2018
DOI: 10.1016/j.engappai.2018.04.013
|View full text |Cite
|
Sign up to set email alerts
|

How far did we get in face spoofing detection?

Abstract: The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks. In this paper, an extensive analysis on face spoofing detection works published in the last decade is presented. The analyzed works are categorized by their fundamental parts, i.e., descriptors and classifiers. This structured survey also brings a comparative performance analysis of the works considering the most important public data sets in the field. Th… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(26 citation statements)
references
References 81 publications
(431 reference statements)
0
25
0
1
Order By: Relevance
“…Face anti-spoofing is a security method to solve the problem before reaching the recognition phase [3]. The objective of antispoofing is to secure the biometric system from any users with illegal authorization.…”
Section: B Anti-spoofing Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Face anti-spoofing is a security method to solve the problem before reaching the recognition phase [3]. The objective of antispoofing is to secure the biometric system from any users with illegal authorization.…”
Section: B Anti-spoofing Methodsmentioning
confidence: 99%
“…A face spoofing case is that a person tries to present fake evidence to the biometric system or face recognition to get the authorization in order to gain resources inside the system in the wrong way [3]. Face spoofing can be implemented by several methods with the help of photographs and videos.…”
Section: A Face Spoofmentioning
confidence: 99%
See 2 more Smart Citations
“…This imaginative innovation shows a great deal of guarantee and could change how we get to delicate data. [1] Be that as it may, as promising as facial acknowledgment seems to be, it has defects. Client photographs can without much of a stretch be found through interpersonal organizations and used to parody facial acknowledgment programming.…”
Section: Introductionmentioning
confidence: 99%