2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops 2013
DOI: 10.1109/cvprw.2013.23
|View full text |Cite
|
Sign up to set email alerts
|

Computationally Efficient Face Spoofing Detection with Motion Magnification

Abstract: For a robust face biometric system, a reliable antispoofing approach must be deployed to circumvent the print and replay attacks. Several techniques have been proposed to counter face spoofing, however a robust solution that is computationally efficient is still unavailable. This paper presents a new approach for spoofing detection in face videos using motion magnification. Eulerian motion magnification approach is used to enhance the facial expressions commonly exhibited by subjects in a captured video. Next,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
127
0
7

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 202 publications
(137 citation statements)
references
References 15 publications
(18 reference statements)
1
127
0
7
Order By: Relevance
“…Following another trail to the same end, several notable works use lowlevel texture descriptors extracted from the face region, like Local Binary Patterns (LBP) [16], [17], Gabor wavelets [10] or Histogram of Oriented Gradients (HOG) [9]. Furthermore, [9] demonstrated the benefit of extracting these features from face components, like eyes, nose or mouth, while [18] uses them on faces whose micro and macro motion is enhanced using motion magnification technique. [19] indicates that low-level features can be used to detect the edges of a spoofing media.…”
Section: Related Workmentioning
confidence: 99%
“…Following another trail to the same end, several notable works use lowlevel texture descriptors extracted from the face region, like Local Binary Patterns (LBP) [16], [17], Gabor wavelets [10] or Histogram of Oriented Gradients (HOG) [9]. Furthermore, [9] demonstrated the benefit of extracting these features from face components, like eyes, nose or mouth, while [18] uses them on faces whose micro and macro motion is enhanced using motion magnification technique. [19] indicates that low-level features can be used to detect the edges of a spoofing media.…”
Section: Related Workmentioning
confidence: 99%
“…Bu görünemeyen sinyallerdeki hareketi ortaya çıkarabilmek ve bu hareketi büyütmek için literatürde görüntü büyütme yöntemlerinin uygulandığı çalışmalar yapılmıştır. Görüntü büyütme yöntemleri, Lagrange ve Euler yaklaşımı olmak üzere iki temel kategoriye ayrılmaktadır (Javaid et al 2013;Rubinstein, 2014;Wu et al 2012;Bharadwaj et al 2013;Wadhwa et al 2013;Chambino, 2013;Liu et al 2014;Gogia and Liu 2014;Bharadwaj et al 2014;Sarode and Mandaogade 2014a;Sarode and Mandaogade 2014b;Elgharib et al 2015).…”
Section: Introductionunclassified
“…Lagrange yaklaşımı, bir pikselin yörüngesinin zamanla izlenmesi düşüncesine dayalı bir yaklaşımdır (Rubinstein, 2014;Wu et al 2012;Bharadwaj et al 2013;Chambino, 2013;Bharadwaj et al 2014;Sarode and Mandaogade 2014a;Sarode and Mandaogade 2014b;Liu et al 2005). Bu yaklaşımda, hareketler açıkça tahmin edilmektedir (Elgharib et al 2015).…”
Section: Introductionunclassified
See 2 more Smart Citations