2011 International Joint Conference on Biometrics (IJCB) 2011
DOI: 10.1109/ijcb.2011.6117522
|View full text |Cite
|
Sign up to set email alerts
|

Fusion of multiple clues for photo-attack detection in face recognition systems

Abstract: We faced the problem of detecting 2-D face spoofing attacks performed by placing a printed photo of a real user in\ud front of the camera. For this type of attack it is not possible to relay just on the face movements as a clue of vitality\ud because the attacker can easily simulate such a case, and\ud also because real users often show a “low vitality” during\ud the authentication session. In this paper, we perform both\ud video and static analysis in order to employ complementary\ud information about motion, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(50 citation statements)
references
References 9 publications
0
50
0
Order By: Relevance
“…A recent trend that came into prominence with [28], [26] involves combining several methods at score or feature level. The best results are achieved if the fused methods use complementary features which discern spoofing attacks from different aspects [29].…”
Section: Related Workmentioning
confidence: 99%
“…A recent trend that came into prominence with [28], [26] involves combining several methods at score or feature level. The best results are achieved if the fused methods use complementary features which discern spoofing attacks from different aspects [29].…”
Section: Related Workmentioning
confidence: 99%
“…It requires computation of a weight parameter via majority voting [21]. In the second combination stage the team introduced a heuristic to exclude single frames with outlier scores.…”
Section: Summaries Of the Anti-spoofing Algorithmsmentioning
confidence: 99%
“…He demonstrated Bayesian fusion approach based on mutual dependency models for joint analysis of acoustic and visual speech features for liveness detection. Same author has also addressed the liveness checking scheme using multimodal fuzzy fusion in [24] by designing a mutual dependency modals which extract the spatio-temporal correlation between face and voice dynamics during speech generation.…”
Section: Multimodal Spoofing Detectionmentioning
confidence: 99%
“…R.Tronci et al [24] performed both static and dynamic analysis in order to detect complementary information about motion, texture and liveness. They extracted the problem of 2D face spoofing attacks detection as combination of several clues.…”
Section: Multimodal Spoofing Detectionmentioning
confidence: 99%