Kollreider, K.[Klaus],
Fronthaler, H.[Hartwig],
Bigun, J.[Josef],
Non-intrusive liveness detection by face images,
IVC(27), No. 3, February 2009, pp. 233-244.
Elsevier DOI
0804
BibRef
Earlier:
Verifying liveness by multiple experts in face biometrics,
Biometrics08(1-6).
IEEE DOI
0806
Face liveness; Liveness detection; Anti-spoofing measures; Optical
flow; Motion of lines; Optical flow of lines; Orientation estimation;
Face part models; Retinotopic vision; Local Gabor decomposition;
Support vector machine classification
BibRef
Zhang, Z.W.[Zhi-Wei],
Yi, D.[Dong],
Lei, Z.[Zhen],
Li, S.Z.,
Regularized Transfer Boosting for Face Detection Across Spectrum,
SPLetters(19), No. 3, March 2012, pp. 131-134.
IEEE DOI
1202
BibRef
Zhang, Z.W.[Zhi-Wei],
Yi, D.[Dong],
Lei, Z.[Zhen],
Li, S.Z.[Stan Z.],
Face Liveness Detection by Learning Multispectral Reflectance
Distributions,
FG11(436-441).
IEEE DOI
1103
BibRef
Maatta, J.,
Hadid, A.[Abdenour],
Pietikäinen, M.[Matti],
Face spoofing detection from single images using texture and local
shape analysis,
IET-Bio(1), No. 1, March 2012, pp. 3-10.
DOI Link
1305
Award, IET Bio Premium.
BibRef
Kose, N.[Neslihan],
Dugelay, J.L.[Jean-Luc],
Mask spoofing in face recognition and countermeasures,
IVC(32), No. 10, 2014, pp. 779-789.
Elsevier DOI
1410
BibRef
Earlier:
Shape and Texture Based Countermeasure to Protect Face Recognition
Systems against Mask Attacks,
Biometrics13(111-116)
IEEE DOI
1309
BibRef
And:
Countermeasure for the protection of face recognition systems against
mask attacks,
FG13(1-6)
IEEE DOI
1309
Spoofing.
face recognition
BibRef
Kose, N.[Neslihan],
Apvrille, L.,
Dugelay, J.L.[Jean-Luc],
Facial makeup detection technique based on texture and shape analysis,
FG15(1-7)
IEEE DOI
1508
face recognition
BibRef
de Freitas Pereira, T.[Tiago],
Komulainen, J.[Jukka],
Anjos, A.[Andre],
de Martino, J.[Jose],
Hadid, A.[Abdenour],
Pietikainen, M.[Matti],
Marcel, S.[Sebastien],
Face liveness detection using dynamic texture,
JIVP(2014), No. 1, 2014, pp. 2.
DOI Link
1402
BibRef
Komulainen, J.[Jukka],
Hadid, A.[Abdenour],
Pietikäinen, M.[Matti],
Face Spoofing Detection Using Dynamic Texture,
CVLBP12(I:146-157).
Springer DOI
1304
BibRef
Biggio, B.[Battista],
Akhtar, Z.[Zahid],
Fumera, G.[Giorgio],
Marcialis, G.L.[Gian Luca],
Roli, F.[Fabio],
Security evaluation of biometric authentication systems under real
spoofing attacks,
IET-Bio(1), No. 1, March 2012, pp. 11-24.
DOI Link
1305
Award, IET Bio Premium.
BibRef
Earlier: A2, A3, A4, A5, Only:
Robustness Evaluation of Biometric Systems under Spoof Attacks,
CIAP11(I: 159-168).
Springer DOI
1109
BibRef
Biggio, B.[Battista],
Fumera, G.[Giorgio],
Marcialis, G.L.[Gian Luca],
Roli, F.[Fabio],
Statistical Meta-Analysis of Presentation Attacks for Secure
Multibiometric Systems,
PAMI(39), No. 3, March 2017, pp. 561-575.
IEEE DOI
1702
Biometrics (access control)
BibRef
Roli, F.[Fabio],
Biggio, B.[Battista],
Fumera, G.[Giorgio],
Pattern Recognition Systems under Attack,
CIARP13(I:1-8).
Springer DOI
1311
BibRef
Galbally, J.[Javier],
Marcel, S.[Sebastien],
Fierrez, J.,
Image Quality Assessment for Fake Biometric Detection:
Application to Iris, Fingerprint, and Face Recognition,
IP(23), No. 2, February 2014, pp. 710-724.
IEEE DOI
1402
face recognition
BibRef
Galbally, J.[Javier],
Marcel, S.[Sebastien],
Face Anti-spoofing Based on General Image Quality Assessment,
ICPR14(1173-1178)
IEEE DOI
1412
Databases
BibRef
Feng, Y.C.[Yi C.],
Lim, M.H.[Meng-Hui],
Yuen, P.C.[Pong C.],
Masquerade attack on transform-based binary-template protection based
on perceptron learning,
PR(47), No. 9, 2014, pp. 3019-3033.
