2018
DOI: 10.1109/tifs.2018.2825949
|View full text |Cite
|
Sign up to set email alerts
|

Learning Generalized Deep Feature Representation for Face Anti-Spoofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
73
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 163 publications
(73 citation statements)
references
References 58 publications
0
73
0
Order By: Relevance
“…In most of the cases, texture features extracted from color channels performed the best. Li et al [29] proposed a 3D CNN architecture, which utilizes both spatial and temporal nature of videos. The network was first trained after data augmentation with a cross-entropy loss, and then with a specially designed generalization loss, which acts as a regularization factor.…”
Section: B Cnn Based Approaches For Face Padmentioning
confidence: 99%
“…In most of the cases, texture features extracted from color channels performed the best. Li et al [29] proposed a 3D CNN architecture, which utilizes both spatial and temporal nature of videos. The network was first trained after data augmentation with a cross-entropy loss, and then with a specially designed generalization loss, which acts as a regularization factor.…”
Section: B Cnn Based Approaches For Face Padmentioning
confidence: 99%
“…where l(:, :) is a loss function, N is the number of samples, y is the one-hot encoding label vector. Backbone Deep Networks CNNs have been successfully applied to face anti-spoofing [25], [26], [47]- [49]. Most existing works trained their CNN models from scratch using the existing face anti-spoofing databases, which are quite small and captured in unitary environments.…”
Section: B Two Stream Convolutional Neural Network (Tscnn)mentioning
confidence: 99%
“…Generalization has been specifically addressed with no success from different perspectives: i) applying domain adaptation techniques [17]; ii) reformulating the problem as an anomaly detection [21] scenario; iii) learning generalized deep features [13,16,17]; or even iv) using generative models [13]. Besides, there is still a lack of unified benchmark and representative datasets, that might mitigate the constant improvement of Presentation Attack Instruments (PAIs) with more sophisticated strategies (e.g.…”
Section: Generalized Presentation Attack Detectionmentioning
confidence: 99%