A comprehensive survey on 3D face recognition methods

M Li, B Huang, G Tian - Engineering Applications of Artificial Intelligence, 2022 - Elsevier
Abstract 3D face recognition (3DFR) has emerged as an effective means of characterizing
facial identity over the past several decades. Depending on the types of techniques used in …

Face forgery detection by 3d decomposition

X Zhu, H Wang, H Fei, Z Lei… - Proceedings of the IEEE …, 2021 - openaccess.thecvf.com
Detecting digital face manipulation has attracted extensive attention due to the potential
harms of fake media to the public. However, recent advances have been able to reduce the …

Dynamic texture classification based on 3D ICA-learned filters and fisher vector encoding in big data environment

Z Xiong, F Mo, X Zhao, F Xu, X Zhang, Y Wu - Journal of Signal …, 2022 - Springer
Many researchers focus on the local feature-based description of the dynamic texture,
because of its stability and low dimensionality. Among the existing dynamic texture …

Fusion methods for face presentation attack detection

F Abdullakutty, P Johnston, E Elyan - Sensors, 2022 - mdpi.com
Face presentation attacks (PA) are a serious threat to face recognition (FR) applications.
These attacks are easy to execute and difficult to detect. An attack can be carried out simply …

Learning polysemantic spoof trace: A multi-modal disentanglement network for face anti-spoofing

K Li, H Yang, B Chen, P Li, B Wang… - Proceedings of the AAAI …, 2023 - ojs.aaai.org
Along with the widespread use of face recognition systems, their vulnerability has become
highlighted. While existing face anti-spoofing methods can be generalized between attack …

Efficient face spoofing detection with flash

AF Ebihara, K Sakurai, H Imaoka - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In light of the rising demand for biometric-authentication systems, preventing face spoofing
attacks is a critical issue for the safe deployment of face recognition systems. Here, we …

3sXcsNet: A framework for face presentation attack detection using deep learning

AS Biswas, S Dey, AK Ahirwar - Expert Systems with Applications, 2024 - Elsevier
Face Recognition is a widely used authentication method deployed for accessing personal
digital devices like mobiles and laptops, digital door locks, or various security applications …

Face presentation attack detection: Research opportunities and perspectives

MN Favorskaya - Intelligent Decision Technologies, 2023 - content.iospress.com
The rapid development of biometric methods and their implementation in practice has led to
the widespread attacks called spoofing, which are purely biometric vulnerabilities, but are …

Multi-modal Face Anti-spoofing Based on a Single Image

Q Zhang, Z Liao, Y Huang, J Lai - … , PRCV 2021, Beijing, China, October 29 …, 2021 - Springer
Using multi-modal data, such as VIS, IR and Depth, for face anti-spoofing (FAS) is a robust
and effective method, because complementary information between different modalities can …

Unmasking the imposters: towards improving the generalisation of deep learning methods for face presentation attack detection.

FC Abdullakutty - 2023 - rgu-repository.worktribe.com
Identity theft has had a detrimental impact on the reliability of face recognition, which has
been extensively employed in security applications. The most prevalent are presentation …