Elsevier DOI
1406
Masquerade attack
BibRef
Bustard, J.D.,
Carter, J.N.,
Nixon, M.S.,
Hadid, A.,
Measuring and mitigating targeted biometric impersonation,
IET-Bio(3), No. 2, June 2014, pp. 55-61.
DOI Link
1407
BibRef
Kim, W.,
Suh, S.,
Han, J.,
Face Liveness Detection From a Single Image via Diffusion Speed Model,
IP(24), No. 8, August 2015, pp. 2456-2465.
IEEE DOI
1505
Face
BibRef
Hadid, A.,
Evans, N.,
Marcel, S.,
Fierrez, J.,
Biometrics Systems Under Spoofing Attack:
An evaluation methodology and lessons learned,
SPMag(32), No. 5, September 2015, pp. 20-30.
IEEE DOI
1509
biometrics (access control)
BibRef
Biggio, B.,
Fumera, G.,
Russu, P.,
Didaci, L.,
Roli, F.,
Adversarial Biometric Recognition: A review on biometric system
security from the adversarial machine-learning perspective,
SPMag(32), No. 5, September 2015, pp. 31-41.
IEEE DOI
1509
biometrics (access control)
BibRef
Pinto, A.,
Pedrini, H.,
Robson Schwartz, W.,
Rocha, A.,
Face Spoofing Detection Through Visual Codebooks of Spectral Temporal
Cubes,
IP(24), No. 12, December 2015, pp. 4726-4740.
IEEE DOI
1512
face recognition
BibRef
Feng, L.T.[Li-Tong],
Po, L.M.[Lai-Man],
Li, Y.M.[Yu-Ming],
Xu, X.Y.[Xu-Yuan],
Yuan, F.[Fang],
Cheung, T.C.H.[Terence Chun-Ho],
Cheung, K.W.[Kwok-Wai],
Integration of image quality and motion cues for face anti-spoofing:
A neural network approach,
JVCIR(38), No. 1, 2016, pp. 451-460.
Elsevier DOI
1605
Face anti-spoofing
BibRef
Galbally, J.[Javier],
Satta, R.[Riccardo],
Three-dimensional and two-and-a-half-dimensional face recognition
spoofing using three-dimensional printed models,
IET-Bio(5), No. 2, 2016, pp. 83-91.
DOI Link
1606
biometrics (access control)
BibRef
Gavrilescu, M.,
Study on using individual differences in facial expressions for a
face recognition system immune to spoofing attacks,
IET-Bio(5), No. 3, 2016, pp. 236-242.
DOI Link
1609
emotion recognition
BibRef
Schuckers, S.[Stephanie],
Presentations and attacks, and spoofs, oh my,
IVC(55, Part 1), No. 1, 2016, pp. 26-30.
Elsevier DOI
1612
Biometric recognition
BibRef
Boulkenafet, Z.,
Komulainen, J.,
Hadid, A.,
Face Antispoofing Using Speeded-Up Robust Features and Fisher Vector
Encoding,
SPLetters(24), No. 2, February 2017, pp. 141-145.
IEEE DOI
1702
face recognition
BibRef
Ramachandra, R.[Raghavendra],
Busch, C.[Christoph],
Presentation Attack Detection Methods for Face Recognition Systems:
A Comprehensive Survey,
Surveys(50), No. 1, April 2017, pp. Article No 8.
DOI Link
1704
Survey, Spoofing. The vulnerability of face recognition systems to presentation attacks
(also known as direct attacks or spoof attacks) has received a great
deal of interest from the biometric community.
See also Presentation Attack Detection Methods for Fingerprint Recognition Systems: A Survey.
BibRef
Raghavendra, R.,
Raja, K.B.[Kiran B.],
Marcel, S.[Sébastien],
Busch, C.[Christoph],
Face presentation attack detection across spectrum using
time-frequency descriptors of maximal response in Laplacian
scale-space,
IPTA16(1-6)
IEEE DOI
1703
face recognition. Targeted attacks.
BibRef
Mohammadi, A.[Amir],
Bhattacharjee, S.[Sushil],
Marcel, S.[Sébastien],
Deeply vulnerable: a study of the robustness of face recognition to
presentation attacks,
IET-Bio(7), No. 1, January 2018, pp. 15-26.
DOI Link
1712
BibRef
Alotaibi, A.[Aziz],
Mahmood, A.[Ausif],
Deep face liveness detection based on nonlinear diffusion using
convolution neural network,
SIViP(11), No. 4, May 2017, pp. 713-720.
WWW Link.
1704
BibRef
Sepas-Moghaddam, A.[Alireza],
Malhadas, L.[Luis],
Correia, P.L.[Paulo Lobato],
Pereira, F.M.[Fernando M.],
Face spoofing detection using a light field imaging framework,
IET-Bio(7), No. 1, January 2018, pp. 39-48.
