Face Recognition Across the Imaging Spectrum 2016
DOI: 10.1007/978-3-319-28501-6_8
|View full text |Cite
|
Sign up to set email alerts
|

Face Recognition Systems Under Spoofing Attacks

Abstract: In this chapter we give an overview of spoofing attacks and spoofing counter-measures for face recognition systems, with a focus on Visual Spectrum systems (VIS) in 2D and 3D, as well as Near Infrared (NIR) and multispectral systems. We cover the existing types of spoofing attacks and report on their success to bypass several state-of-the-art face recognition systems. The results on two different face spoofing databases in VIS and one newly developed face spoofing database in NIR, show that spoofing attacks pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
45
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 80 publications
(47 citation statements)
references
References 70 publications
(133 reference statements)
0
45
0
Order By: Relevance
“…In order to distinguish real face features from fake faces, face liveness detection is a commonly used countermeasure approach. It is aimed at detecting physiological life signs in an identity [1].…”
Section: Introductionmentioning
confidence: 99%
“…In order to distinguish real face features from fake faces, face liveness detection is a commonly used countermeasure approach. It is aimed at detecting physiological life signs in an identity [1].…”
Section: Introductionmentioning
confidence: 99%
“…3DMAD [15] is the first publicly available 3D masks dataset, which is recorded using Microsoft Kinect sensor and consists of Depth and RGB modalities. Another multi-modal face PAD dataset is Msspoof [9], containing visible (VIS) and near-infrared (NIR) images of real accesses and printed spoofing attacks with ≤ 21 objects.…”
Section: Related Work 21 Datasetsmentioning
confidence: 99%
“…is the limited number of data modalities. Most of the current datasets only have one modal (e.g., RGB), and the existing available multi-modal datasets [15,9] are scarce, including no more than 21 subjects.…”
Section: Introductionmentioning
confidence: 99%
“…The use of fingerprint technology is well-known and has become highly integrated into certain modern devices [5]- [7]. Face recognition has also been explored for applications on consumer devices [8], [9] but has not been widely adopted in practice, due in part to concerns on the ease with which face data can be captured and used in spoofing attacks [10], [11].…”
Section: A Biometrics On Smartphonesmentioning
confidence: 99%
“…Thus, while palmprint has not seen the mainstream use of face, fingerprint and iris biometrics, it is an equally valid candidate for use in smartphones and has the advantage that no additional sensing capabilities are required. And there is a further advantage -one of the weaknesses of facial images [11] and fingerprints [6] lies in the ease with which high quality samples of these biometrics can be obtained by an attacker. Palmprints are not as easy to acquire without the user's consent as people do not easily leave behind palmprint copies or expose them during daily activities.…”
Section: B Palmprint As a Smartphones Biometricmentioning
confidence: 99%