2019 International Conference on Biometrics (ICB) 2019
DOI: 10.1109/icb45273.2019.8987415
|View full text |Cite
|
Sign up to set email alerts
|

Improving Face Anti-Spoofing by 3D Virtual Synthesis

Abstract: Face anti-spoofing is crucial for the security of face recognition systems. Learning based methods especially deep learning based methods need large-scale training samples to reduce overfitting. However, acquiring spoof data is very expensive since the live faces should be reprinted and re-captured in many views. In this paper, we present a method to synthesize virtual spoof data in 3D space to alleviate this problem. Specifically, we consider a printed photo as a flat surface and mesh it into a 3D object, whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
2

Relationship

3
7

Authors

Journals

citations
Cited by 28 publications
(9 citation statements)
references
References 35 publications
(62 reference statements)
0
6
0
Order By: Relevance
“…However, most of existing face recognition systems are easily to be spoofed through presentation attacks (PAs) ranging from printing a face on paper (print attack) to replaying a face on a digital device (replay attack) or bringing a 3D-mask (3D-mask attack). Therefore, not only the research community but also the industry has recognized face anti-spoofing [18,19,4,33,39,11,23,55,1,29,12,49,45,54,21] as a critical role in securing the face recognition system. In the past few years, both traditional methods [14,42,9] and CNN-based methods [35,38,20,24,46] have shown effectiveness in discriminating between the living and spoofing face.…”
Section: Introductionmentioning
confidence: 99%
“…However, most of existing face recognition systems are easily to be spoofed through presentation attacks (PAs) ranging from printing a face on paper (print attack) to replaying a face on a digital device (replay attack) or bringing a 3D-mask (3D-mask attack). Therefore, not only the research community but also the industry has recognized face anti-spoofing [18,19,4,33,39,11,23,55,1,29,12,49,45,54,21] as a critical role in securing the face recognition system. In the past few years, both traditional methods [14,42,9] and CNN-based methods [35,38,20,24,46] have shown effectiveness in discriminating between the living and spoofing face.…”
Section: Introductionmentioning
confidence: 99%
“…Methods based on motion analysis attempt to detect vital movements such as eye blinking or movements of the lips and head. Texture-based methods aim to exploit the distinctions in patterns between live and fake faces [20]. The use of video footage by the attacker is more realistic compared to using photos and is more difficult to be detected by systems that control vital characteristics such as eye movements to identify attempted attacks.…”
Section: "Anti-spoofing" Methods In Biometric Facial Recognition Systemsmentioning
confidence: 99%
“…Among these cue-based methods, liveness cues are not suitable for frame-based PAD methods. Therefore, texture and 3D geometry cue-based methods [17][18][19][20] are more popular for detecting liveness from a frame. Depth or pseudo-depth signals are the most popular signals for 3D geometry cue-based methods to distinguish presentation attacks from real attempts.…”
Section: Related Workmentioning
confidence: 99%