2021
DOI: 10.1007/s11771-021-4596-y
|View full text |Cite
|
Sign up to set email alerts
|

Face anti-spoofing algorithm combined with CNN and brightness equalization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…We compared with the methods proposed in [22,27,28,29,30,31], and the results are shown in Table 1. The experimental results show that compared with the methods proposed in [22,27,28,29,30,31], the EER and HTER indexes of the method we proposed are the lowest on the data set.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…We compared with the methods proposed in [22,27,28,29,30,31], and the results are shown in Table 1. The experimental results show that compared with the methods proposed in [22,27,28,29,30,31], the EER and HTER indexes of the method we proposed are the lowest on the data set.…”
Section: Resultsmentioning
confidence: 99%
“…We compared with the methods proposed in [22,27,28,29,30,31], and the results are shown in Table 1. The experimental results show that compared with the methods proposed in [22,27,28,29,30,31], the EER and HTER indexes of the method we proposed are the lowest on the data set. The model has obvious advantages in generalization and robustness against unknown attacks, and effectively avoids the common in class overfitting problem in the face detection task.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Humans may be distinguished from inanimate items like images by this movement. Changes in face expression, blinking eyes, and lip motions are a few of the most often used motion detection methods [6]. Motion-based evaluation methods are typically adequate for preventing inactive representation strikes such as photo-spoofing, but they fail to prevent dynamic rendering attacks such as videos [7].…”
Section: Introductionmentioning
confidence: 99%
“…An impostor can gain access to the system by presenting a copy of the image to the camera. Therefore, prior to face recognition authentication, face liveness detection should be implemented to detect whether the captured face is live or fake [5]. To address face spoofing attacks, researchers have proposed different methods for face liveness detection, such as the use of the enhanced local binary pattern (LBP), motion analysis, texture analysis, and quality analysis of captured images, among others.…”
Section: Introductionmentioning
confidence: 99%