A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Colour Texture Analysis of Face Spoof Detection using CNN Classifier
2019
International Journal of Engineering and Advanced Technology
Here the work provides an innovative approach that perceives spoofed face using texture analysis (colour)by exploiting combined colour texture information from various channels such as luminance and chrominance ...
The emphasis on analysis of various research schemes of non – intrusive software based face spoofing detection is now a days gaining reputation in image and video processing tools. ...
Here the work provides an innovative approach that perceives spoofed face using texture analysis (colour)by exploiting combined colour texture information from various channels such as luminance and chrominance ...
doi:10.35940/ijeat.a3006.109119
fatcat:zwex4sij2ngp5djy43bwceny7u
Face recognition under spoofing attacks: countermeasures and research directions
2018
IET Biometrics
As a case study for illustration, a face anti-spoofing method is described, which employs a colour local binary pattern descriptor to jointly analyse colour and texture available from the luminance and ...
Two publicly available databases are used for the analysis, and the importance of inter-database evaluation to attest the generalisation capabilities of an anti-spoofing method is discussed. ...
Case study for illustration and evaluation: face spoofing detection using colour texture analysis In contrast to previous reviews, this section takes the example of a promising face anti-spoofing method ...
doi:10.1049/iet-bmt.2017.0089
fatcat:rocm5fkk5jhopn5u6tpen54czi
The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras
2019
Sensors
For example, in systems that utilise face authentication as biometrics, a liveness is assured using an estimation of blood flow, or analysis of quality of the face image. ...
Even though biometric technology increases the security of systems that use it, they are prone to spoof attacks where attempts of fraudulent biometrics are used. ...
[16] presented a novel software-based approach that use colour texture analysis to detect spoof attacks. ...
doi:10.3390/s19081928
fatcat:nwvshuksxfgf7ee7gdzonu3zhi
Effect of Face Tampering on Face Recognition
2013
Signal & Image Processing An International Journal
Modern face recognition systems are vulnerable to spoofing attack. Spoofing attack occurs when a person tries to cheat the system by presenting fake biometric data gaining unlawful access. ...
The motivation behind this paper is to present the effect of face tampering on various categories of face recognition algorithms. ...
[16] represents the face image spoofing detection using texture and local shape analysis to detect the playback photo attack from single face image. ...
doi:10.5121/sipij.2013.4407
fatcat:3n446zkeabaytbn43idhvtiil4
Fusion Methods for Face Presentation Attack Detection
2022
Sensors
In this paper, we present a simple feature-fusion method that integrates features extracted by using pre-trained, deep learning models with more traditional colour and texture features. ...
Face presentation attacks (PA) are a serious threat to face recognition (FR) applications. These attacks are easy to execute and difficult to detect. ...
Data Availability Statement: The experiments in this research article used three public Face Anti-Spoofing datasets. They are They are CASIA [32] , Replay Attack [2] , and SiW [33] . ...
doi:10.3390/s22145196
pmid:35890876
pmcid:PMC9316967
fatcat:otodipdo2zhw5k2sxodzckg3wy
Face Spoof Detection System Based on Genetic Algorithm and Artificial Intelligence Technique: A Review
2018
International Journal of Advanced Research in Computer Science and Software Engineering
Due to these attacks, system should require a face spoof detection system. A face spoof detection systems have an ability to identify whether a face is from a real person or a fake image. ...
Face spoofing detection system automatically identifies the human face is a true face or a fake face. ...
Gabor filters + Laplacian
blur detection + color
moments + Local Binary
Patterns (LBP)
Boulkenafet,
Z.et. al, 2016
Face
Spoofing
Detection
Using
Colour
Texture
Analysis
Color texture ...
doi:10.23956/ijarcsse.v8i6.722
fatcat:egk7icu4nnev7apfybf4fveyuq
Facial biometric presentation attack detection using temporal texture co-occurrence
2018
2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA)
In this paper, we propose a new spoofing detection method, which is based on temporal changes in texture information. ...
However, the potential for face spoofing attacks remains a significant challenge to the security of such systems and finding better means of detecting such presentation attacks has become a necessity. ...
On the other hand, the dynamic Feature-Level spoofing approaches use temporal information for face spoofing detection. ...
doi:10.1109/isba.2018.8311464
dblp:conf/isba/PanD18
fatcat:2lduvnolxrhorausszgei6p3di
A systematic review on face spoofing detection methods
2022
International Journal of Engineering Technology and Management Sciences
Face recognition software is susceptible to fake images and video attacks. Anti-spoofing solutions are useful in these situations for thwarting these attacks. ...
Despite numerous face anti-spoofing or liveness detection techniques being put out, the problem has not been addressed since it is challenging to identify the features and techniques for spoof assaults ...
Other datasets used for face spoof detection training and testing include bespoke datasets, the Replay Attack Database, the CASIA Face Antispoofing Database, and real and spoof photographs from the NUAA ...
doi:10.46647/ijetms.2022.v06i05.055
fatcat:nzjxumpm6bfdta52ncaqc267ca
Technologies to Overcome Spoofing Attack in Facial Recognition
2019
International journal of recent technology and engineering
The identification technologies used nowadays consists of biometrics as an essential component. ...
One of the major threats the current biometric system possess are the spoofing attacks. ...
Color Texture Analysis for Spoofing Detection It has been found that counterfeit faces of high resolution are almost impossible to detect using only luminosity information of webcam quality images. ...
doi:10.35940/ijrte.b1007.0782s419
fatcat:dlma4rawu5b2plpggegl5zzoee
A Novel Feature Descriptor for Face Anti-Spoofing Using Texture Based Method
2020
Cybernetics and Information Technologies
The proposed face anti-spoofing method performs better than LBP, LTP and LGS. ...
Three Experiments were performed by using all the four texture descriptors (LBP, LTP, LGS and EDDTCP) and the results are compared. ...
This method proved better results compared to texture analysis based methods for mask detection. ...
doi:10.2478/cait-2020-0035
fatcat:drvh4vszgbe6zjm6dftqm53cmq
Deep convolutional neural networks for face and iris presentation attack detection: Survey and case study
2020
IET Biometrics
Additionally, they propose the use of a single deep network trained to detect both face and iris attacks. ...
In this study, the authors survey the approaches presented in the recent literature to detect face and iris presentation attacks. ...
Later, the same group released MSU-USSA [77] and used a combination of texture analysis (LBP and colour) and image analysis techniques. ...
doi:10.1049/iet-bmt.2020.0004
fatcat:ojmuwissurhtvfxbtpfhxk4g5i
Face Anti-Spoofing Methods: A Comparative Analysis through the Lens of a Comprehensive Review
2024
International Journal for Research in Applied Science and Engineering Technology
Abstract: In computer vision, face anti-spoofing is an important aspect that aims to differentiate genuine facial features from spoofing attempts. ...
In conclusion, while progress has been made, the paper emphasises the dynamic nature of face anti-spoofing research. ...
. while the problem of spoofing detection comes from a texture analysis approach based on multi-scale local binary patterns that identifies live people versus face prints but also provides features usable ...
doi:10.22214/ijraset.2024.58383
fatcat:xvmpwew6pjeizii3bupgt7idny
Spatio-Temporal Texture Features for Presentation Attack Detection in Biometric Systems
2019
2019 Eighth International Conference on Emerging Security Technologies (EST)
some types of spoofing attacks. ...
Spatio-temporal information is valuable as a discriminative cue for presentation attack detection, where the temporal texture changes and fine-grained motions (such as eye blinking) can be indicative of ...
RELATE WORK The existing PAD research includes various research directions such as static texture analysis [8] , dynamic texture analysis [5] and challenge-responses strategies [9] . ...
doi:10.1109/est.2019.8806220
dblp:conf/est/PanD19
fatcat:5odjko3wtjfjpfpupyjn2wrmge
Face anti-spoofing with multifeature videolet aggregation
2016
2016 23rd International Conference on Pattern Recognition (ICPR)
This paper presents a novel multifeature evidence aggregation method for face spoofing detection. ...
The proposed method fuses evidence from features encoding of both texture and motion (liveness) properties in the face and also the surrounding scene regions. ...
Depending on the type of features used for information extraction and representation, face anti-spoofing techniques in literature can be classified into image texture analysis and temporal evidence based ...
doi:10.1109/icpr.2016.7899772
dblp:conf/icpr/SiddiquiBDAVSR16
fatcat:rmvs7l3yoveizdd2tzqw2ttvri
Detection of presentation attacks using imaging and liveness attributes
2019
Electronics Letters
The proposed methodology for presentation attack detection relies on the observation of imaging and liveness attributes, such as the detection of liveness using the face deformation energy, and imaging ...
Despite the success achieved by face biometrics, face spoofing attacks (or presentation attacks) still pose a challenge to researchers. ...
Unlike methods that use motion analysis, texture-based methods can use a single frame to detect presentation attacks. ...
doi:10.1049/el.2019.2639
fatcat:dk35wcmgqramnfrd6f257oahdy
« Previous
Showing results 1 — 15 out of 422 results