Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








422 Hits in 3.8 sec

Colour Texture Analysis of Face Spoof Detection using CNN Classifier

2019 International Journal of Engineering and Advanced Technology  
Here the work provides an innovative approach that perceives spoofed face using texture analysis (colour)by exploiting combined colour texture information from various channels such as luminance and chrominance  ...  The emphasis on analysis of various research schemes of non – intrusive software based face spoofing detection is now a days gaining reputation in image and video processing tools.  ...  Here the work provides an innovative approach that perceives spoofed face using texture analysis (colour)by exploiting combined colour texture information from various channels such as luminance and chrominance  ... 
doi:10.35940/ijeat.a3006.109119 fatcat:zwex4sij2ngp5djy43bwceny7u

Face recognition under spoofing attacks: countermeasures and research directions

Lei Li, Paulo Lobato Correia, Abdenour Hadid
2018 IET Biometrics  
As a case study for illustration, a face anti-spoofing method is described, which employs a colour local binary pattern descriptor to jointly analyse colour and texture available from the luminance and  ...  Two publicly available databases are used for the analysis, and the importance of inter-database evaluation to attest the generalisation capabilities of an anti-spoofing method is discussed.  ...  Case study for illustration and evaluation: face spoofing detection using colour texture analysis In contrast to previous reviews, this section takes the example of a promising face anti-spoofing method  ... 
doi:10.1049/iet-bmt.2017.0089 fatcat:rocm5fkk5jhopn5u6tpen54czi

The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras

Ghazel Albakri, Sharifa Alghowinem
2019 Sensors  
For example, in systems that utilise face authentication as biometrics, a liveness is assured using an estimation of blood flow, or analysis of quality of the face image.  ...  Even though biometric technology increases the security of systems that use it, they are prone to spoof attacks where attempts of fraudulent biometrics are used.  ...  [16] presented a novel software-based approach that use colour texture analysis to detect spoof attacks.  ... 
doi:10.3390/s19081928 fatcat:nwvshuksxfgf7ee7gdzonu3zhi

Effect of Face Tampering on Face Recognition

Aruni Singh, Sanjay Kumar Singh
2013 Signal & Image Processing An International Journal  
Modern face recognition systems are vulnerable to spoofing attack. Spoofing attack occurs when a person tries to cheat the system by presenting fake biometric data gaining unlawful access.  ...  The motivation behind this paper is to present the effect of face tampering on various categories of face recognition algorithms.  ...  [16] represents the face image spoofing detection using texture and local shape analysis to detect the playback photo attack from single face image.  ... 
doi:10.5121/sipij.2013.4407 fatcat:3n446zkeabaytbn43idhvtiil4

Fusion Methods for Face Presentation Attack Detection

Faseela Abdullakutty, Pamela Johnston, Eyad Elyan
2022 Sensors  
In this paper, we present a simple feature-fusion method that integrates features extracted by using pre-trained, deep learning models with more traditional colour and texture features.  ...  Face presentation attacks (PA) are a serious threat to face recognition (FR) applications. These attacks are easy to execute and difficult to detect.  ...  Data Availability Statement: The experiments in this research article used three public Face Anti-Spoofing datasets. They are They are CASIA [32] , Replay Attack [2] , and SiW [33] .  ... 
doi:10.3390/s22145196 pmid:35890876 pmcid:PMC9316967 fatcat:otodipdo2zhw5k2sxodzckg3wy

Face Spoof Detection System Based on Genetic Algorithm and Artificial Intelligence Technique: A Review

Diksha Anand, Kamal Gupta
2018 International Journal of Advanced Research in Computer Science and Software Engineering  
Due to these attacks, system should require a face spoof detection system. A face spoof detection systems have an ability to identify whether a face is from a real person or a fake image.  ...  Face spoofing detection system automatically identifies the human face is a true face or a fake face.  ...  Gabor filters + Laplacian blur detection + color moments + Local Binary Patterns (LBP) Boulkenafet, Z.et. al, 2016 Face Spoofing Detection Using Colour Texture Analysis Color texture  ... 
doi:10.23956/ijarcsse.v8i6.722 fatcat:egk7icu4nnev7apfybf4fveyuq

Facial biometric presentation attack detection using temporal texture co-occurrence

S. Pan, F. Deravi
2018 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA)  
In this paper, we propose a new spoofing detection method, which is based on temporal changes in texture information.  ...  However, the potential for face spoofing attacks remains a significant challenge to the security of such systems and finding better means of detecting such presentation attacks has become a necessity.  ...  On the other hand, the dynamic Feature-Level spoofing approaches use temporal information for face spoofing detection.  ... 
doi:10.1109/isba.2018.8311464 dblp:conf/isba/PanD18 fatcat:2lduvnolxrhorausszgei6p3di