DOI Link
1712
BibRef
Li, L.[Lei],
Correia, P.L.[Paulo Lobato],
Hadid, A.[Abdenour],
Face recognition under spoofing attacks: countermeasures and research
directions,
IET-Bio(7), No. 1, January 2018, pp. 3-14.
DOI Link
1712
BibRef
Hadid, A.[Abdenour],
Face Biometrics Under Spoofing Attacks: Vulnerabilities,
Countermeasures, Open Issues, and Research Directions,
Biometrics14(113-118)
IEEE DOI
1409
BibRef
Guest Editorial: Face Recognition and Spoofing Attacks,
IET-Bio(7), No. 1, January 2018, pp. 1-2.
DOI Link
1712
BibRef
Edmunds, T.[Taiamiti],
Caplier, A.[Alice],
Face spoofing detection based on colour distortions,
IET-Bio(7), No. 1, January 2018, pp. 27-38.
DOI Link
1712
BibRef
Earlier:
Fake face detection based on radiometric distortions,
IPTA16(1-6)
IEEE DOI
1703
face recognition
BibRef
Xia, Z.Q.[Zhao-Qiang],
Peng, X.L.[Xian-Lin],
Feng, X.Y.[Xiao-Yi],
Hadid, A.[Abdenour],
Scarce face recognition via two-layer collaborative representation,
IET-Bio(7), No. 1, January 2018, pp. 56-62.
DOI Link
1712
BibRef
Li, L.,
Feng, X.Y.[Xiao-Yi],
Boulkenafet, Z.,
Xia, Z.Q.[Zhao-Qiang],
Li, M.,
Hadid, A.[Abdenour],
An original face anti-spoofing approach using partial convolutional
neural network,
IPTA16(1-6)
IEEE DOI
1703
computer vision
BibRef
Zhao, X.,
Lin, Y.,
Heikkilä, J.,
Dynamic Texture Recognition Using Volume Local Binary Count Patterns
With an Application to 2D Face Spoofing Detection,
MultMed(20), No. 3, March 2018, pp. 552-566.
IEEE DOI
1802
Dynamics, Face, Face recognition, Fractals, Histograms,
Videos, 2D face spoofing detection,
volume local binary count
BibRef
Edmunds, T.[Taiamiti],
Caplier, A.[Alice],
Motion-based countermeasure against photo and video spoofing attacks
in face recognition,
JVCIR(50), 2018, pp. 314-332.
Elsevier DOI
1802
Motion cues, Face anti-spoofing, Fisher kernel, Replay attacks
BibRef
Zhang, L.B.[Le-Bing],
Peng, F.[Fei],
Qin, L.[Le],
Long, M.[Min],
Face spoofing detection based on color texture Markov feature and
support vector machine recursive feature elimination,
JVCIR(51), 2018, pp. 56-69.
Elsevier DOI
1802
Face anti-spoofing, Color texture Markov feature,
Adjacent facial pixels discrepancy, SVM-RFE
BibRef
Beham, M.P.[M. Parisa],
Roomi, S.M.M.[S. Md. Mansoor],
Anti-spoofing enabled face recognition based on aggregated local
weighted gradient orientation,
SIViP(12), No. 3, March 2018, pp. 531-538.
WWW Link.
1804
BibRef
Nordrum, A.,
Forging voices and faces,
Spectrum(55), No. 5, May 2018, pp. 14-15.
IEEE DOI
1805
[News]
BibRef
Li, L.[Lei],
Feng, X.Y.[Xiao-Yi],
Xia, Z.Q.[Zhao-Qiang],
Jiang, X.Y.[Xiao-Yue],
Hadid, A.[Abdenour],
Face spoofing detection with local binary pattern network,
JVCIR(54), 2018, pp. 182-192.
Elsevier DOI
1806
BibRef
Earlier: A1, A2, A4, A3, A5:
Face anti-spoofing via deep local binary patterns,
ICIP17(101-105)
IEEE DOI
1803
Face spoofing detection, Deep learning, Local binary pattern.
Databases, Face, Feature extraction, Image color analysis,
Machine learning, Support vector machines, Training
BibRef
Gomez-Barrero, M.[Marta],
Rathgeb, C.[Christian],
Scherhag, U.[Ulrich],
Busch, C.[Christoph],
Predicting the vulnerability of biometric systems to attacks based on
morphed biometric information,
IET-Bio(7), No. 4, July 2018, pp. 333-341.
DOI Link
1807
BibRef
Hamdan, B.[Bensenane],
Mokhtar, K.[Keche],
A self-immune to 3D masks attacks face recognition system,
SIViP(12), No. 6, September 2018, pp. 1053-1060.
WWW Link.
1808
BibRef
Boulkenafet, Z.[Zinelabidine],
Komulainen, J.[Jukka],
Hadid, A.[Abdenour],
On the generalization of color texture-based face anti-spoofing,
IVC(77), 2018, pp. 1-9.
