2020
DOI: 10.1007/978-3-030-58571-6_33
|View full text |Cite
|
Sign up to set email alerts
|

Face Anti-Spoofing with Human Material Perception

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
72
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 135 publications
(72 citation statements)
references
References 62 publications
0
72
0
Order By: Relevance
“…Most works [7], [19], [47], [48] treat FAS as a binary classification supervised by simple binary cross-entropy loss. In contrast, pseudo depth labels [6], [9], reflection maps [5], [49], and binary mask label [19] are utilized as auxiliary supervision signals as the pixel-wise guidance is able to learn more detailed information. On the other hand, according to the dynamic discrepancy [13], [14] between live and spoofing faces, several video level methods are presented to exploit the dynamic spatio-temporal [8], [13], [50], [51] or rPPG [6], [52], [53] features for PAD.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most works [7], [19], [47], [48] treat FAS as a binary classification supervised by simple binary cross-entropy loss. In contrast, pseudo depth labels [6], [9], reflection maps [5], [49], and binary mask label [19] are utilized as auxiliary supervision signals as the pixel-wise guidance is able to learn more detailed information. On the other hand, according to the dynamic discrepancy [13], [14] between live and spoofing faces, several video level methods are presented to exploit the dynamic spatio-temporal [8], [13], [50], [51] or rPPG [6], [52], [53] features for PAD.…”
Section: Related Workmentioning
confidence: 99%
“…In the past few years, both traditional [1], [2], [3] and deep learning-based [4], [5], [6], [7], [8], [9], [10] methods have shown effectiveness for presentation attack detection (PAD). On one hand, some classical local descriptors (e.g., local binary pattern (LBP) [11] and histogram of gradient (HOG) [2]) are robust for describing the detailed invariant information (e.g., color texture, moiré pattern and noise artifacts) from spoofing faces.…”
Section: Introductionmentioning
confidence: 99%
“…Another interesting approaches include formulating PAD as object detection [63], PAD as material classification [64], using the shape from shading algorithm as a preprocessing [65], and neural architecture search [66]. Recently, Zhang et al created a large-scale face anti-spoofing dataset with annotations [67].…”
Section: Dnnsmentioning
confidence: 99%
“…In the past two decades, both traditional [3], [4], [5], [6], [7] and deep learning-based [8], [9], [10], [11], [12], [13], [14] methods have shown their effectiveness for presentation attack detection (PAD). Most traditional algorithms focus on human liveness cues and handcrafted features, which need rich task-aware prior knowledge.…”
mentioning
confidence: 99%
“…However, convolutional neural networks (CNNs) with binary loss might discover arbitrary cues that are able to separate the two classes (e.g., screen bezel), but not the faithful spoofing patterns. Recently, pixel-wise supervision [9], [10], [12], [26], [29], [37] attracts more attention as it provides more fine-grained context-aware supervision signals, which is beneficial for deep models learning intrinsic spoofing cues. As can be seen from Fig.…”
mentioning
confidence: 99%