A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Analysis Of Textural Features For Face Biometric Anti-Spoofing
2013
Zenodo
Publication in the conference proceedings of EUSIPCO, Marrakech, Morocco, 2013 ...
Rotation-Invariant Uniform LBP feature vector ) ( 1 V f for a video V is computed by averaging LBP histograms of all N Block diagram of texture based Anti-Spoofing Experiments frames of the video. ...
TEXTURAL ANALYSIS OF SPOOF ATTACKS In this section, we describe the details of experiments performed to validate textural analysis on spoofing attacks. ...
doi:10.5281/zenodo.43537
fatcat:ljl2nikglrcm7evwrl6rhqw5kq
Score-Level-based Face Anti-Spoofing System Using Handcrafted and Deep Learned Characteristics
2019
International Journal of Image Graphics and Signal Processing
Experimental results on public spoof databases such as Print-Attack and Replay-Attack face databases demonstrate the strength of the proposed anti-spoofing method for fake detection. ...
Recognition performance of biometric systems is affected through spoofing attacks made by fake identities. ...
In [16] , a novel double anti-spoofing pipeline has been proposed for face biometrics based on selection of optimized textures and image quality assessment techniques for print and video attacks. ...
doi:10.5815/ijigsp.2019.02.02
fatcat:4tfqqr52mra5xcc6ptypsn7gam
El Yapımı Tabanlı ve Derin Öğrenme Yöntemlerini Kullanan Yüz Yanıltma Önleme Şeması
2020
Çukurova Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi
This study focuses on a strength anti-spoofing scheme based on decision level fusion to monitor individuals in term of real and fake. ...
In order to improve the robustness of proposed anti-spoofing framework, fusion of Log-Gabor and CNN methods is considered by applying decision-level-fusion technique. ...
demonstrated the effectiveness of decision level fusion for face anti-spoofing. ...
doi:10.21605/cukurovaummfd.869181
fatcat:pmhoqdeyjnc4bppvtlqjlevchy
Fake Face Identification
2017
Zenodo
This popularity of face recognition has raised concerns about face spoof attacks (also known as biometric sensor presentation attacks), where a photo or video of an authorized person's face could be used ...
An ensemble classifier, consisting of multiple SVM classifiers trained for different face spoof attacks (e.g., printed photo and replayed video), is used to distinguish between genuine and spoof faces. ...
CLASSIFICATION OF CAPTURED AND RECAPTURED IMAGES TO DETECT PHOTOGRAPH SPOOFING: A new face anti-spoofing approach, which is based on analysis of contrast and texture characteristics of captured and recaptured ...
doi:10.5281/zenodo.242479
fatcat:l6bbmde6wbccrc2kwmmqveltma
Anti Facial Spoof By Using Lytro's LFC
2016
IOSR Journal of Engineering
The liability of the face recognition systems in the biometrics is a growing concern today, as still it remains vulnerable to the various sophisticated attacks that in determined the reliability of biometric ...
features. ...
Proposed anti-spoofing approaches against these attacks can be broadly classified into three groups: liveness detection, motion analysis and texture analysis. ...
doi:10.9790/3021-067023540
fatcat:pjtpvtiukzhq7odpbyxqszvfqq
An Intelligent Approach for Anti-Spoofing in a Multimodal Biometric System
2017
International Journal of Advanced Research in Computer Science and Software Engineering
The existing approaches for anti-spoofing do not consider multiple biometric traits and also have a high false acceptance rate. ...
The proposed method is designed to overcome spoofing in a multimodal biometric system that uses a combination of face, fingerprint and iris images. ...
The bootstrap aggregating classifier is used for anti-spoofing. In [21] the various local descriptors for face, fingerprint and iris biometric traits are analyzed. ...
doi:10.23956/ijarcsse/v7i3/0143
fatcat:mfyzkngvmzdo7fyscy2qmdxt5y
Robust Framework for Antispoofing Face Recognition Mechanism for Mitigating Image Attacks
2018
International Journal for Research in Applied Science and Engineering Technology
The lack of protection against biometric spoofing attacks is not exclusive to face biometrics [2]. ...
Work on fraud detection capabilities for face is still limited and a substantial part of it is based on the flatness of the captured surface in front of the sensor during an attack. ...
Basically there are two main categories of face anti-spoofing techniques, the facial motion detection category and facial texture analysis category. ...
doi:10.22214/ijraset.2018.3222
fatcat:edxqohd7dvaudeanyik2w2bkym
The 2nd competition on counter measures to 2D face spoofing attacks
2013
2013 International Conference on Biometrics (ICB)
As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, has achieved great progress in the recent years. ...
The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to challenge researchers to create counter measures effectively detecting a variety of attacks. ...
Acknowledgments The authors would like to thank the Swiss Innovation Agency (CTI Project Replay) and the FP7 European TABULA RASA Project 3 (257289) for their financial support. ...
doi:10.1109/icb.2013.6613026
dblp:conf/icb/ChingovskaYLYLKGDKNKPGKBRKGWZAKGTPSRGFPPSRAM13
fatcat:v6jawh2dhrg35mobbirfia3b7i
Face Biometrics Under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions
2014
2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops
, proposing new countermeasures, setting standards/protocols, and recording databases for the analysis of spoofing attacks to a wide range of biometrics including face, voice, gait, fingerprints, retina ...
Among tangible threats and vulnerabilities facing current biometric systems are spoofing attacks. ...
Acknowledgments: The financial support of the Academy of Finland and NOKIA Foundation is acknowledged. This work is done within the FP7 EU European Project TABULARASA. ...
doi:10.1109/cvprw.2014.22
dblp:conf/cvpr/Hadid14
fatcat:kjkgh6av3fglplwqpdakmoiqva
The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras
2019
Sensors
For example, in systems that utilise face authentication as biometrics, a liveness is assured using an estimation of blood flow, or analysis of quality of the face image. ...
Therefore, this technique of employing 3D cameras for liveness of face authentication is underexplored for its vulnerabilities to spoofing attacks. ...
[11] colour texture analysis is the process of extracting LBP features from the face images and analysing its micro-texture representation using a support vector machines (SVM) classifier. ...
doi:10.3390/s19081928
fatcat:nwvshuksxfgf7ee7gdzonu3zhi
Face anti-spoofing with multifeature videolet aggregation
2016
2016 23rd International Conference on Pattern Recognition (ICPR)
Therefore, anti-spoofing is one of the most essential prerequisite against attacks on biometric systems. For face recognition it is even more vulnerable as the image capture is non-contact based. ...
Several anti-spoofing methods have been proposed in the literature for both contact and non-contact based biometric modalities often using video to study the temporal characteristics of a real vs. spoofed ...
The authors acknowledge the Open Science Collaboration initiative between IBM India Research Labs and IIIT-Delhi, India for facilitating this research. ...
doi:10.1109/icpr.2016.7899772
dblp:conf/icpr/SiddiquiBDAVSR16
fatcat:rmvs7l3yoveizdd2tzqw2ttvri
ANALYSIS OF SPOOFING ROBUSTNESS IN A MULTIMODAL BIOMETRIC SYSTEM
2017
International Journal of Advanced Research in Computer Science
Multimodal biometric system overcome all these limitations by presenting multiple evidences of single biometric trait due to which spoofing of these simultaneously become more difficult for an imposter ...
In this paper, face and fingerprint are the two biometrics used to build multibiometric system. Here, fusion of two modalities is done at matching score level. ...
Further, a good overview of feature extraction techniques for face and fingerprint anti-spoofing techniques is found in [7] . ...
doi:10.26483/ijarcs.v8i7.4351
fatcat:lprj334kiraa5gccts3ievrtcq
Image Spoofing Detection Using Local Binary Pattern and Local Binary Pattern Variance
2019
International Journal on Information and Communication Technology (IJoICT)
In this paper image spoofing human face detection using texture analysis on input image is proposed. ...
Particularly in the field of biometric security using human face has been widely implemented in the real world. Currently the human face is one of the guidelines in the security system. ...
ACKNOWLEDGMENT The authors would like to thank to our supervisor, Artificial Intelligence Laboratory, School of Computing, Telkom University and those who has helping us. ...
doi:10.21108/ijoict.2018.42.134
fatcat:zcgxqqtzybhehdfnqxipnczi3i
Insight on face liveness detection: A systematic literature review
2019
International Journal of Electrical and Computer Engineering (IJECE)
In this paper, different types of liveness detection and face anti-spoofing techniques are investigated to keep researchers updated with what is being developed in this field.</p> ...
No matter what their category is, articles concentrated on challenges that faces the full utility of anti-spoofing methods and recommended some solutions to overcome these challenges. ...
In this article we provide a review of the state-of-the-art anti-spoofing detection techniques for facial biometrics. ...
doi:10.11591/ijece.v9i6.pp5865-5175
fatcat:ep2uzq5jzjdgloydomeuirtbke
Face Liveness Detection : An Overview
2021
International Journal of Scientific Research in Science and Technology
One such technology used for security purposes is "Facial Recognition". Face recognition is a popular biometric technique. ...
the fundamental properties of the field, motivation for using liveness detection methods in face recognition, and problems that may limit the benefits. ...
We present an overview of the most up-to-date anti-spoofing detection approaches for facial biometrics in this post. ...
doi:10.32628/ijsrst21843
fatcat:cmnsenh42ff7bmrlsixsobgndu
« Previous
Showing results 1 — 15 out of 409 results