2023
DOI: 10.1007/s00530-023-01070-5
|View full text |Cite
|
Sign up to set email alerts
|

A survey on face presentation attack detection mechanisms: hitherto and future perspectives

Abstract: The advances in human face recognition (FR) systems have recorded sublime success for automatic and secured authentication in diverse domains. Although the traditional methods have been overshadowed by face recognition counterpart during this progress, computer vision gains rapid traction, and the modern accomplishments address problems with real-world complexity. However, security threats in FR-based systems are a growing concern that offers a new-fangled track to the research community. In particular, recent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 162 publications
0
3
0
Order By: Relevance
“…The related attacks are especially dangerous in high-security environments where access to sensitive information or restricted areas is strictly controlled. Make face recognition technology in the banking industry an example, and false image attacks could allow unauthorized individuals to access bank accounts and conduct malicious transactions [2], [5]. The articles below also discuss the current weaknesses of the face recognition system and potential issues when confronted with a strong attack using fake images.…”
Section: A Issue Of Spoof Attack In Face Recognitionmentioning
confidence: 99%
See 1 more Smart Citation
“…The related attacks are especially dangerous in high-security environments where access to sensitive information or restricted areas is strictly controlled. Make face recognition technology in the banking industry an example, and false image attacks could allow unauthorized individuals to access bank accounts and conduct malicious transactions [2], [5]. The articles below also discuss the current weaknesses of the face recognition system and potential issues when confronted with a strong attack using fake images.…”
Section: A Issue Of Spoof Attack In Face Recognitionmentioning
confidence: 99%
“…Some countries, example China have implemented this technology anywhere. Face recognition market growth is driven by rising demand for improved security and surveillance systems in various industries, including government, healthcare, and retail [2]. However, ethical concerns related to face recognition and liveness technologies, such as privacy, biases, and discrimination, are crucial.…”
Section: Introductionmentioning
confidence: 99%
“…Facial recognition technology has become an integral part of modern life, permeating various devices and systems, including cell phones, laptops, and surveillance equipment [1]. Its applications span security, access control, biometrics, and human-computer interaction [2] revolutionising different domains and enhancing user experiences [3] [4].…”
mentioning
confidence: 99%