Elsevier DOI
1809
BibRef
Earlier:
Face anti-spoofing based on color texture analysis,
ICIP15(2636-2640)
IEEE DOI
1512
Face recognition, Presentation attack detection, Spoofing,
Color texture analysis, Cross-database, Generalization
BibRef
Chen, Q.[Ququ],
Sang, L.[Lei],
Face-mask recognition for fraud prevention using Gaussian mixture
model,
JVCIR(55), 2018, pp. 795-801.
Elsevier DOI
1809
Gussian Mixture Model (GMM), Dlib, Deep learning, Fraud prevention
BibRef
Song, X.[Xiao],
Zhao, X.[Xu],
Fang, L.J.[Liang-Ji],
Lin, T.W.[Tian-Wei],
Discriminative representation combinations for accurate face spoofing
detection,
PR(85), 2019, pp. 220-231.
Elsevier DOI
1810
Face presentation attack detection,
Template face registration, Binocular depth,
Decision-level cascade strategy
BibRef
Ur Rehman, Y.A.[Yasar Abbas],
Po, L.M.[Lai-Man],
Liu, M.Y.[Meng-Yang],
Zou, Z.J.[Zi-Jie],
Ou, W.F.[Wei-Feng],
Zhao, Y.[Yuzhi],
Face liveness detection using convolutional-features fusion of real
and deep network generated face images,
JVCIR(59), 2019, pp. 574-582.
Elsevier DOI
1903
Convolution neural networks, Face anti-spoofing,
Face liveness detection, Adaptive fusion, Auto-encoder, DNG face images
BibRef
Chen, L.Y.[Ling-Ying],
Zhao, G.H.[Guang-Hui],
Zhou, J.W.[Jun-Wei],
Ho, A.T.S.[Anthony T.S.],
Cheng, L.M.[Lee-Ming],
Face template protection using deep LDPC codes learning,
IET-Bio(8), No. 3, May 2019, pp. 190-197.
DOI Link
1904
BibRef
Goswami, G.[Gaurav],
Agarwal, A.[Akshay],
Ratha, N.[Nalini],
Vatsa, M.[Mayank],
Detecting and Mitigating Adversarial Perturbations for Robust Face
Recognition,
IJCV(127), No. 6-7, June 2019, pp. 719-742.
Springer DOI
1906
BibRef
Camiña, J.B.[José Benito],
Medina-Pérez, M.A.[Miguel Angel],
Monroy, R.[Raúl],
Loyola-González, O.[Octavio],
Villanueva, L.A.P.[Luis Angel Pereyra],
González Gurrola, L.C.[Luis Carlos],
Bagging-RandomMiner:
A one-class classifier for file access-based masquerade detection,
MVA(30), No. 5, July 2019, pp. 959-974.
Springer DOI
1907
BibRef
Yu, C.Y.[Chang-Yong],
Yao, C.T.[Cheng-Tang],
Pei, M.T.[Ming-Tao],
Jia, Y.D.[Yun-De],
Diffusion-based kernel matrix model for face liveness detection,
IVC(89), 2019, pp. 88-94.
Elsevier DOI
1909
Face liveness detection, Anisotropic diffusion,
Kernel matrix model, DK feature
BibRef
Khammari, M.[Mohammed],
Robust face anti-spoofing using CNN with LBP and WLD,
IET-IPR(13), No. 11, 19 September 2019, pp. 1880-1884.
DOI Link
1909
BibRef
Sajjad, M.[Muhammad],
Khan, S.[Salman],
Hussain, T.[Tanveer],
Muhammad, K.[Khan],
Sangaiah, A.K.[Arun Kumar],
Castiglione, A.[Aniello],
Esposito, C.[Christian],
Baik, S.W.[Sung Wook],
CNN-based anti-spoofing two-tier multi-factor authentication system,
PRL(126), 2019, pp. 123-131.
Elsevier DOI
1909
Biometric recognition, Anti-spoofing, Information security, Convolutional neural networks
BibRef
Jia, S.[Shan],
Guo, G.D.[Guo-Dong],
Xu, Z.Q.[Zheng-Quan],
A survey on 3D mask presentation attack detection and countermeasures,
PR(98), 2020, pp. 107032.
Elsevier DOI
1911
Face presentation attack, 3D Mask spoofing, Biometrics
BibRef
Chen, F.M.[Fu-Mei],
Wen, C.[Chang],
Xie, K.[Kai],
Wen, F.Q.[Fang-Qing],
Sheng, G.Q.[Guan-Qun],
Tang, X.G.[Xin-Gong],
Face liveness detection: fusing colour texture feature and deep feature,
IET-Bio(8), No. 6, November 2019, pp. 369-377.
DOI Link
1911
BibRef
Jiang, F.L.[Fang-Ling],
Liu, P.C.[Peng-Cheng],
Zhou, X.D.[Xiang-Dong],
Multilevel fusing paired visible light and near-infrared spectral
images for face anti-spoofing,
PRL(128), 2019, pp. 30-37.
Elsevier DOI
1912
Face anti-spoofing, Face anti-spoofing dataset,
Visible light and near-infrared fusing
BibRef
Jia, S.[Shan],
Guo, G.D.[Guo-Dong],
Xu, Z.Q.[Zheng-Quan],
Wang, Q.C.[Qiang-Chang],
Face presentation attack detection in mobile scenarios:
A comprehensive evaluation,
IVC(93), 2020, pp. 103826.
Elsevier DOI
2001
Face presentation attack, Face recognition,
Performance evaluation, Biometrics
BibRef
Toprak, I.[Imren],
Toygar, Ö.[Önsen],
Ear anti-spoofing against print attacks using three-level fusion of
image quality measures,
SIViP(14), No. 2, March 2020, pp. 417-424.
WWW Link.
2003
BibRef
Ur Rehman, Y.A.[Yasar Abbas],
Po, L.M.[Lai-Man],
Komulainen, J.[Jukka],
Enhancing deep discriminative feature maps via perturbation for face
presentation attack detection,
IVC(94), 2020, pp. 103858.
Elsevier DOI
2003
Spoofing, Presentation attack detection, CNN, Attention, Face-biometrics
BibRef
Peng, F.[Fei],
Qin, L.[Le],
Long, M.[Min],
Face presentation attack detection based on chromatic co-occurrence
of local binary pattern and ensemble learning,
JVCIR(66), 2020, pp. 102746.
Elsevier DOI
2003
Presentation attack detection, Face recognition,
Color distortion, Ensemble learning
BibRef
Bresan, R.[Rodrigo],
Beluzo, C.[Carlos],
Carvalho, T.[Tiago],
Exposing Presentation Attacks by a Combination of Multi-intrinsic Image
Properties, Convolutional Networks and Transfer Learning,
ACIVS20(153-165).
Springer DOI
2003
BibRef
Raj, S.[Sunny],
Pannu, J.S.[Jodh S.],
Fernandes, S.L.[Steven L.],
Ramanathan, A.[Arvind],
Pullum, L.L.[Laura L.],
Jha, S.K.[Sumit K.],
Attacking NIST biometric image software using nonlinear optimization,
PRL(131), 2020, pp. 79-84.
Elsevier DOI
2004
NIST biometric image software, MINDTCT, BOZORTH3, NLopt
BibRef
Ma, Y.[Yukun],
Wu, L.[Lifang],
Li, Z.[Zeyu],
liu, F.[Fanghao],
A novel face presentation attack detection scheme based on
multi-regional convolutional neural networks,
PRL(131), 2020, pp. 261-267.
Elsevier DOI
2004
Face presentation attack detection, Adversarial examples,
Local classification loss, Multi-regional convolutional neural networks
BibRef
Li, L.[Lei],
Xia, Z.Q.[Zhao-Qiang],
Jiang, X.Y.[Xiao-Yue],
Ma, Y.P.[Yu-Peng],
Roli, F.[Fabio],
Feng, X.Y.[Xiao-Yi],
3D face mask presentation attack detection based on intrinsic image
analysis,
IET-Bio(9), No. 3, May 2020, pp. 100-108.
DOI Link
2005
BibRef
Rathgeb, C.[Christian],
Botaljov, A.[Angelika],
Stockhardt, F.[Fabian],
Isadskiy, S.[Sergey],
Debiasi, L.[Luca],
Uhl, A.[Andreas],
Busch, C.[Christoph],
PRNU-based detection of facial retouching,
IET-Bio(9), No. 4, July 2020, pp. 154-164.
DOI Link
2006
BibRef
Zhang, B.[Bowen],
Tondi, B.[Benedetta],
Barni, M.[Mauro],
Adversarial examples for replay attacks against CNN-based face
recognition with anti-spoofing capability,
CVIU(197-198), 2020, pp. 102988.
Elsevier DOI
2008
Adversarial examples, Anti-spoofing,
Physical domain adversarial examples, Presentation attack, Face authentication
BibRef
Peng, F.,
Yin, L.P.,
Zhang, L.B.,
Long, M.,
CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on
Generative Adversarial Network,
MultMed(22), No. 10, October 2020, pp. 2511-2525.
IEEE DOI
2009
Feature extraction, Detectors, Forensics, Image color analysis,
Convolution, Histograms, Generative adversarial networks,
computer-generated graphics (CG) detector
BibRef
Zhang, W.L.[Wan-Ling],
Xiang, S.J.[Shi-Jun],
Face anti-spoofing detection based on DWT-LBP-DCT features,
SP:IC(89), 2020, pp. 115990.
Elsevier DOI
2010
Face anti-spoofing, DWT, LBP, DCT, REPLAY-ATTACK, CASIA-FASD
BibRef
Tian, Y.[Ye],
Xiang, S.J.[Shi-Jun],
Detection of Video-Based Face Spoofing Using LBP and Multiscale DCT,
IWDW16(16-28).
Springer DOI
1703
BibRef
Zhou, J.L.[Jian-Li],
Liang, C.[Chao],
Chen, J.[Jun],
Manifold Projection for Adversarial Defense on Face Recognition,
ECCV20(XXX: 288-305).
Springer DOI
2010
BibRef
Scherhag, U.[Ulrich],
Kunze, J.[Jonas],
Rathgeb, C.[Christian],
Busch, C.[Christoph],
Face morph detection for unknown morphing algorithms and image sources:
a multi-scale block local binary pattern fusion approach,
IET-Bio(9), No. 6, November 2020, pp. 278-289.
DOI Link
2010
BibRef
Massoli, F.V.[Fabio Valerio],
Carrara, F.[Fabio],
Amato, G.[Giuseppe],
Falchi, F.[Fabrizio],
Detection of Face Recognition Adversarial Attacks,
CVIU(202), 2021, pp. 103103.
Elsevier DOI
2012
Deep Learning, Face Recognition, Adversarial attacks,
Adversarial detection, Adversarial biometrics
BibRef
Guo, Z.Q.[Zhi-Qing],
Yang, G.B.[Gao-Bo],
Chen, J.Y.[Ji-You],
Sun, X.M.[Xing-Ming],
Fake face detection via adaptive manipulation traces extraction
network,
CVIU(204), 2021, pp. 103170.
Elsevier DOI
2102
Face image manipulation, Passive image forensics, Manipulation traces extraction
BibRef
Fatemifar, S.[Soroush],
Arashloo, S.R.[Shervin Rahimzadeh],
Awais, M.[Muhammad],
Kittler, J.V.[Josef V.],
Client-specific anomaly detection for face presentation attack
detection,
PR(112), 2021, pp. 107696.
Elsevier DOI
2102
Anomaly detection, Biometrics, Client-specific information,
Deep convolutional neural networks, Face spoofing detection
BibRef
Nguyen, S.M.[Son Minh],
Tran, L.D.[Linh Duy],
Arai, M.[Masayuki],
Attended-auxiliary Supervision Representation for Face Anti-spoofing,
ACCV20(I:436-452).
Springer DOI
2103
BibRef
Guo, W.[Wei],
Tondi, B.[Benedetta],
Barni, M.[Mauro],
A Master Key backdoor for universal impersonation attack against
DNN-based face verification,
PRL(144), 2021, pp. 61-67.
Elsevier DOI
2103
Backdoor attacks to CNN, Face verification, Biometric security,
Presentation attacks, Adversarial machine learning
BibRef
Jia, S.[Shan],
Hu, C.B.[Chuan-Bo],
Li, X.[Xin],
Xu, Z.Q.[Zheng-Quan],
Face spoofing detection under super-realistic 3D wax face attacks,
PRL(145), 2021, pp. 103-109.
Elsevier DOI
2104
Face anti-spoofing, 3D face presentation attack,
Wax figure face database, Residual Attention Network
BibRef
Chen, B.,
Yang, W.,
Wang, S.,
Generalized Face Antispoofing by Learning to Fuse Features From High-
and Low-Frequency Domains,
MultMedMag(28), No. 1, January 2021, pp. 56-64.
IEEE DOI
2104
Feature extraction, Streaming media, Face recognition,
Frequency-domain analysis, Training data, Testing,
low frequency
BibRef
Quan, R.,
Wu, Y.,
Yu, X.,
Yang, Y.,
Progressive Transfer Learning for Face Anti-Spoofing,
IP(30), 2021, pp. 3946-3955.
IEEE DOI
2104
Face recognition, Training, Reliability, Data models, Testing,
Transfer learning, Training data, Face anti spoofing,
transfer learning
BibRef
Jia, Y.P.[Yun-Pei],
Zhang, J.[Jie],
Shan, S.G.[Shi-Guang],
Chen, X.L.[Xi-Lin],
Unified unsupervised and semi-supervised domain adaptation network
for cross-scenario face anti-spoofing,
PR(115), 2021, pp. 107888.
Elsevier DOI
2104
Face anti-spoofing, Face presentation attack detection,
Domain adaptation, Deep learning
BibRef
Wang, Y.W.[Yong-Wei],
Ding, X.[Xin],
Yang, Y.X.[Yi-Xin],
Ding, L.[Li],
Ward, R.[Rabab],
Wang, Z.J.[Z. Jane],
Perception matters: Exploring imperceptible and transferable
anti-forensics for GAN-generated fake face imagery detection,
PRL(146), 2021, pp. 15-22.
Elsevier DOI
2105
Fake face imagery anti-forensics, Imperceptible attacks,
Transferable attacks, Improved adversarial attack
BibRef
Zhu, X.[Xun],
Li, S.[Sheng],
Zhang, X.P.[Xin-Peng],
Li, H.L.[Hao-Liang],
Kot, A.C.[Alex C.],
Detection of Spoofing Medium Contours for Face Anti-Spoofing,
CirSysVideo(31), No. 5, 2021, pp. 2039-2045.
