Filters








414 Hits in 6.5 sec

Use of in-the-wild images for anomaly detection in face anti-spoofing [article]

Latifah Abduh, Ioannis Ivrissimtzis
2020 arXiv   pre-print
Here, we explore the use of in-the-wild images, and images from non-specialized face databases, to train one-class classifiers for face anti-spoofing.  ...  Nevertheless, in all existing work on anomaly detection for face anti-spoofing, the proposed training protocols utilize images from specialized anti-spoofing databases only, even though only common images  ...  do not specialize in face-anti-spoofing.  ... 
arXiv:2006.10626v1 fatcat:lh3s3abb6fgjnmoxwawxderoja

Learning Meta Model for Zero- and Few-shot Face Anti-spoofing [article]

Yunxiao Qin, Chenxu Zhao, Xiangyu Zhu, Zezheng Wang, Zitong Yu, Tianyu Fu, Feng Zhou, Jingping Shi, Zhen Lei
2019 arXiv   pre-print
Face anti-spoofing is crucial to the security of face recognition systems.  ...  In this paper, we propose a novel Adaptive Inner-update Meta Face Anti-Spoofing (AIM-FAS) method to tackle this problem through meta-learning.  ...  Methodology In this section, we detail the proposed Adaptive Inner-update Meta Face Anti-spoofing (AIM-FAS) method.  ... 
arXiv:1904.12490v3 fatcat:xnafbfgk2nedxjodm6kxz4lxvu

Learning Meta Model for Zero- and Few-Shot Face Anti-Spoofing

Yunxiao Qin, Chenxu Zhao, Xiangyu Zhu, Zezheng Wang, Zitong Yu, Tianyu Fu, Feng Zhou, Jingping Shi, Zhen Lei
2020 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
Face anti-spoofing is crucial to the security of face recognition systems.  ...  In this paper, we propose a novel Adaptive Inner-update Meta Face Anti-Spoofing (AIM-FAS) method to tackle this problem through meta-learning.  ...  Methodology In this section, we detail the proposed Adaptive Inner-update Meta Face Anti-spoofing (AIM-FAS) method.  ... 
doi:10.1609/aaai.v34i07.6866 fatcat:tbzl75n3eje2ff5kqqb7jadj2y

Domain Agnostic Feature Learning for Image and Video Based Face Anti-spoofing [article]

Suman Saha, Wenhao Xu, Menelaos Kanakis, Stamatios Georgoulis, Yuhua Chen, Danda Pani Paudel, Luc Van Gool
2020 arXiv   pre-print
Face anti-spoofing is a measure towards this direction for bio-metric user authentication, and in particular face recognition, that tries to prevent spoof attacks.  ...  detect spoof attacks.  ...  face anti-spoofing datasets.  ... 
arXiv:1912.07124v2 fatcat:3uqylqsnhvc5hlb4jjz5ipsg3a

Generalized face anti-spoofing by detecting pulse from face videos

Xiaobai Li, Jukka Komulainen, Guoying Zhao, Pong-Chi Yuen, Matti Pietikainen
2016 2016 23rd International Conference on Pattern Recognition (ICPR)  
Here we propose a robust anti-spoofing method by detecting pulse from face videos.  ...  Face biometric systems are vulnerable to spoofing attacks. Such attacks can be performed in many ways, including presenting a falsified image, video or 3D mask of a valid user.  ...  In real-world applications, face biometric systems are operating in open environments when unknown input devices and unseen attack scenarios will be definitely encountered.  ... 
doi:10.1109/icpr.2016.7900300 dblp:conf/icpr/LiKZYP16 fatcat:5py6nr32t5hz3lxppllitpiv3m

Learning Generalized Spoof Cues for Face Anti-spoofing [article]

Haocheng Feng and Zhibin Hong and Haixiao Yue and Yang Chen and Keyao Wang and Junyu Han and Jingtuo Liu and Errui Ding
2020 arXiv   pre-print
Many existing face anti-spoofing (FAS) methods focus on modeling the decision boundaries for some predefined spoof types.  ...  The generator minimizes the spoof cues of live samples while imposes no explicit constraint on those of spoof samples to generalize well to unseen attacks.  ...  and the spoof open-set.  ... 
arXiv:2005.03922v1 fatcat:tsqoi5rqzrcarlhdw7ss7a6qyy

Face Biometrics Under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions

Abdenour Hadid
2014 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops  
The goal of this position paper is to share the lessons learned about spoofing and antispoofing in face biometrics, and to highlight open issues and future directions.  ...  , proposing new countermeasures, setting standards/protocols, and recording databases for the analysis of spoofing attacks to a wide range of biometrics including face, voice, gait, fingerprints, retina  ...  FACE ANTI-SPOOFING METHODS We discuss in this section some existing works in the literature on face anti-spoofing.  ... 
doi:10.1109/cvprw.2014.22 dblp:conf/cvpr/Hadid14 fatcat:kjkgh6av3fglplwqpdakmoiqva

Deep Learning for Face Anti-Spoofing: A Survey [article]

Zitong Yu, Yunxiao Qin, Xiaobai Li, Chenxu Zhao, Zhen Lei, Guoying Zhao
2022 arXiv   pre-print
Face anti-spoofing (FAS) has lately attracted increasing attention due to its vital role in securing face recognition systems from presentation attacks (PAs).  ...  ., pseudo depth map); 2) in addition to traditional intra-dataset evaluation, we collect and analyze the latest methods specially designed for domain generalization and open-set FAS; and 3) besides commercial  ...  in the real-world open-set scenarios (i.e., both known and unknown attacks).  ... 
arXiv:2106.14948v2 fatcat:wsheo7hbwvewhjoe6ykwjuqfii

On the Use of Client Identity Information for Face Antispoofing

Ivana Chingovska, Andre Rabello dos Anjos
2015 IEEE Transactions on Information Forensics and Security  
capabilities on unseen types of spoofing attacks.  ...  Regardless of the biometric mode, the typical approach of anti-spoofing systems is to classify biometric evidence based on features discriminating between real accesses and spoofing attacks.  ...  Indeed, having in mind that the possibilities for inventing novel spoofing attacks are unlimited, exhibiting robustness to unseen spoofing attacks may be a major security asset of anti-spoofing systems  ... 
doi:10.1109/tifs.2015.2400392 fatcat:rijf27jgrrbbzilzylnmpc2wq4

DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing [article]

Rizhao Cai, Haoliang Li, Shiqi Wang, Changsheng Chen, Alex Chichung Kot
2020 arXiv   pre-print
In particular, we model the behavior of exploring face-spoofing-related information from image sub-patches by leveraging deep reinforcement learning.  ...  to gain more discriminative information, for the face anti-spoofing problem, we propose a novel framework based on the Convolutional Neural Network (CNN) and the Recurrent Neural Network (RNN).  ...  This indicates the setting of unseen presentation attack types is more challenging than unseen faces poses and expressions as well as unseen attack mediums.  ... 
arXiv:2009.07529v2 fatcat:mouozrxn5zho3hgtty2p4p32zm

Aurora Guard: Reliable Face Anti-Spoofing via Mobile Lighting System [article]

Jian Zhang, Ying Tai, Taiping Yao, Jia Meng, Shouhong Ding, Chengjie Wang, Jilin Li, Feiyue Huang, Rongrong Ji
2021 arXiv   pre-print
In this paper, we propose a simple yet effective face anti-spoofing system, termed Aurora Guard (AG).  ...  Despite the increasing reliability of cutting-edge face authentication/verification systems to variations like blinking eye and subtle facial expression, anti-spoofing against high-resolution rendering  ...  Comparison to State-of-the-Art Face Anti-Spoofing.  ... 
arXiv:2102.00713v1 fatcat:lygqlqblnfevzgjqbu2htg4axe

NAS-FAS: Static-Dynamic Central Difference Network Search for Face Anti-Spoofing [article]

Zitong Yu, Jun Wan, Yunxiao Qin, Xiaobai Li, Stan Z. Li, Guoying Zhao
2020 IEEE Transactions on Software Engineering   pre-print
Face anti-spoofing (FAS) plays a vital role in securing face recognition systems. Existing methods heavily rely on the expert-designed networks, which may lead to a sub-optimal solution for FAS task.  ...  The challenges of utilizing NAS for FAS are in two folds: the networks searched on 1) a specific acquisition condition might perform poorly in unseen conditions, and 2) particular spoofing attacks might  ...  Open-Set Face Anti-Spoofing. Most existing FAS methods are supervised by predefined scenarios and PAs.  ... 
doi:10.1109/tpami.2020.3036338 pmid:33166249 arXiv:2011.02062v1 fatcat:cshgog3xevagdifydveyfgm7fi

A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns

Federico Alegre, Asmaa Amehraye, Nicholas Evans
2013 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS)  
Since the exact nature of spoofing attacks can never be known in practice, there is thus a need for generalised countermeasures which can detect previously unseen spoofing attacks.  ...  The new countermeasure captures differences in the spectro-temporal texture of genuine and spoofed speech, but relies only on a model of the former.  ...  Non-uniform patterns are discarded and normalised histograms of the remaining uniform LBPs in each row are concatenated to form the new anti-spoofing feature. of countermeasures to unseen spoofing attacks  ... 
doi:10.1109/btas.2013.6712706 dblp:conf/btas/AlegreAE13 fatcat:63wgwwuf55bm3cebvgeqg2hize

On Disentangling Spoof Trace for Generic Face Anti-Spoofing [article]

Yaojie Liu, Joel Stehouwer, Xiaoming Liu
2020 arXiv   pre-print
Prior studies show that the key to face anti-spoofing lies in the subtle image pattern, termed "spoof trace", e.g., color distortion, 3D mask edge, Moire pattern, and many others.  ...  Our method demonstrates superior spoof detection performance on both seen and unseen spoof scenarios while providing visually convincing estimation of spoof traces.  ...  Anti-Spoofing for Unknown Spoof Types Another important aspect of anti-spoofing model is to generalize to the unknown/unseen.  ... 
arXiv:2007.09273v1 fatcat:ep25wv3jxfgc5fs5fa2lm3b7my

Face recognition under spoofing attacks: countermeasures and research directions

Lei Li, Paulo Lobato Correia, Abdenour Hadid
2018 IET Biometrics  
Among tangible threats facing current biometric systems are spoofing attacks.  ...  This study presents a comprehensive overview of the recent advances in face anti-spoofing state-of-the-art, discussing existing methodologies, available benchmarking databases, reported results and, more  ...  An open set fingerprint spoof detection was presented in [74] .  ... 
doi:10.1049/iet-bmt.2017.0089 fatcat:rocm5fkk5jhopn5u6tpen54czi
« Previous Showing results 1 — 15 out of 414 results