Results 21 to 30 of about 7,700 (189)
Learning Meta Pattern for Face Anti-Spoofing
Accepted by IEEE Transactions on Information Forensics and Security (https://ieeexplore.ieee.org.remotexs.ntu.edu.sg/document/9732458) Source code available in https://github.com/RizhaoCai ...
Rizhao Cai +5 more
openaire +3 more sources
Face Anti-Spoofing with Human Material Perception [PDF]
Face anti-spoofing (FAS) plays a vital role in securing the face recognition systems from presentation attacks. Most existing FAS methods capture various cues (e.g., texture, depth and reflection) to distinguish the live faces from the spoofing faces.
Yu, Z. (Zitong) +4 more
openaire +3 more sources
Face recognition-based attendance system with anti-spoofing, system alert, and email automation
The subject matter of the article is the design of an attendance system based on face recognition with anti-spoofing, system alarm, and Email Automation to improve accuracy and efficiency, highlighting its potential to revolutionize traditional ...
Md. Apu Hosen +4 more
doaj +1 more source
A Review on Face Anti-Spoofing
The biometric system is a security technology that uses information based on a living person's characteristics to verify or recognize the identity, such as facial recognition. Face recognition has numerous applications in the real world, such as access control and surveillance. But face recognition has a security issue of spoofing. A face anti-spoofing,
Perdana, Rizky Naufal +2 more
openaire +3 more sources
A Dataset and Benchmark Towards Multi-Modal Face Anti-Spoofing Under Surveillance Scenarios
Face Anti-spoofing (FAS) is a challenging problem due to complex serving scenarios and diverse face presentation attack patterns. Especially when captured images are low-resolution, blurry, and coming from different domains, the performance of FAS will ...
Xudong Chen +3 more
doaj +1 more source
Generative Domain Adaptation for Face Anti-Spoofing
Face anti-spoofing (FAS) approaches based on unsupervised domain adaption (UDA) have drawn growing attention due to promising performances for target scenarios. Most existing UDA FAS methods typically fit the trained models to the target domain via aligning the distribution of semantic high-level features. However, insufficient supervision of unlabeled
Qianyu Zhou 0001 +6 more
openaire +2 more sources
Anomaly Detection with Transformer in Face Anti-spoofing
Transformers are emerging as the new gold standard in various computer vision applications, and have already been used in face anti-spoofing demonstrating competitive performance. In this paper, we propose a network with the ViT transformer and ResNet as the backbone for anomaly detection in face anti-spoofing and compare the performance of various one-
Abduh, Latifah +2 more
openaire +3 more sources
One-Class Learning Method Based on Live Correlation Loss for Face Anti-Spoofing
As biometric authentication systems are popularly used in various mobile devices, e.g., smart-phones and tablets, face anti-spoofing methods have been actively developed for the high-level security.
Seokjae Lim +4 more
doaj +1 more source
Fine-Grained Annotation for Face Anti-Spoofing
Face anti-spoofing plays a critical role in safeguarding facial recognition systems against presentation attacks. While existing deep learning methods show promising results, they still suffer from the lack of fine-grained annotations, which lead models to learn task-irrelevant or unfaithful features. In this paper, we propose a fine-grained annotation
Xu Chen, Yunde Jia, Yuwei Wu 0001
openaire +2 more sources
A Testbed for Developing and Evaluating GNSS Signal Authentication Techniques [PDF]
An experimental testbed has been created for developing and evaluating Global Navigation Satellite System (GNSS) signal authentication techniques.
Bhatti, Jahshan A. +3 more
core +1 more source

