Filters








7 Hits in 4.2 sec

Complementary countermeasures for detecting scenic face spoofing attacks

Jukka Komulainen, Abdenour Hadid, Matti Pietikainen, Andre Anjos, Sebastien Marcel
2013 2013 International Conference on Biometrics (ICB)  
In this paper, we address this issue by studying fusion of motion and texture based countermeasures under several types of scenic face attacks.  ...  The face recognition community has finally started paying more attention to the long-neglected problem of spoofing attacks.  ...  Detecting scenic fake face attacks In addition to the used spoofing medium type, such as photograph and video display, 2D fake face attacks can be categorized into two groups, close-up and scenic attacks  ... 
doi:10.1109/icb.2013.6612968 dblp:conf/icb/KomulainenHPAM13 fatcat:wbu7sdlhs5bhbjqrgi6dxgzthy

Context based face anti-spoofing

Jukka Komulainen, Abdenour Hadid, Matti Pietikainen
2013 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS)  
Therefore, we propose to approach the problem of face spoofing as a set of attack-specific subproblems that are solvable with a proper combination of complementary countermeasures.  ...  The face recognition community has finally started paying more attention to the long-neglected problem of spoofing attacks and the number of countermeasures is gradually increasing.  ...  Proposed spoofing detection using scenic cues and local shape analysis To follow the principle of attack-specific spoofing detection and to find out well-generalizing countermeasures to particular attack  ... 
doi:10.1109/btas.2013.6712690 dblp:conf/btas/KomulainenHP13 fatcat:z77c4btbbfabrifhi5qzvnxj4a

Face Biometrics Under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions

Abdenour Hadid
2014 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops  
, proposing new countermeasures, setting standards/protocols, and recording databases for the analysis of spoofing attacks to a wide range of biometrics including face, voice, gait, fingerprints, retina  ...  Among tangible threats and vulnerabilities facing current biometric systems are spoofing attacks.  ...  The typical countermeasure to a spoofing attack is liveness detection that aims at detecting some physiological signs of life.  ... 
doi:10.1109/cvprw.2014.22 dblp:conf/cvpr/Hadid14 fatcat:kjkgh6av3fglplwqpdakmoiqva

Face recognition under spoofing attacks: countermeasures and research directions

Lei Li, Paulo Lobato Correia, Abdenour Hadid
2018 IET Biometrics  
Among tangible threats facing current biometric systems are spoofing attacks.  ...  As a case study for illustration, a face anti-spoofing method is described, which employs a colour local binary pattern descriptor to jointly analyse colour and texture available from the luminance and  ...  Therefore, if the spoofing attack problem could be structured into attack-specific sub-problems, each one solvable using a suitable countermeasure, or a combination of complementary countermeasures, a  ... 
doi:10.1049/iet-bmt.2017.0089 fatcat:rocm5fkk5jhopn5u6tpen54czi

A Survey on Anti-Spoofing Methods for Facial Recognition with RGB Cameras of Generic Consumer Devices

Zuheng Ming, Muriel Visani, Muhammad Muzzamil Luqman, Jean-Christophe Burie
2020 Journal of Imaging  
The widespread deployment of facial recognition-based biometric systems has made facial presentation attack detection (face anti-spoofing) an increasingly critical issue.  ...  This survey thoroughly investigates facial Presentation Attack Detection (PAD) methods that only require RGB cameras of generic consumer devices over the past two decades.  ...  Instruments (PAIs, usually spoofs or fakes) that will be used for attacking the face recognition system.  ... 
doi:10.3390/jimaging6120139 pmid:34460536 pmcid:PMC8321190 fatcat:it24rmdhpjgcjdtou4jlhnv6d4

Secure Face Spoof Detection on Smartphone

Wakchaure Arti, Bamhane Swapnil, Bhor Ashwini, Varal Student
International Research Journal of Engineering and Technology   unpublished
However, face authentication is vulnerable to spoofing attacks, to address these issues with face authentication, we take the first step to design Secure Face Detection System On Smart-phone for device  ...  In proposed system, we focus on public-domain face spoof databases will show that the proposed approach is effective in face spoof detection for both cross-database and intra-database testing scenarios  ...  Ingale in valuable guidance for the success of this project.  ... 
fatcat:p4dnbg5dknd4fcn7bfzp2mzxmi

Coimbatore-6410 4243

Tadeusz Hryniewicz, Tomasz Borowski, B Ramani, Anand Paul, Mr Kumar, Mr Ravichandran Advisor, T Devi, Latha Parameswaran, Chairperson, Ms Sampath, Ms Shaju, Mr Prashanth
unpublished
., [8] proposed, under several types of scenic face attacks, addressess this issue by studying fusion of motion and texture based countermeasures.  ...  ., [10] proposed video-based face spoofing detection through visual rhythm analysis.  ...  VANET should be suitable for some cryptographic related security requirements, before they are deployed in the network.  ... 
fatcat:bq2eelzqujhjzfn6qevs75mdim