Proceedings of the 28th ACM International Conference on Multimedia 2020
DOI: 10.1145/3394171.3413606
|View full text |Cite
|
Sign up to set email alerts
|

Revealing True Identity: Detecting Makeup Attacks in Face-based Biometric Systems

Abstract: Face-based authentication systems are among the most commonly used biometric systems, because of the ease of capturing face images at a distance and in non-intrusive way. These systems are, however, susceptible to various presentation attacks, including printed faces, artificial masks, and makeup attacks. In this paper, we propose a novel solution to address makeup attacks, which are the hardest to detect in such systems because makeup can substantially alter the facial features of a person, including making t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 24 publications
(31 reference statements)
0
1
0
Order By: Relevance
“…Cao et al [11] have proposed a generative adversarial network, namely, bidirectional tunable de-makeup network (BTD-Net) for makeup removal. Arab et al [6] have proposed a two-level defense against the makeup-based alteration. In the first level, images are first detected for makeup or non-makeup.…”
Section: Digital Retouching Detectionmentioning
confidence: 99%
“…Cao et al [11] have proposed a generative adversarial network, namely, bidirectional tunable de-makeup network (BTD-Net) for makeup removal. Arab et al [6] have proposed a two-level defense against the makeup-based alteration. In the first level, images are first detected for makeup or non-makeup.…”
Section: Digital Retouching Detectionmentioning
confidence: 99%