2016
DOI: 10.1155/2016/4721849
|View full text |Cite
|
Sign up to set email alerts
|

Face Spoof Attack Recognition Using Discriminative Image Patches

Abstract: Face recognition systems are now being used in many applications such as border crossings, banks, and mobile payments. The wide scale deployment of facial recognition systems has attracted intensive attention to the reliability of face biometrics against spoof attacks, where a photo, a video, or a 3D mask of a genuine user’s face can be used to gain illegitimate access to facilities or services. Though several face antispoofing or liveness detection methods (which determine at the time of capture whether a fac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(26 citation statements)
references
References 31 publications
0
26
0
Order By: Relevance
“…To validate the efficiency of our proposed method for solving the PAD problem, we further perform a comparison of the detection performances between our proposed method and previous research using the same testing databases (NUAA and CASIA). As explained in Section 3.1 , the NUAA and CASIA database are the public databases and they have been widely used in previous research on the PAD method for face recognition system [ 14 , 15 , 16 , 17 , 20 , 21 , 23 ]. In addition, these databases were provided with pre-defined training and testing dataset.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…To validate the efficiency of our proposed method for solving the PAD problem, we further perform a comparison of the detection performances between our proposed method and previous research using the same testing databases (NUAA and CASIA). As explained in Section 3.1 , the NUAA and CASIA database are the public databases and they have been widely used in previous research on the PAD method for face recognition system [ 14 , 15 , 16 , 17 , 20 , 21 , 23 ]. In addition, these databases were provided with pre-defined training and testing dataset.…”
Section: Resultsmentioning
confidence: 99%
“…Finally, a matching step is performed to recognize (or identify) the user in the input image. Because of its operation procedure, a face recognition system can be attacked using printed photographs, masks, or video displays [ 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 ], thus reducing the security level of this system.…”
Section: Introductionmentioning
confidence: 99%
“…Fine-tuned VGG-Face [12] 5.20 LSTM-CNN [14] 5.17 Yang et al [15] 4.92 Patch Based Handcrafted Approach [7] 4.65 Li et al [12] 4.50 Random Patches Based CNN [13] 4.44 lsCNN Traditionally Trained 4.44 lsCNN 4.44…”
Section: Methods Eermentioning
confidence: 99%
“…The different visual patterns of each facial region encode rich and discriminative information necessary to distinguish a face from other objects, and also from other faces. Regarding face spoofing detection, some works based on handcrafted features have mentioned that different spoofing cues can be extracted from different facial regions [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…Although these methods can successfully detect printed photo attacks, they are ineffective at identifying replayed video attacks, which present natural responses. Furthermore, they require multiple frames (usually >3 s) to estimate facial motions restricted by the human physiological rhythm [14]. 2.…”
Section: Related Workmentioning
confidence: 99%