2018 International Conference on Biometrics (ICB) 2018
DOI: 10.1109/icb2018.2018.00022
|View full text |Cite
|
Sign up to set email alerts
|

On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-spoofing

Abstract: While face recognition systems got a significant boost in terms of recognition performance in recent years, they are known to be vulnerable to presentation attacks. Up to date, most of the research in the field of face anti-spoofing or presentation attack detection was considered as a twoclass classification task: features of bona-fide samples versus features coming from spoofing attempts. The main focus has been on boosting the anti-spoofing performance for databases with identical types of attacks across bot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
92
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 97 publications
(93 citation statements)
references
References 17 publications
0
92
0
1
Order By: Relevance
“…Since a new database is proposed in this paper, baseline experiments are performed for each channel first. The selected baselines are reproducible and have either open-source implementation [12] or re-implementation. Three sets of baselines are described in this section.…”
Section: Baseline Experiments Setupmentioning
confidence: 99%
See 1 more Smart Citation
“…Since a new database is proposed in this paper, baseline experiments are performed for each channel first. The selected baselines are reproducible and have either open-source implementation [12] or re-implementation. Three sets of baselines are described in this section.…”
Section: Baseline Experiments Setupmentioning
confidence: 99%
“…The source codes for the network and instructions to train the model are made publicly available allowing to reproduce the findings. We benchmark the proposed method against selected reproducible baseline available in recent publications on the topic [12], as well as reimplementations of recent literature in multi-channel PAD [13]. We demonstrate that the multi-channel approach is beneficial in both proposed and baseline systems.…”
Section: Introductionmentioning
confidence: 98%
“…Pilot coordinators play an important role to communicate needs and technical issues to the technology developers and keep course teams and students-including special educational needs students-well informed and supported on security and privacy as well as on fraud detection (QAA, Vol 50 No 6 2019, prevention and trust (Mellar, Peytcheva-Forsyth, Kocdar, Karadeniz, & Yovkova, 2018;Park, 2004).…”
Section: Discussionmentioning
confidence: 99%
“…Good academic practice in (online) teaching should recognise academic malpractice such as external and intrinsic plagiarism (Appelgren Heyman et al ., ; Ferrell, ; Potthast, Eiselt, Barrón Cedeño, Stein, & Rosso, ) including impersonation and presentation attack (Nikisins, Mohammadi, Anjos, & Marcel, ), which has become more common. All these forms of cheating and plagiarism should be addressed by academic staff (Ivanova et al ., ; Kambourakis & Damopoulos ; Pell, ) with pedagogical strategies for e‐assessment supported by the effective use of technologies, such as the TesLA system.…”
Section: Final Remarksmentioning
confidence: 99%
“…Image quality measures [9], and image distortion analysis [24] use the deterioration of the sample quality and artifacts in the re-capture as a cue for presentation attack detection. Most of these methods treat PAD as a binary classification problem which reduces its generalization capability in an unseen attack scenario [19]. Nikisins et al [19] proposed a framework for one class classification using one class Gaussian Mixture Models (GMM).…”
Section: Feature Based Methodsmentioning
confidence: 99%