331 Hits in 7.2 sec

Face spoofing detection from single images using micro-texture analysis

Jukka Maatta, Abdenour Hadid, Matti Pietikainen
2011 2011 International Joint Conference on Biometrics (IJCB)  
In addition, the texture features that are used for spoofing detection can also be used for face recognition.  ...  Inspired by image quality assessment, characterization of printing artifacts, and differences in light reflection, we propose to approach the problem of spoofing detection from texture analysis point of  ...  Spoofing Detection using Micro-Texture Analysis Face images captured from printed photos may visually look very similar to the images captured from live faces (see Fig. 1 ).  ... 
doi:10.1109/ijcb.2011.6117510 dblp:conf/icb/MaattaHP11 fatcat:2kse3dlpozddddblhzfzcfocne

Detecting Masquerade in Face Recognition System – A Literature survey

Lina. S, Dr. R. Latha
2014 IOSR Journal of Computer Engineering  
This paper presents an analysis of masquerade detection algorithms in face recognition system.  ...  of masquerading attacks is generally undertaken by approaching theproblem from an anomaly detection perspective: a model of normal behaviour for eachuser is constructed and significant departures from  ...  [3] extracted micro-textures from the secularity component ofan image to detect recaptured images.  ... 
doi:10.9790/0661-16140105 fatcat:gmofprbmfraatoxiez5esxsgcq

Mask spoofing in face recognition and countermeasures

Neslihan Kose, Jean-Luc Dugelay
2014 Image and Vision Computing  
All teams used one or multiple 31 clues obtained clearly from motion analysis, texture analysis and liveness 32 detection.  ...  Furthermore in [20, 21], micro-texture analysis 26 is proposed to detect 2D attacks.  ...  micro-texture analysis, which was first proposed in [20] to detect 2D 412 face attacks, is used to detect 3D mask attacks here.  ... 
doi:10.1016/j.imavis.2014.06.003 fatcat:qfm2ulnucfeqfg7mygqxry4liq

Complementary countermeasures for detecting scenic face spoofing attacks

Jukka Komulainen, Abdenour Hadid, Matti Pietikainen, Andre Anjos, Sebastien Marcel
2013 2013 International Conference on Biometrics (ICB)  
In this paper, we address this issue by studying fusion of motion and texture based countermeasures under several types of scenic face attacks.  ...  The face recognition community has finally started paying more attention to the long-neglected problem of spoofing attacks.  ...  The research leading to these results has received funding from the European Community's FP7 under grant agreements 257289 (TABULA RASA) and 284989 (BEAT).  ... 
doi:10.1109/icb.2013.6612968 dblp:conf/icb/KomulainenHPAM13 fatcat:wbu7sdlhs5bhbjqrgi6dxgzthy

Shape and Texture Based Countermeasure to Protect Face Recognition Systems against Mask Attacks

Neslihan Kose, Jean-Luc Dugelay
2013 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops  
Photographs, videos or masks can be used to spoof face recognition systems. In this paper, a countermeasure is proposed to protect face recognition systems against 3D mask attacks.  ...  The proposed countermeasure is based on the fusion of the information extracted from both the texture and the depth images in the mask database, and provides satisfactory results to protect recognition  ...  In this study, we fuse the information which is extracted from both the texture and the depth images in our mask database using micro-texture analysis.  ... 
doi:10.1109/cvprw.2013.24 dblp:conf/cvpr/KoseD13 fatcat:2xuupvcavzg4zb6p5e5lypmpmm

Anti Facial Spoof By Using Lytro's LFC

T. Silpasree, N.Dilip Kumar
2016 IOSR Journal of Engineering  
In addition to these, it also exhibits an unique characteristic of exhibiting multiple depth (focus) images in a single capture, also known as Refocussing, which provides the high quality artefact face  ...  To this extent, we first collect a new face artefact database using LFC comprises of 80 subjects, then generate the face artefacts by simulating two different kinds of spoof effects including photo print  ...  features that can reflect these micro changes in the frequency using 2D Cepstrum analysis.  ... 
doi:10.9790/3021-067023540 fatcat:pjtpvtiukzhq7odpbyxqszvfqq

Context based face anti-spoofing

Jukka Komulainen, Abdenour Hadid, Matti Pietikainen
2013 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS)  
to detect the presence of spoofing medium in the observed scene.  ...  We experiment with two publicly available databases consisting of several fake face attacks of different nature under varying conditions and imaging qualities.  ...  The research leading to these results has received funding from the European Community's FP7 under grant agreements 257289 (TABULA RASA).  ... 
doi:10.1109/btas.2013.6712690 dblp:conf/btas/KomulainenHP13 fatcat:z77c4btbbfabrifhi5qzvnxj4a

Image Spoofing Detection Using Local Binary Pattern and Local Binary Pattern Variance

Indra Bayu Kusuma, Arida Kartika, Tjokorda Agung Budi W, Kurniawan Nur Ramadhani, Febryanti Sthevanie
2019 International Journal on Information and Communication Technology (IJoICT)  
In this paper image spoofing human face detection using texture analysis on input image is proposed.  ...  Experiment used 5761 spoofs and 3362 original from NUAA Imposter dataset.  ...  ACKNOWLEDGMENT The authors would like to thank to our supervisor, Artificial Intelligence Laboratory, School of Computing, Telkom University and those who has helping us.  ... 
doi:10.21108/ijoict.2018.42.134 fatcat:zcgxqqtzybhehdfnqxipnczi3i

