last years unprecedented realism, calling for automated techniques to expose …

How far did we get in face spoofing detection?

L Souza, L Oliveira, M Pamplona, J Papa - Engineering Applications of …, 2018 - Elsevier
The growing use of control access systems based on face recognition shed light over the
need for even more accurate systems to detect face spoofing attacks. In this paper, an …

Face presentation attack detection using guided scale texture

F Peng, L Qin, M Long - Multimedia Tools and Applications, 2018 - Springer
Aiming to counter presentation attack (also known as spoofing attack) in face recognition
system, a face presentation attack detection (also known as spoofing detection or liveness …

Face spoofing detection using improved SegNet architecture with a blur estimation technique

S Kumar, S Singh, J Kumar - International Journal of …, 2021 - inderscienceonline.com
Biometrics has been increasingly used as the well-known technology for the identification
and verification of a person. Among the different biometric traits, the face has been …

Replayed video attack detection based on motion blur analysis

L Li, Z Xia, A Hadid, X Jiang, H Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Face presentation attacks are the main threats to face recognition systems, and many
presentation attack detection (PAD) methods have been proposed in recent years. Although …