2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA) 2018
DOI: 10.1109/isba.2018.8311472
|View full text |Cite
|
Sign up to set email alerts
|

Biometric presentation attack detection using gaze alignment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…Recently, some methods explore liveness cues to detect 3D face presentation attacks, such as thermal signatures [8], gaze information [3,5,4], and pulse or heartbeat signals [25,26,16,22]. Based on the intrinsic liveness signals, these methods achieve an outstanding performance in distinguishing real faces from masks.…”
Section: D Face Pad Methodsmentioning
confidence: 99%
“…Recently, some methods explore liveness cues to detect 3D face presentation attacks, such as thermal signatures [8], gaze information [3,5,4], and pulse or heartbeat signals [25,26,16,22]. Based on the intrinsic liveness signals, these methods achieve an outstanding performance in distinguishing real faces from masks.…”
Section: D Face Pad Methodsmentioning
confidence: 99%
“…Ali et al [ 14 ] was the first to explore novel gaze-based approaches to detect presentation attacks. Ali et al [ 2 , 14 , 15 , 16 , 17 , 18 , 19 ] have subsequently presented a number of novel gaze-based approaches to presentation attack detection. A visual target with randomly assigned trajectories were shown on the display screen for the user to follow with eye (and head) movements.…”
Section: State Of the Artmentioning
confidence: 99%
“…Three types of attack artefacts were used here in order to evaluate the proposed techniques. The attack scenarios assume an impostor attempting to subvert the biometric system by displaying a high-resolution image of a genuine user on a tablet screen (photo attack), or a high-quality printed colour photo with holes in place of the pupils held in front of the impostor’s face as a mask (2D mask attack) or presenting a three-dimensional mask constructed using the genuine user’s data (3D mask attack) [ 17 ].…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…There are relatively many methods based on human-computer interaction to prevent spoofing attacks. For example, Alsufyani et al [2] used the random movement of infrared light to track the relative movement trajectory of the human eye. Singh et al [3] and Pan et al [4] proposed to detect the user's blinking and lip movements to resist people face spoofing attack; Tirunagari et al [5] used dynamic correlation models to preprocess the video to extract texture features.…”
Section: Introductionmentioning
confidence: 99%