SR Arashloo - IEEE Transactions on Circuits and Systems for …, 2020 - ieeexplore.ieee.org
We address the face presentation attack detection problem in the challenging conditions of an unseen attack scenario where the system is exposed to novel presentation attacks that …
To counteract spoofing attacks, the majority of recent approaches to face spoofing attack detection formulate the problem as a binary classification task in which real data and attack …
A Benlamoudi - University of Kasdi Merbah, 2018 - researchgate.net
Because of its natural and non-intrusive interaction, identity verification and recognition using facial information is among the most active areas in computer vision research …
The one-class anomaly detection approach has previously been found to be effective in face presentation attack detection, especially in an\textit {unseen} attack scenario, where the …
SR Arashloo - arXiv preprint arXiv:1912.13276, 2019 - arxiv.org
The paper addresses face presentation attack detection in the challenging conditions of an unseen attack scenario where the system is exposed to novel presentation attacks that were …
The one-class anomaly detection approach has previously been found to be effective in face presentation attack detection, especially in an unseen attack scenario, where the system is …
Tiivistelmä Kasvontunnistusjärjestelmien suorituskyky on parantunut huomattavasti viime vuosina. Tästä syystä tätä teknologiaa pidetään nykyisin riittävän kypsänä ja käytetään jo …