Results 141 to 150 of about 10,620 (187)

Detection of Spoofing Medium Contours for Face Anti-Spoofing

IEEE Transactions on Circuits and Systems for Video Technology, 2021
Face anti-spoofing is an important step for secure face recognition. In this paper, we target on building a general classifier to detect the face images with spoofing medium contours (termed as SMCs for simplicity). To this end, we consider the task of face anti-spoofing as the detection of SMCs from the image.
Xun Zhu, Sheng Li, Xinpeng Zhang
exaly   +2 more sources

Face spoofing detection with local binary pattern network

Journal of Visual Communication and Image Representation, 2018
Abstract Nowadays, face biometric based access control systems are becoming ubiquitous in our daily life while they are still vulnerable to spoofing attacks. So developing robust and reliable methods to prevent such frauds is unavoidable. As deep learning techniques have achieved satisfactory performances in computer vision, they have also been ...
Lei Li, Xiaoyi Feng, Zhaoqiang Xia
exaly   +2 more sources

Face Spoofing Detection Using Colour Texture Analysis

IEEE Transactions on Information Forensics and Security, 2016
Research on non-intrusive software-based face spoofing detection schemes has been mainly focused on the analysis of the luminance information of the face images, hence discarding the chroma component, which can be very useful for discriminating fake faces from genuine ones.
Zinelabidine Boulkenafet   +2 more
exaly   +2 more sources

Texture and quality analysis for face spoofing detection

Computers & Electrical Engineering, 2021
Abstract Due to the increasing importance of security and access restrictions, the urge for implementing face recognition systems is increasing at an unprecedented rate. However, the vulnerability towards spoofing attacks limits the further progress of face recognition systems.
Neenu Daniel, A. Anitha
openaire   +1 more source

Face Spoofing Detection Using DenseNet

2021
Today, face recognition is the most widely used biometric recognition technology. However, face recognition is a biometric method that is vulnerable to spoofing. Types of spoofing attack include print, replay, and 3D mask. Methods based on hand-crafted features such as local binary patterns which use high-frequency features of images, are therefore ...
Su-Gyeong Yu   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy