2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2019
DOI: 10.1109/cvpr.2019.00362
|View full text |Cite
|
Sign up to set email alerts
|

Face Anti-Spoofing: Model Matters, so Does Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
129
0
2

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 187 publications
(132 citation statements)
references
References 31 publications
1
129
0
2
Order By: Relevance
“…Results on SiW. Table 4 compares the performance of our method with four state-of-the-art methods: Auxiliary [6], STASN [8], FAS-TD [13] and CDCN++ [4] on SiW dataset. It can be seen from Table 4 that the proposed NAS-FAS performs the best for all three protocols (0.12%, 0.04% and 1.52% ACER, respectively).…”
Section: Intra-dataset Intra-type Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…Results on SiW. Table 4 compares the performance of our method with four state-of-the-art methods: Auxiliary [6], STASN [8], FAS-TD [13] and CDCN++ [4] on SiW dataset. It can be seen from Table 4 that the proposed NAS-FAS performs the best for all three protocols (0.12%, 0.04% and 1.52% ACER, respectively).…”
Section: Intra-dataset Intra-type Testingmentioning
confidence: 99%
“…In the past few years, both traditional [1], [2], [3] and deep learning-based [4], [5], [6], [7], [8], [9], [10] methods have shown effectiveness for presentation attack detection (PAD). On one hand, some classical local descriptors (e.g., local binary pattern (LBP) [11] and histogram of gradient (HOG) [2]) are robust for describing the detailed invariant information (e.g., color texture, moiré pattern and noise artifacts) from spoofing faces.…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, a CNN-RNN architecture is proposed to utilize depth map information and rPPG (remote Photoplethysmography) signs, which can both exploit spoof patterns across spatial and temporal domains. In [29], an augmented dataset is collected in a specific image synthesis way, which can further improve the robustness of the model. DL-based methods usually have superior classification accuracy when training and testing samples belong to similar scenes.…”
Section: Deep Learning-based Methodsmentioning
confidence: 99%
“…Siddiqui et al [13] used temporal evidence aggregation over face region and scene of video images, which performs well on 2D face attack datasets due to the synthesized multi-features, but fails to judge the 3D realistic masks. In addition, Long Short Term Memory (LSTM) [14] can recurrently learn features to obtain context information, but it suffers from the heavily computational burden. To obtain intrinsic liveness cues, researchers propose a remote photo plethysmography (rPPG) technique [15] to detect the heartbeat signal from face appearance.…”
Section: A Face Anti-spoofingmentioning
confidence: 99%