2021
DOI: 10.1155/2021/6652727
|View full text |Cite
|
Sign up to set email alerts
|

Towards Face Presentation Attack Detection Based on Residual Color Texture Representation

Abstract: Most existing face authentication systems have limitations when facing the challenge raised by presentation attacks, which probably leads to some dangerous activities when using facial unlocking for smart device, facial access to control system, and face scan payment. Accordingly, as a security guarantee to prevent the face authentication from being attacked, the study of face presentation attack detection is developed in this community. In this work, a face presentation attack detector is designed based on re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 51 publications
0
6
0
Order By: Relevance
“…CoALBP (YCBCR) [20] 17.1 CoALBP (HSV) [20] 16.4 Color [2,7] 13.9 De Spoofing [15,7] 12.3 RCTR-all spaces [7] 10.7 ResNet-18 [9] 9.3 SE-ResNet18 [10] 8.6 AlexNet [20] 8.0 DR-UDA (SE-ResNet18) [29] 8.0 DR-UDA (ResNet-18) [29] 7.2 3D-CNN [19] 7.0 Blink-CNN [8] 4.6 DRL-FAS [3] 1.8…”
Section: Methods Eer (%)mentioning
confidence: 99%
See 2 more Smart Citations
“…CoALBP (YCBCR) [20] 17.1 CoALBP (HSV) [20] 16.4 Color [2,7] 13.9 De Spoofing [15,7] 12.3 RCTR-all spaces [7] 10.7 ResNet-18 [9] 9.3 SE-ResNet18 [10] 8.6 AlexNet [20] 8.0 DR-UDA (SE-ResNet18) [29] 8.0 DR-UDA (ResNet-18) [29] 7.2 3D-CNN [19] 7.0 Blink-CNN [8] 4.6 DRL-FAS [3] 1.8…”
Section: Methods Eer (%)mentioning
confidence: 99%
“…The variability of attacks included in the dataset significantly increase the difficulty of finding a model capable of performing well on all of them. For this reason, even methods that achieve almost zero error on other datasets, have worse performance on the ROSE-Youtu [7].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Deep learning can be used to generate promising results in the field of computer vision, and it has been shown to be useful in solving the challenge of face spoof detection [39]. The CNN architecture employed in this research is as follows: To extract various features from input images, a 1-dimensional convolutional layer (Conv1D) with 32 units as the input layer and an input dimension of (2280 x1) is used.…”
Section: Convolutional Neural Network (Cnn)mentioning
confidence: 99%
“…The motion based PAD methods suffer from long time of data registration and require in most cases additional actions from the user. The second approach is texture based methods [Pen18;Pen20;Du21]. Texture based methods suppose that the real face image has significantly different textural properties from the fake image reproduced using printing or screen devices.…”
Section: Introductionmentioning
confidence: 99%