Results 11 to 20 of about 7,700 (189)

Learning Meta Model for Zero- and Few-shot Face Anti-spoofing [PDF]

open access: yesCoRR, 2019
Face anti-spoofing is crucial to the security of face recognition systems. Most previous methods formulate face anti-spoofing as a supervised learning problem to detect various predefined presentation attacks, which need large scale training data to ...
Fu, Tianyu   +8 more
core   +3 more sources

Meta-Teacher For Face Anti-Spoofing [PDF]

open access: yesIEEE Transactions on Pattern Analysis and Machine Intelligence, 2022
Accepted by IEEE TPAMI ...
Yunxiao Qin   +5 more
openaire   +4 more sources

Hyperbolic Face Anti-Spoofing

open access: yesCoRR, 2023
Learning generalized face anti-spoofing (FAS) models against presentation attacks is essential for the security of face recognition systems. Previous FAS methods usually encourage models to extract discriminative features, of which the distances within the same class (bonafide or attack) are pushed close while those between bonafide and attack are ...
Shuangpeng Han   +5 more
openaire   +2 more sources

Self-Attention and MLP Auxiliary Convolution for Face Anti-Spoofing

open access: yesIEEE Access, 2023
Face features, as the most widely adopted and essential biometric characteristic in identity verification and recognition, play a crucial role in ensuring security.
Hanqing Gu   +4 more
doaj   +1 more source

Cross‐ethnicity face anti‐spoofing recognition challenge: A review

open access: yesIET Biometrics, 2021
Face anti‐spoofing is critical to prevent face recognition systems from a security breach. The biometrics community has achieved impressive progress recently due to the excellent performance of deep neural networks and the availability of large datasets.
Ajian Liu   +15 more
doaj   +1 more source

Face anti‐spoofing from the perspective of data sampling

open access: yesElectronics Letters, 2023
Without deploying face anti‐spoofing countermeasures, face recognition systems can be spoofed by presenting a printed photo, a video, or a silicon mask of a genuine user.
Usman Muhammad, Mourad Oussalah
doaj   +1 more source

Online Adaptive Personalization for Face Anti-Spoofing

open access: yes2022 IEEE International Conference on Image Processing (ICIP), 2022
Face authentication systems require a robust anti-spoofing module as they can be deceived by fabricating spoof images of authorized users. Most recent face anti-spoofing methods rely on optimized architectures and training objectives to alleviate the distribution shift between train and test users.
Davide Belli   +3 more
openaire   +2 more sources

Face anti-spoofing with joint spoofing medium detection and eye blinking analysis [PDF]

open access: yesКомпьютерная оптика, 2019
Modern biometric systems based on face recognition demonstrate high recognition quality, but they are vulnerable to face presentation attacks, such as photo or replay attack.
Mikhail Nikitin   +2 more
doaj   +1 more source

A Slowly Varying Spoofing Algorithm on Loosely Coupled GNSS/IMU Avoiding Multiple Anti-Spoofing Techniques

open access: yesSensors, 2022
When satellite navigation terminal sensors encounter malicious signal spoofing or interference, if attention is not paid to improving their anti-spoofing ability, the performance of the sensors will be seriously affected.
Yangjun Gao, Guangyun Li
doaj   +1 more source

Visible/Infrared face spoofing detection using texture descriptors [PDF]

open access: yesMATEC Web of Conferences, 2019
With extensive applications of face recognition technologies, face anti-spoofing played an important role and has drawn a great attention in the security systems. This study represents a multi-spectral face anti-spoofing method working with both visible (
Mohamed Shaimaa   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy