2019
DOI: 10.1007/978-3-319-92627-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to Face Presentation Attack Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 42 publications
(29 citation statements)
references
References 35 publications
0
28
0
1
Order By: Relevance
“…The different approaches are then hierarchically classified into subclasses of these two broad categories. Hernandez-Ortega et al [ 40 ] divided the PAD methods as static or dynamic methods, depending on whether they take into account temporal information. Recently, Bhattacharjee et al [ 41 ] considered the PAD methods as approaches based on visible light and extended-range imagery.…”
Section: Overview Of Facial Pad Methods Using Only Rgb Cameras From Gcdsmentioning
confidence: 99%
“…The different approaches are then hierarchically classified into subclasses of these two broad categories. Hernandez-Ortega et al [ 40 ] divided the PAD methods as static or dynamic methods, depending on whether they take into account temporal information. Recently, Bhattacharjee et al [ 41 ] considered the PAD methods as approaches based on visible light and extended-range imagery.…”
Section: Overview Of Facial Pad Methods Using Only Rgb Cameras From Gcdsmentioning
confidence: 99%
“…The exact set of attributes that can be included under the biometric bias term are still an open discussion issue as concluded in the EAB demographic fairness in biometric systems workshop [55]. The phenomena of bias in face biometrics were found in several disciplines such as presentation attack detection [19], [33], the estimation of facial characteristics [70], [15], and the assessment of face image quality [71]. In some previous works, factors that affect the recognition performance were also known as covariates [45], [44].…”
Section: Related Workmentioning
confidence: 99%
“…A photo attack is a presentation attack in which the attacker displays a photograph of the victim to the sensor of the FR system. This photograph can be printed on paper or displayed on a device's screen (e.g., a smartphone, a tablet, or a laptop) [31]. A replay attack is another presentation attack in which a victim's video is played instead of a photograph [31].…”
Section: Face Recognitionmentioning
confidence: 99%
“…This photograph can be printed on paper or displayed on a device's screen (e.g., a smartphone, a tablet, or a laptop) [31]. A replay attack is another presentation attack in which a victim's video is played instead of a photograph [31]. A presentation attack detector can be integrated into an FR system to mitigate presentation attacks [31].…”
Section: Face Recognitionmentioning
confidence: 99%