Classical and modern face recognition approaches: a complete review

W Ali, W Tian, SU Din, D Iradukunda… - Multimedia tools and …, 2021 - Springer
Human face recognition have been an active research area for the last few decades.
Especially, during the last five years, it has gained significant research attention from …

A review of state-of-the-art in Face Presentation Attack Detection: From early development to advanced deep learning and multi-modal fusion methods

F Abdullakutty, E Elyan, P Johnston - Information fusion, 2021 - Elsevier
Face Recognition is considered one of the most common biometric solutions these days and
is widely used across a range of devices for various security purposes. The performance of …

Deepfakes: a new threat to face recognition? assessment and detection

P Korshunov, S Marcel - arXiv preprint arXiv:1812.08685, 2018 - arxiv.org
It is becoming increasingly easy to automatically replace a face of one person in a video with
the face of another person by using a pre-trained generative adversarial network (GAN) …

Face recognition systems under morphing attacks: A survey

U Scherhag, C Rathgeb, J Merkle, R Breithaupt… - IEEE …, 2019 - ieeexplore.ieee.org
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …

A dataset and benchmark for large-scale multi-modal face anti-spoofing

S Zhang, X Wang, A Liu, C Zhao… - Proceedings of the …, 2019 - openaccess.thecvf.com
Face anti-spoofing is essential to prevent face recognition systems from a security breach.
Much of the progresses have been made by the availability of face anti-spoofing benchmark …

Vulnerability assessment and detection of deepfake videos

P Korshunov, S Marcel - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
It is becoming increasingly easy to automatically replace a face of one person in a video with
the face of another person by using a pre-trained generative adversarial network (GAN) …

Deep models and shortwave infrared information to detect face presentation attacks

G Heusch, A George, D Geissbühler… - … and Identity Science, 2020 - ieeexplore.ieee.org
This paper addresses the problem of face presentation attack detection using different
image modalities. In particular, the usage of short wave infrared (SWIR) imaging is …

Preventing deepfake attacks on speaker authentication by dynamic lip movement analysis

CZ Yang, J Ma, S Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recent research has demonstrated that lip-based speaker authentication systems can not
only achieve good authentication performance but also guarantee liveness. However, with …

Toothsonic: Earable authentication via acoustic toothprint

Z Wang, Y Ren, Y Chen, J Yang - Proceedings of the ACM on Interactive …, 2022 - dl.acm.org
Earables (ear wearables) are rapidly emerging as a new platform encompassing a diverse
range of personal applications. The traditional authentication methods hence become less …

EarDynamic: An ear canal deformation based continuous user authentication using in-ear wearables

Z Wang, S Tan, L Zhang, Y Ren, Z Wang… - Proceedings of the ACM …, 2021 - dl.acm.org
Biometric-based authentication is gaining increasing attention for wearables and mobile
applications. Meanwhile, the growing adoption of sensors in wearables also provides …