Masquerade Attack Analysis for Secured Face Biometric System

Sanjeeva Kumar M. Hatture, Department of Computer Science and Engineering, Basaveshwar Engineering College, Bagalkot, Visvesvaraya Technological University, Belagavi ( Karnataka), India., Shweta Policepatil, Pursuing, Master Degree, Department of Computer Science and Engineering, Basaveshwar Engineering College (Autonomous), Bagalkot, Visvesvaraya Technological University, Belagavi ( Karnataka), India.
2021 International journal of recent technology and engineering  
To prevent such spoofing attack, we proposed Liveness detection of face by considering the countermeasures and texture analysis of face and also a hybrid approach which combine both passive and active  ...  liveness detection is used.  ...  Researchers have been using the micro-texture analysis method successfully in identifying the photo attacks on photographs of a single face.  ... 
doi:10.35940/ijrte.b6309.0710221 fatcat:v2ichq64izbrdbu4gx6i6kpv4i

Countermeasure for the protection of face recognition systems against mask attacks

Neslihan Kose, Jean-Luc Dugelay
2013 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)  
The results show that the proposed countermeasure gives satisfactory results using both the texture images and the depth maps.  ...  The performance of the countermeasure is observed to be slight better when the technique is applied on texture images instead of depth maps, which proves that face texture provides more information than  ...  Brief Information on Spoofing Detection using Micro-Texture Analysis In [7] , the countermeasure is explained in details.  ... 
doi:10.1109/fg.2013.6553761 dblp:conf/fgr/KoseD13 fatcat:7gmoxumkdbgyzcly2dsqlzguke

Fake Face Identification

Ms. Dilna E P1, Ms. Maneesha Manoj2, Ms. Jiji C J3, Ms. Jeena C J 4 Ms. Hrudhya K P5
2017 Zenodo  
We propose an efficient and rather robust face spoof detection algorithm based on Image Distortion Analysis (IDA).  ...  The proposed approach is extended to multi-frame face spoof detection in videos using a voting based scheme.  ...  In the third group of methods, the texture of the face image is examined to find spoofing clues like printing artifacts and/or blurring .Alternatively, micro-texture analysis is also applicable as proposed  ... 
doi:10.5281/zenodo.242479 fatcat:l6bbmde6wbccrc2kwmmqveltma

An Overview of Face Liveness Detection

Saptarshi Chakraborty, Dhrubajyoti Das
2014 International Journal on Information Theory  
In this work, face liveness detection approaches are categorized based on the various types techniques used for liveness detection.  ...  A secure system needs Liveness detection in order to guard against such spoofing.  ...  Similar technique of face spoofing detection from single images using micro-texture analysis was implemented by Jukka et al. [2] .  ... 
doi:10.5121/ijit.2014.3202 fatcat:kuypal2tsnavthhdbucrbpkseq

Score-Level-based Face Anti-Spoofing System Using Handcrafted and Deep Learned Characteristics

Omid. Sharifi
2019 International Journal of Image Graphics and Signal Processing  
Index Terms-Spoof detection, handcrafted texture extraction, convolutional neural network, decision level fusion, score level fusion.  ...  Experimental results on public spoof databases such as Print-Attack and Replay-Attack face databases demonstrate the strength of the proposed anti-spoofing method for fake detection.  ...  In general, the focus of texture analysis is on detecting texture patterns such as print failures and overall image blur to detect attacks.  ... 
doi:10.5815/ijigsp.2019.02.02 fatcat:4tfqqr52mra5xcc6ptypsn7gam

Face liveness detection using dynamic texture

Tiago de Freitas Pereira, Jukka Komulainen, André Anjos, José Mario De Martino, Abdenour Hadid, Matti Pietikäinen, Sébastien Marcel
2014 EURASIP Journal on Image and Video Processing  
This paper introduces a novel and appealing approach to detect face spoofing using the spatiotemporal (dynamic texture) extensions of the highly popular local binary pattern operator.  ...  The key idea of the approach is to learn and detect the structure and the dynamics of the facial micro-textures that characterise real faces but not fake ones.  ...  Micro-texture analysis has been effectively used in detecting photo attacks from single face images [3, 16, 17] .  ... 
doi:10.1186/1687-5281-2014-2 fatcat:xfcywcdh5raxflqdoxuyoxvyse

A Survey on Face Anti-Spoofing Algorithms

Meigui Zhang, Kehui Zeng, Jinwei Wang
2020 Journal of Information Hiding and Privacy Protection  
This paper introduces the research progress of face anti-spoofing algorithm, and divides the existing face anti-spoofing methods into two categories: methods based on manual feature expression and methods  ...  Finally, the methods of face anti-spoofing are summarized, and the existing problems and future prospects are expounded.  ...  [2] proposed a face anti-spoofing method based on color texture analysis. They extract LBP histograms from a single image channel and connected them to form the final descriptor.  ... 
doi:10.32604/jihpp.2020.010467 fatcat:5otomm6a3jcuxbhyorqq3ofgxi
« Previous Showing results 1 — 15 out of 331 results