Results 21 to 30 of about 2,994,964 (187)

Detection of face spoofing attacks on biometric identification systems

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2023
The object of the study is spoofing attacks on identification systems based on human face biometrics. The article provides an overview of the main types of spoofing attacks and features of their detection, as well as an overview of existing solutions for
D. Zhuravlov, О. Polshakova
doaj   +1 more source

Face anti-spoofing with joint spoofing medium detection and eye blinking analysis [PDF]

open access: yesКомпьютерная оптика, 2019
Modern biometric systems based on face recognition demonstrate high recognition quality, but they are vulnerable to face presentation attacks, such as photo or replay attack.
Mikhail Nikitin   +2 more
doaj   +1 more source

A Novel Face Spoofing Detection Using hand crafted MobileNet

open access: yesVFAST Transactions on Software Engineering, 2023
There are several uses for face spoofing detection, including human-robot communication, business, film, hotel services, and even politics. Despite the adoption of numerous supervised and unsupervised techniques in a wide range of domains, proper ...
Sayyam Zahra   +4 more
semanticscholar   +1 more source

Visible/Infrared face spoofing detection using texture descriptors [PDF]

open access: yesMATEC Web of Conferences, 2019
With extensive applications of face recognition technologies, face anti-spoofing played an important role and has drawn a great attention in the security systems. This study represents a multi-spectral face anti-spoofing method working with both visible (
Mohamed Shaimaa   +2 more
doaj   +1 more source

A Cascade Face Spoofing Detector Based on Face Anti-Spoofing R-CNN and Improved Retinex LBP

open access: yesIEEE Access, 2019
In consideration of secure and convenient, face gains increasing attention in variety of fields during the past decades. Since human face is most accessible from our daily life and preserves the richest information, face based biometric systems are ...
Haonan Chen   +3 more
doaj   +1 more source

Learning Meta Model for Zero- and Few-shot Face Anti-spoofing [PDF]

open access: yes, 2019
Face anti-spoofing is crucial to the security of face recognition systems. Most previous methods formulate face anti-spoofing as a supervised learning problem to detect various predefined presentation attacks, which need large scale training data to ...
Fu, Tianyu   +8 more
core   +2 more sources

A Slowly Varying Spoofing Algorithm on Loosely Coupled GNSS/IMU Avoiding Multiple Anti-Spoofing Techniques

open access: yesSensors, 2022
When satellite navigation terminal sensors encounter malicious signal spoofing or interference, if attention is not paid to improving their anti-spoofing ability, the performance of the sensors will be seriously affected.
Yangjun Gao, Guangyun Li
doaj   +1 more source

SLIP: Spoof-Aware One-Class Face Anti-Spoofing with Language Image Pretraining [PDF]

open access: yesAAAI Conference on Artificial Intelligence
Face anti-spoofing (FAS) plays a pivotal role in ensuring the security and reliability of face recognition systems. With advancements in vision-language pretrained (VLP) models, recent two-class FAS techniques have leveraged the advantages of using VLP ...
Pei-Kai Huang   +5 more
semanticscholar   +1 more source

Face Liveness Detection Using Artificial Intelligence Techniques: A Systematic Literature Review and Future Directions

open access: yesBig Data and Cognitive Computing, 2023
Biometrics has been evolving as an exciting yet challenging area in the last decade. Though face recognition is one of the most promising biometrics techniques, it is vulnerable to spoofing threats.
Smita Khairnar   +3 more
doaj   +1 more source

One-Class Learning Method Based on Live Correlation Loss for Face Anti-Spoofing

open access: yesIEEE Access, 2020
As biometric authentication systems are popularly used in various mobile devices, e.g., smart-phones and tablets, face anti-spoofing methods have been actively developed for the high-level security.
Seokjae Lim   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy