2012 Third International Conference on Emerging Security Technologies 2012
DOI: 10.1109/est.2012.12
|View full text |Cite
|
Sign up to set email alerts
|

Liveness Detection Using Gaze Collinearity

Abstract: This paper presents a liveness detection method based on tracking the gaze of the user of a face recognition system using a single camera. The user is required to follow a visual animation of a moving object on a display screen while his/her gaze is measured. The visual stimulus is designed to direct the gaze of the user to sets of collinear points on the screen. Features based on the measured collinearity of the observed gaze are then used to discriminate between live attempts at responding to this challenge … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(16 citation statements)
references
References 9 publications
(9 reference statements)
0
16
0
Order By: Relevance
“…In order to spoof the system the attacker may hold the photograph still (without moving the photograph in response to the stimuli) to generate near-perfect collinearity and colocation features. However, such an attack is easily detected by measuring the overall spread of landmark locations in the captured images during the entire presentation session, R, and check that this value is above a certain threshold to detect such presentation attacks [2]. In fact, two thresholds are used in the operation of the proposed system.…”
Section: Colocation Featuresmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to spoof the system the attacker may hold the photograph still (without moving the photograph in response to the stimuli) to generate near-perfect collinearity and colocation features. However, such an attack is easily detected by measuring the overall spread of landmark locations in the captured images during the entire presentation session, R, and check that this value is above a certain threshold to detect such presentation attacks [2]. In fact, two thresholds are used in the operation of the proposed system.…”
Section: Colocation Featuresmentioning
confidence: 99%
“…This paper provides a unified and formal framework for bringing together the authors' previous work that dealt with features based on gaze stability [2,3]. The novel contributions of this work include a mathematical generalization of the originally proposed features to incorporate more complex stimulus trajectories used as a challenge and extension of the experimental work to include more test subjects and presentation attack scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…Others proposed video-based anti-spoofing methods [15], [14], [35] for biometric authentication. Instead, we propose to use the previously unexplored combination of video and accelerometer data to verify the liveness of the video capture process.…”
Section: Introductionmentioning
confidence: 99%
“…A typical image‐based face anti‐spoofing system includes the following three steps: user behavior modeling, user cooperation, and data‐driven characterization. Early anti‐spoofing systems always request user cooperation, such as shaking one's head or speaking phrases, which is inconvenient and highly relies on users' cooperation. Therefore, other works shift the attention to develop non‐intrusive methods .…”
Section: Introductionmentioning
confidence: 99%