2019
DOI: 10.1016/j.patcog.2018.08.019
|View full text |Cite
|
Sign up to set email alerts
|

Discriminative representation combinations for accurate face spoofing detection

Abstract: Three discriminative representations for face presentation attack detection are introduced in this paper. Firstly we design a descriptor called spatial pyramid coding micro-texture (SPMT) feature to characterize local appearance information. Secondly we utilize the SSD, which is a deep learning framework for detection, to excavate context cues and conduct end-to-end face presentation attack detection. Finally we design a descriptor called template face matched binocular depth (TFBD) feature to characterize ste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 61 publications
(25 citation statements)
references
References 51 publications
0
24
1
Order By: Relevance
“…Therefore, not only the research community but also the industry has recognized face anti-spoofing [18,19,4,33,39,11,23,55,1,29,12,49,45,54,21] as a critical role in securing the face recognition system. In the past few years, both traditional methods [14,42,9] and CNN-based methods [35,38,20,24,46] have shown effectiveness in discriminating between the living and spoofing face. They often formalize face anti-spoofing as a binary classification between spoofing and living images.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, not only the research community but also the industry has recognized face anti-spoofing [18,19,4,33,39,11,23,55,1,29,12,49,45,54,21] as a critical role in securing the face recognition system. In the past few years, both traditional methods [14,42,9] and CNN-based methods [35,38,20,24,46] have shown effectiveness in discriminating between the living and spoofing face. They often formalize face anti-spoofing as a binary classification between spoofing and living images.…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, the last two approaches analysed [87,90] outperform our technique by one order of magnitude for the CASIA database. However, our best result is three time better than those reported in Song et al [87] for REPLAY-ATTACK (i.e. 0.00% vs. 0.03%).…”
Section: Benchmark With State Of the Artmentioning
confidence: 79%
“…After extracting valid features, an efficient and accurate classifier is supposed to design. Various classifiers are adopted in face presentation attack detection (see [12,[42][43][44], for instance). In general, the monotone classifier structure equipped with fixed parameters possibly leads to the deviation of classification results.…”
Section: Design Of the Classifiermentioning
confidence: 99%