2016
DOI: 10.1049/iet-bmt.2014.0075
|View full text |Cite
|
Sign up to set email alerts
|

Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models

Abstract: The vulnerability of biometric systems to external attacks using a physical artefact in order to impersonate the legitimate user has become a major concern over the last decade. Such a threat, commonly known as 'spoofing', poses a serious risk to the integrity of biometric systems. The usual low-complexity and low-cost characteristics of these attacks make them accessible to the general public, rendering each user a potential intruder. The present study addresses the spoofing issue analysing the feasibility to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(34 citation statements)
references
References 37 publications
0
34
0
Order By: Relevance
“…However, in the case of facial recognition, as with fingerprint recognition, previous iterations of this technology has been shown to be easily compromised. For example, facial recognition has previously been circumvented with the use of printed masks/photos [29] [30].…”
Section: Survey Resultsmentioning
confidence: 99%
“…However, in the case of facial recognition, as with fingerprint recognition, previous iterations of this technology has been shown to be easily compromised. For example, facial recognition has previously been circumvented with the use of printed masks/photos [29] [30].…”
Section: Survey Resultsmentioning
confidence: 99%
“…A further study addresses the spoofing issue by analyzing the feasibility of low-cost attacks with selfmanufactured three-dimensional printed models to 2D (photo attacks), 2.5D (video attacks) and 3D (mask attacks) face recognition systems [29]. However, 3D face recognition technology may fail the challenge posed by more sophisticated type of attacks based on the presentation of a 3D face reproduction to the acquisition sensor used.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, the rapid advancement of 3D printing technologies and services has made it easier and cheaper to make 3D masks. Several 3D mask attack databases have been created, inlcuding the 3DMAD (3D Mask Attack Database [11]), the 3DFS-DB (3D-face spoofing database [14]), the HKBU-MARs (HKBU 3D Mask Attack with Real World Variations Database [24]), and the SMAD (Silicone Mask Attack Database [28]).…”
Section: Introductionmentioning
confidence: 99%
“…Although these 3D presentation attack databases have collected different 3D masks based on the third-party services [11,24], by self-manufacturing [14], or from online resources [28], the databases are restricted to small data sizes (mostly less than 30 subjects) or low mask qualities.…”
Section: Introductionmentioning
confidence: 99%