Results 21 to 30 of about 10,579 (187)
Hybrid Algorithm for Face Spoof Detection
Abstract: The face spoof detection is the approach which can detect spoofed face. The face spoof detection methods has various phases which include pre-processing, feature extraction and classification. The classification algorithm can classify into two classes which are spoofed or not spoofed.
Abhishek Mittal +2 more
openaire +1 more source
Anomaly Detection with Transformer in Face Anti-spoofing
Transformers are emerging as the new gold standard in various computer vision applications, and have already been used in face anti-spoofing demonstrating competitive performance. In this paper, we propose a network with the ViT transformer and ResNet as the backbone for anomaly detection in face anti-spoofing and compare the performance of various one-
Abduh, Latifah +2 more
openaire +3 more sources
Generalized face anti-spoofing by detecting pulse from face videos [PDF]
Face biometric systems are vulnerable to spoofing attacks. Such attacks can be performed in many ways, including presenting a falsified image, video or 3D mask of a valid user. A widely used approach for differentiating genuine faces from fake ones has been to capture their inherent differences in (2D or 3D) texture using local descriptors.
Li, X. (Xiaobai) +4 more
openaire +2 more sources
When satellite navigation terminal sensors encounter malicious signal spoofing or interference, if attention is not paid to improving their anti-spoofing ability, the performance of the sensors will be seriously affected.
Yangjun Gao, Guangyun Li
doaj +1 more source
A Real-Time Face Detection Method Based on Blink Detection
Face anti-spoofing refers to the computer determining whether the face detected is a real face or a forged face. In user authentication scenarios, photo fraud attacks are easy to occur, where an illegal user logs into the system using a legitimate user ...
Hui Qi +5 more
doaj +1 more source
Detection of Face Spoofing Using Visual Dynamics
Rendering a face recognition system robust is vital in order to safeguard it against spoof attacks carried out using printed pictures of a victim (also known as print attack) or a replayed video of the person (replay attack). A key property in distinguishing a live, valid access from printed media or replayed videos is by exploiting the information ...
Tirunagari, S +5 more
openaire +4 more sources
Discriminative representation combinations for accurate face spoofing detection [PDF]
Three discriminative representations for face presentation attack detection are introduced in this paper. Firstly we design a descriptor called spatial pyramid coding micro-texture (SPMT) feature to characterize local appearance information. Secondly we utilize the SSD, which is a deep learning framework for detection, to excavate context cues and ...
Xiao Song +3 more
openaire +2 more sources
A Testbed for Developing and Evaluating GNSS Signal Authentication Techniques [PDF]
An experimental testbed has been created for developing and evaluating Global Navigation Satellite System (GNSS) signal authentication techniques.
Bhatti, Jahshan A. +3 more
core +1 more source
Face recognition-based attendance system with anti-spoofing, system alert, and email automation
The subject matter of the article is the design of an attendance system based on face recognition with anti-spoofing, system alarm, and Email Automation to improve accuracy and efficiency, highlighting its potential to revolutionize traditional ...
Md. Apu Hosen +4 more
doaj +1 more source
Deteksi Serangan Spoofing Wajah Menggunakan Convolutional Neural Network
Facial recognition-based biometric authentication is increasingly frequently employed. However, a facial recognition system should not only recognize an individual's face, but it should also be capable of detecting spoofing attempts using printed faces ...
Raden Budiarto Hadiprakoso +1 more
doaj +1 more source