IEEE DOI
2105
BibRef
Li, Z.S.[Zhi-Shan],
Yuan, J.Y.[Jia-Yan],
Jia, B.Z.[Bao-Zhi],
He, Y.F.[Yi-Fan],
Xie, L.[Lei],
An Effective Face Anti-Spoofing Method via Stereo Matching,
SPLetters(28), 2021, pp. 847-851.
IEEE DOI
2106
Face recognition, Faces, Training, Signal processing algorithms,
Convolution, Task analysis, Real-time systems, Face anti-spoofing,
lightweight
BibRef
Bisogni, C.[Carmen],
Cascone, L.[Lucia],
Dugelay, J.L.[Jean-Luc],
Pero, C.[Chiara],
Adversarial attacks through architectures and spectra in face
recognition,
PRL(147), 2021, pp. 55-62.
Elsevier DOI
2106
Adversarial Attack, Deep Neural Networks, White-Box Attack,
Black-Box Attack, Near Infrared Images, Thermal Images
BibRef
Ngô, L.M.[Lê Minh],
Wang, W.[Wei],
Mandira, B.[Burak],
Karaoglu, S.[Sezer],
Bouma, H.[Henri],
Dibeklioglu, H.[Hamdi],
Gevers, T.[Theo],
Identity Unbiased Deception Detection by 2D-to-3D Face Reconstruction,
WACV21(145-154)
IEEE DOI
2106
Video sequences, Pipelines, Feature extraction, Real-time systems,
Magnetic heads, Reliability, Convolutional neural networks
BibRef
Liu, A.[Ajian],
Li, X.[Xuan],
Wan, J.[Jun],
Liang, Y.Y.[Yan-Yan],
Escalera, S.[Sergio],
Escalante, H.J.[Hugo Jair],
Madadi, M.[Meysam],
Jin, Y.[Yi],
Wu, Z.Y.[Zhuo-Yuan],
Yu, X.G.[Xiao-Gang],
Tan, Z.C.[Zi-Chang],
Yuan, Q.[Qi],
Yang, R.K.[Rui-Kun],
Zhou, B.J.[Ben-Jia],
Guo, G.D.[Guo-Dong],
Li, S.Z.[Stan Z.],
Cross-ethnicity face anti-spoofing recognition challenge: A review,
IET-Bio(10), No. 1, 2021, pp. 24-43.
DOI Link
2106
BibRef
Earlier: A1, A13, A3, A5, A15, A16, Only:
CASIA-SURF CeFA: A Benchmark for Multi-modal Cross-Ethnicity Face
Anti-spoofing,
WACV21(1178-1186)
IEEE DOI
2106
Protocols,
Face recognition, Current measurement, Computational modeling
BibRef
Hofbauer, H.[Heinz],
Debiasi, L.[Luca],
Kränkl, S.[Susanne],
Uhl, A.[Andreas],
Exploring presentation attack vulnerability and usability of face
recognition systems,
IET-Bio(10), No. 2, 2021, pp. 219-232.
DOI Link
2106
BibRef
Yu, Z.T.[Zi-Tong],
Wan, J.[Jun],
Qin, Y.X.[Yun-Xiao],
Li, X.B.[Xiao-Bai],
Li, S.Z.[Stan Z.],
Zhao, G.Y.[Guo-Ying],
NAS-FAS: Static-Dynamic Central Difference Network Search for Face
Anti-Spoofing,
PAMI(43), No. 9, September 2021, pp. 3005-3023.
IEEE DOI
2108
Task analysis, Face recognition, Convolution, Testing,
Computer architecture, Protocols, Search problems,
CASIA-SURF 3DMask
BibRef
Yu, Z.T.[Zi-Tong],
Li, X.B.[Xiao-Bai],
Niu, X.S.[Xue-Song],
Shi, J.G.[Jin-Gang],
Zhao, G.Y.[Guo-Ying],
Face Anti-spoofing with Human Material Perception,
ECCV20(VII:557-575).
Springer DOI
2011
BibRef
Bonomi, M.[Mattia],
Pasquini, C.[Cecilia],
Boato, G.[Giulia],
Dynamic texture analysis for detecting fake faces in video sequences,
JVCIR(79), 2021, pp. 103239.
Elsevier DOI
2109
Manipulated videos, Deepfakes, Video forensics, Local Derivative Patterns
BibRef
González-Soler, L.J.[Lázaro J.],
Gomez-Barrero, M.[Marta],
Busch, C.[Christoph],
On the generalisation capabilities of Fisher vector-based face
presentation attack detection,
IET-Bio(10), No. 5, 2021, pp. 480-496.
DOI Link
2109
BibRef
Jia, S.[Shan],
Li, X.[Xin],
Hu, C.B.[Chuan-Bo],
Guo, G.D.[Guo-Dong],
Xu, Z.Q.[Zheng-Quan],
3D Face Anti-Spoofing With Factorized Bilinear Coding,
CirSysVideo(31), No. 10, October 2021, pp. 4031-4045.
