2018
DOI: 10.1007/978-3-319-94211-7_46
|View full text |Cite
|
Sign up to set email alerts
|

Designing Efficient Spoof Detection Scheme for Face Biometric

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…The anti-spoofing methods for face biometric has been studied recently using different handcrafted and deep learnt techniques [4,7,[14][15][16][22][23][24][25][26][27][28][29]. In [27] multi-level local binary (MLBP) and CNN schemes has been proposed to obtain hybrid features from two different exploited feature vectors.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The anti-spoofing methods for face biometric has been studied recently using different handcrafted and deep learnt techniques [4,7,[14][15][16][22][23][24][25][26][27][28][29]. In [27] multi-level local binary (MLBP) and CNN schemes has been proposed to obtain hybrid features from two different exploited feature vectors.…”
Section: Related Workmentioning
confidence: 99%
“…In general, spoof detection is quite challenging in the biometric area and accordingly the investigation of its effect on different modalities such as face, iris, fingerprint, multimodal biometric systems, etc. is encouraged [2][3][4][5][6][7][8][9][10][11][12][13]. Typically, texture, motion and liveness analyses are common techniques in biometric systems to counter spoofing attacks [2,[14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…The problem of spoof attack detection for face biometric has been studied recently using different handcrafted and deep learnt techniques [12,16,[23][24][25][31][32][33][34][35][36][37][38]. In [16], a novel double anti-spoofing pipeline has been proposed for face biometrics based on selection of optimized textures and image quality assessment techniques for print and video attacks. The paper applied different texture and image quality algorithms to compare the ability of their proposed framework.…”
Section: Related Workmentioning
confidence: 99%
“…The feature extraction step of this study considers an extension of LBP texture extractor called OVLBP in order to describe the local spatial structure of face images. In general, LBP introduced by Ojala In general, the use of histogram-based methods for face spoof scenarios to detect attacks specifically print and video attacks has been considered as sufficient factor in several studies [16,18,[32][33][34]. This study applies idea of overlapped LBP histograms to obtain more significant histograms as handcrafted facial texture extractor for print and video attacks.…”
Section: Handcrafted Facial Texture Extraction Using Ovlbpmentioning
confidence: 99%
See 1 more Smart Citation