2018
DOI: 10.1016/j.imavis.2018.04.007
|View full text |Cite
|
Sign up to set email alerts
|

On the generalization of color texture-based face anti-spoofing

Abstract: Despite the significant attention given to the problem of face spoofing, we still lack generalized presentation attack detection (PAD) methods performing robustly in practical face recognition systems. The existing face anti-spoofing techniques have indeed achieved impressive results when trained and evaluated on the same database (i.e. intra-test protocols). Cross-database experiments have, however, revealed that the performance of the state-of-the-art methods drops drastically as they fail to cope with new a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
36
3

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 63 publications
(40 citation statements)
references
References 47 publications
(66 reference statements)
1
36
3
Order By: Relevance
“…Second, a 2D discrete Fourier transform is applied to each frame of the residual noise video v NR , as formalized in Eq. (6). Then, the Fourier spectrum FS(u, w) can be obtained.…”
Section: Noise Pattern Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…Second, a 2D discrete Fourier transform is applied to each frame of the residual noise video v NR , as formalized in Eq. (6). Then, the Fourier spectrum FS(u, w) can be obtained.…”
Section: Noise Pattern Extractionmentioning
confidence: 99%
“…They can be categorized as methods based on static features and those based on dynamic features. Methods based on static features, such as color texture [6] and local shade [7], consider the features in a single frame. Methods based on dynamic information exploit unconscious facial motions, such as blinking [8] and micro-expressions [9].…”
Section: Introductionmentioning
confidence: 99%
“…By learning facial microtextures of live faces, a method which expands the local binary pattern in time and space operator is applied to face anti-spoofing detection in [19]. Numerous recent works combine features of colour and texture to improve the accuracy of face liveness detection in [11,[20][21][22]. Recently, it is possible to use light field cameras for face spoofing detection.…”
Section: Related Work Regarding Face Anti-spoofing Detectionmentioning
confidence: 99%
“…Current face-PAD methods can be classified regarding the following standpoints: i) from the hardware used for data acquisition as rgb-only [11,21,26] or additional sensors [2,23] approaches; ii) from the required user interaction as active [14] or passive [16,26] methods; iii) from the input data type as single-frame [26] or video-based [1,22] approaches; iv) and, finally, depending on the feature extraction and classification strategy as hand-crafted [4,26] or deep learning [13,16]. Based on these classifications, we can depict that the most challenging scenario occurs when data is captured using rgb-only sensors using passive approaches that avoid any challenge-response interaction with the user (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Cross-FaceResolution. Building on top of some papers [4] that mention the influence of the distance between camera and subject, we propose a protocol to focus the analysis on the role of resolution of the region of the face in the task of detecting fake attempts. Two variants are possible for this protocol.…”
Section: Protocolsmentioning
confidence: 99%