Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA) 2017
DOI: 10.1109/isba.2017.7947686
|View full text |Cite
|
Sign up to set email alerts
|

Spoofing faces using makeup: An investigative study

Abstract: Makeup can be used to alter the facial appearance of a person. Previous studies have established the potential of using makeup to obfuscate the identity of an individual with respect to an automated face matcher. In this work, we analyze the potential of using makeup for spoofing an identity, where an individual attempts to impersonate another person's facial appearance. In this regard, we first assemble a set of face images downloaded from the internet where individuals use facial cosmetics to impersonate cel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
35
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 63 publications
(35 citation statements)
references
References 20 publications
0
35
0
Order By: Relevance
“…In [60] authors defined two spoofing indexes. SI 1 evaluates the similarity between the after-makeup images of subject p, A…”
Section: Experiments On Detecting Spoofing and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [60] authors defined two spoofing indexes. SI 1 evaluates the similarity between the after-makeup images of subject p, A…”
Section: Experiments On Detecting Spoofing and Discussionmentioning
confidence: 99%
“…The MIFS (Makeup Induced Face Spoofing) dataset [60], composed of face images of 107 subjects obtained from YouTube video makeup tutorials and face images of associated target subjects from the Internet. There are 4 photos per subject (2 before makeup, 2 after makeup) and 2 photos per target subject, making a total of 642 still images.…”
mentioning
confidence: 99%
“…For instance, plastic surgery can be performed to conceal the identity of a subject [33]. In the same manner, makeup can be applied with the aim of identity concealment [82] or even to prevent face detection [83]. More importantly, when applied by professional makeup artists facial makeup can be used for impersonation, i.e., to launch presentation attacks to face recognition systems, as it has been evidenced by Chen et al [82].…”
Section: Issues and Challengesmentioning
confidence: 99%
“…In the same manner, makeup can be applied with the aim of identity concealment [82] or even to prevent face detection [83]. More importantly, when applied by professional makeup artists facial makeup can be used for impersonation, i.e., to launch presentation attacks to face recognition systems, as it has been evidenced by Chen et al [82]. It is to be noted that beautification induced by makeup can be circumvented by 3D face analysis [46], as well as to a great extent by investigating spectra beyond the visible one.…”
Section: Issues and Challengesmentioning
confidence: 99%
“…Such systems, however, are susceptible to various presentation attacks, including printed faces, artificial masks, prosthetics, and makeup attacks. To defend against various attacks and improve accuracy, authentication systems deployed in high security facilities usually employ additional modalities beside regular (a) Cosmetic makeup samples from [7] (b) Malicious makeup samples from our dataset RGB cameras. For example, stereo cameras can be used to estimate the depth in order to defend against printed faces.…”
Section: Introductionmentioning
confidence: 99%