2017 International Conference on Computing, Communication and Automation (ICCCA) 2017
DOI: 10.1109/ccaa.2017.8229961
|View full text |Cite
|
Sign up to set email alerts
|

A comparative study on face spoofing attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 54 publications
(22 citation statements)
references
References 35 publications
0
20
0
2
Order By: Relevance
“…In fact, in ISO/IEC 30107 [47], research on sensor attacks related to fingerprint recognition and face recognition has been actively conducted. There is a result that the face recognition system is vulnerable to spoofing attack [48]. In addition, the iris recognition system and the facial recognition system are similar in overall score but score differently on privacy concerns.…”
Section: Discussion In This Section We Analyze the Weights Of Eachmentioning
confidence: 99%
“…In fact, in ISO/IEC 30107 [47], research on sensor attacks related to fingerprint recognition and face recognition has been actively conducted. There is a result that the face recognition system is vulnerable to spoofing attack [48]. In addition, the iris recognition system and the facial recognition system are similar in overall score but score differently on privacy concerns.…”
Section: Discussion In This Section We Analyze the Weights Of Eachmentioning
confidence: 99%
“…However, biometric presentation attacks can exist alongside the face authentication process. For example, attackers can source photos (photo attacks) or videos (replay attacks) of the person from social networking sites easily and present them to the authentication system [ 102 ]. Remote HR measurement technology can be incorporated to enhance the authentication system [ 103 ].…”
Section: Applicationsmentioning
confidence: 99%
“…These behaviors are all defined as the face spoofing attacks. The face spoofing attacks can be generally divided into three categories, namely photo attacks, video attacks, and 3D mask attacks [21], [22]:…”
Section: Related Work a Face Spoofing Attacksmentioning
confidence: 99%