A systematic review on face spoofing detection methods

Anu Joseph, Gigi Joseph
2022 International Journal of Engineering Technology and Management Sciences  
Face recognition software is susceptible to fake images and video attacks. Anti-spoofing solutions are useful in these situations for thwarting these attacks.  ...  Despite numerous face anti-spoofing or liveness detection techniques being put out, the problem has not been addressed since it is challenging to identify the features and techniques for spoof assaults  ...  Other datasets used for face spoof detection training and testing include bespoke datasets, the Replay Attack Database, the CASIA Face Antispoofing Database, and real and spoof photographs from the NUAA  ... 
doi:10.46647/ijetms.2022.v06i05.055 fatcat:nzjxumpm6bfdta52ncaqc267ca

Technologies to Overcome Spoofing Attack in Facial Recognition

2019 International journal of recent technology and engineering  
The identification technologies used nowadays consists of biometrics as an essential component.  ...  One of the major threats the current biometric system possess are the spoofing attacks.  ...  Color Texture Analysis for Spoofing Detection It has been found that counterfeit faces of high resolution are almost impossible to detect using only luminosity information of webcam quality images.  ... 
doi:10.35940/ijrte.b1007.0782s419 fatcat:dlma4rawu5b2plpggegl5zzoee

A Novel Feature Descriptor for Face Anti-Spoofing Using Texture Based Method

R. J. Raghavendra, R. Sanjeev Kunte
2020 Cybernetics and Information Technologies  
The proposed face anti-spoofing method performs better than LBP, LTP and LGS.  ...  Three Experiments were performed by using all the four texture descriptors (LBP, LTP, LGS and EDDTCP) and the results are compared.  ...  This method proved better results compared to texture analysis based methods for mask detection.  ... 
doi:10.2478/cait-2020-0035 fatcat:drvh4vszgbe6zjm6dftqm53cmq

Deep convolutional neural networks for face and iris presentation attack detection: Survey and case study

Yomna SafaaElDin, Mohamed Moustafa, Hani Mahdi
2020 IET Biometrics  
Additionally, they propose the use of a single deep network trained to detect both face and iris attacks.  ...  In this study, the authors survey the approaches presented in the recent literature to detect face and iris presentation attacks.  ...  Later, the same group released MSU-USSA [77] and used a combination of texture analysis (LBP and colour) and image analysis techniques.  ... 
doi:10.1049/iet-bmt.2020.0004 fatcat:ojmuwissurhtvfxbtpfhxk4g5i

Face Anti-Spoofing Methods: A Comparative Analysis through the Lens of a Comprehensive Review

Chanchala Kamat
2024 International Journal for Research in Applied Science and Engineering Technology  
Abstract: In computer vision, face anti-spoofing is an important aspect that aims to differentiate genuine facial features from spoofing attempts.  ...  In conclusion, while progress has been made, the paper emphasises the dynamic nature of face anti-spoofing research.  ...  . while the problem of spoofing detection comes from a texture analysis approach based on multi-scale local binary patterns that identifies live people versus face prints but also provides features usable  ... 
doi:10.22214/ijraset.2024.58383 fatcat:xvmpwew6pjeizii3bupgt7idny

Spatio-Temporal Texture Features for Presentation Attack Detection in Biometric Systems

Shi Pan, Farzin Deravi
2019 2019 Eighth International Conference on Emerging Security Technologies (EST)  
some types of spoofing attacks.  ...  Spatio-temporal information is valuable as a discriminative cue for presentation attack detection, where the temporal texture changes and fine-grained motions (such as eye blinking) can be indicative of  ...  RELATE WORK The existing PAD research includes various research directions such as static texture analysis [8] , dynamic texture analysis [5] and challenge-responses strategies [9] .  ... 
doi:10.1109/est.2019.8806220 dblp:conf/est/PanD19 fatcat:5odjko3wtjfjpfpupyjn2wrmge

Face anti-spoofing with multifeature videolet aggregation

Talha Ahmad Siddiqui, Samarth Bharadwaj, Tejas I. Dhamecha, Akshay Agarwal, Mayank Vatsa, Richa Singh, Nalini Ratha
2016 2016 23rd International Conference on Pattern Recognition (ICPR)  
This paper presents a novel multifeature evidence aggregation method for face spoofing detection.  ...  The proposed method fuses evidence from features encoding of both texture and motion (liveness) properties in the face and also the surrounding scene regions.  ...  Depending on the type of features used for information extraction and representation, face anti-spoofing techniques in literature can be classified into image texture analysis and temporal evidence based  ... 
doi:10.1109/icpr.2016.7899772 dblp:conf/icpr/SiddiquiBDAVSR16 fatcat:rmvs7l3yoveizdd2tzqw2ttvri

Detection of presentation attacks using imaging and liveness attributes

Lucas Royes Schardosim, Raphael Ruschel dos Santos, Jacob Scharcanski
2019 Electronics Letters  
The proposed methodology for presentation attack detection relies on the observation of imaging and liveness attributes, such as the detection of liveness using the face deformation energy, and imaging  ...  Despite the success achieved by face biometrics, face spoofing attacks (or presentation attacks) still pose a challenge to researchers.  ...  Unlike methods that use motion analysis, texture-based methods can use a single frame to detect presentation attacks.  ... 
doi:10.1049/el.2019.2639 fatcat:dk35wcmgqramnfrd6f257oahdy
« Previous Showing results 1 — 15 out of 422 results