2022
DOI: 10.3390/s22103760
|View full text |Cite
|
Sign up to set email alerts
|

Face Presentation Attack Detection Using Deep Background Subtraction

Abstract: Currently, face recognition technology is the most widely used method for verifying an individual’s identity. Nevertheless, it has increased in popularity, raising concerns about face presentation attacks, in which a photo or video of an authorized person’s face is used to obtain access to services. Based on a combination of background subtraction (BS) and convolutional neural network(s) (CNN), as well as an ensemble of classifiers, we propose an efficient and more robust face presentation attack detection alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 55 publications
0
4
0
Order By: Relevance
“…The different results, and the comparison with state-of-the-art methods, show that our approach can be a useful tool for brain cancer detection, diagnosis, and radiotherapy treatment planning. The future direction of our research in brain tumor segmentation must address the limitations of the unsupervised approach by: (1) combining PSO, ANOVA, and a CNN model [ 84 , 85 , 86 , 87 , 88 , 89 , 90 ]; (2) using generative adversarial networks [ 91 , 92 , 93 , 94 ] to pre-process, colorize, correct, and enhance images before presenting them to the segmentation algorithm.…”
Section: Discussionmentioning
confidence: 99%
“…The different results, and the comparison with state-of-the-art methods, show that our approach can be a useful tool for brain cancer detection, diagnosis, and radiotherapy treatment planning. The future direction of our research in brain tumor segmentation must address the limitations of the unsupervised approach by: (1) combining PSO, ANOVA, and a CNN model [ 84 , 85 , 86 , 87 , 88 , 89 , 90 ]; (2) using generative adversarial networks [ 91 , 92 , 93 , 94 ] to pre-process, colorize, correct, and enhance images before presenting them to the segmentation algorithm.…”
Section: Discussionmentioning
confidence: 99%
“…− Using generative adversarial networks [62−65] to preprocess, colorize, correct, and enhance images before presenting them to the segmentation algorithm. − Combining the features extracted by the proposed approach with deeplearned features [66][67][68][69][70][71][72]7] to improve the quality of the segmentation and make it more semantic.…”
Section: Discussionmentioning
confidence: 99%
“…Regrettably, many of these methods rely on computationally expensive models, rendering them unsuitable for real-time Face Anti-Spoofing (FAS applications. In [33], Benlamoudi et al presented an approach based on background subtraction and used pre-trained ResNet-50 [34] CNN architecture to learn features related to genuine and spoof faces. Their approach is based on the assumption that the capturing camera is always static.…”
Section: B Deep Learning-based Methodsmentioning
confidence: 99%