2018
DOI: 10.1016/j.jvcir.2018.05.009
|View full text |Cite
|
Sign up to set email alerts
|

Face spoofing detection with local binary pattern network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 67 publications
(35 citation statements)
references
References 51 publications
0
31
0
2
Order By: Relevance
“…Local binary pattern (LBP) [ 38 ] is a texture feature descriptor which is able to extract local texture characteristics. In the literature, many researchers have attempted to utilize LBP feature descriptors as image texture descriptors for various image analysis applications [ 10 , 39 , 40 ] The main idea of the computation of LBP consists of two steps. First, the intensity value of each center pixel of a grey-scale image will be compared with each of the neighboring pixels or an interpolated sub-pixel location to generate a thresholded binary pattern.…”
Section: Methodsmentioning
confidence: 99%
“…Local binary pattern (LBP) [ 38 ] is a texture feature descriptor which is able to extract local texture characteristics. In the literature, many researchers have attempted to utilize LBP feature descriptors as image texture descriptors for various image analysis applications [ 10 , 39 , 40 ] The main idea of the computation of LBP consists of two steps. First, the intensity value of each center pixel of a grey-scale image will be compared with each of the neighboring pixels or an interpolated sub-pixel location to generate a thresholded binary pattern.…”
Section: Methodsmentioning
confidence: 99%
“…Table 5 lists the results of cross-database scenarios. To confirm that the PR-FSAD is also efficient with other spoofing detection algorithms, along with ResNet-18, we considered DenseNet [30] and LBP [31] for the cross-database scenario experiments. Experimental results revealed that the spoofing attack detection performance by training with the PR-FSAD was the best for ResNet-18, DenseNet, and LBP.…”
Section: Resultsmentioning
confidence: 99%
“…In [37], [38], the hand-crafted features were extracted from convolutional feature maps to distinguish the real and fake faces rather than invoking fully-connected layers. Instead of using hand-crafted features, Li et al [39] proposed a novel learnable LBP network for face spoofing detection, which can significantly reduce the network parameters. Moreover, in order to capture the temporal texture variations from a video sequence, Xu et al [40] proposed a long short memory network (LSTM) and Li et al [41] designed a 3D CNN to detect face presentation attack respectively.…”
Section: Related Workmentioning
confidence: 99%