IEEE DOI
2110
Face recognition, Databases, Faces, Videos, Feature extraction,
face anti-spoofing
BibRef
Arashloo, S.R.[Shervin Rahimzadeh],
Unseen Face Presentation Attack Detection Using Sparse Multiple
Kernel Fisher Null-Space,
CirSysVideo(31), No. 10, October 2021, pp. 4084-4095.
IEEE DOI
2110
Faces, Kernel, Face recognition, Training, Anomaly detection,
Task analysis, Support vector machines,
sparse regularisation
BibRef
Fang, M.L.[Mei-Ling],
Damer, N.[Naser],
Kirchbuchner, F.[Florian],
Kuijper, A.[Arjan],
Real masks and spoof faces: On the masked face presentation attack
detection,
PR(123), 2022, pp. 108398.
Elsevier DOI
2112
Face presentation attack detection, COVID-19, Masked face,
Face recognition, Biometric security
BibRef
Wang, C.X.[Cai-Xun],
Zhou, J.[Jie],
An adaptive index smoothing loss for face anti-spoofing,
PRL(153), 2022, pp. 168-175.
Elsevier DOI
2201
Face anti-spoofing, Cross-entropy, Index smoothing
BibRef
Baaqeel, H.[Hind],
Olatunji, S.O.[Sunday Olusanya],
Spoofing detection on adaptive authentication System-A survey,
IET-Bio(11), No. 2, 2022, pp. 87-96.
DOI Link
2202
adaptive authentication, biometrics, security and privacy, user authentication
BibRef
Liu, M.X.[Ming-Xin],
Mu, J.[Jiong],
Yu, Z.T.[Zi-Tong],
Ruan, K.[Kun],
Shu, B.[Baiyi],
Yang, J.[Jie],
Adversarial learning and decomposition-based domain generalization
for face anti-spoofing,
PRL(155), 2022, pp. 171-177.
Elsevier DOI
2203
Deep learning, Face anti-spoofing, Domain generalization, Low-rank decomposition
BibRef
Wang, Z.[Zhuo],
Wang, Z.Z.[Ze-Zheng],
Yu, Z.T.[Zi-Tong],
Deng, W.H.[Wei-Hong],
Li, J.H.[Jia-Hong],
Gao, T.T.[Ting-Ting],
Wang, Z.Y.[Zhong-Yuan],
Domain Generalization via Shuffled Style Assembly for Face
Anti-Spoofing,
CVPR22(4113-4123)
IEEE DOI
2210
Industries, Codes, Face recognition, Gesture recognition,
Benchmark testing, Feature extraction, Face and gestures,
retrieval
BibRef
Chang, H.H.[Herng-Hua],
Yeh, C.H.[Chun-Hsiao],
Face anti-spoofing detection based on multi-scale image quality
assessment,
IVC(121), 2022, pp. 104428.
Elsevier DOI
2205
BibRef
Earlier: A2, A1:
Face Liveness Detection Based on Perceptual Image Quality Assessment
Features with Multi-scale Analysis,
WACV18(49-56)
IEEE DOI
1806
BibRef
Earlier: A2, A1:
Face liveness detection with feature discrimination between sharpness
and blurriness,
MVA17(398-401)
DOI Link
1708
Face recognition, Image quality assessment,
Face presentation attack detection, Local face trait, Top gradient similarity.
feature extraction, fingerprint identification,
image classification, image texture, BIQE, Replay-Attack,
Videos.
Face, Nose, Organizations, Security.
BibRef
Muhammad, U.[Usman],
Yu, Z.T.[Zi-Tong],
Komulainen, J.[Jukka],
Self-supervised 2D face presentation attack detection via temporal
sequence sampling,
PRL(156), 2022, pp. 15-22.
Elsevier DOI
2205
Face recognition, Presentation attack detection, Spoofing,
Liveness detection, Self-supervised learning, Motion compensation
BibRef
Muhammad, U.[Usman],
Oussalah, M.[Mourad],
Self-Supervised Face Presentation Attack Detection with Dynamic
Grayscale Snippets,
FG23(1-6)
IEEE DOI
2303
Representation learning, Face recognition, Video sequences,
Dynamics, Supervised learning, Self-supervised learning, Gray-scale
BibRef
Peng, F.[Fei],
Meng, S.H.[Shao-Hua],
Long, M.[Min],
Presentation attack detection based on two-stream vision transformers
with self-attention fusion,
JVCIR(85), 2022, pp. 103518.
Elsevier DOI
2205
Presentation attack detection,
Multi-scale retinex with color restoration,
Feature fusion
BibRef
Fatemifar, S.[Soroush],
Asadi, S.[Shahrokh],
Awais, M.[Muhammad],
Akbari, A.[Ali],
Kittler, J.V.[Josef V.],
Face spoofing detection ensemble via multistage optimisation and
pruning,
PRL(158), 2022, pp. 1-8.
Elsevier DOI
2205
Face spoofing detection, Anomaly detection,
Client-specific information, Ensemble pruning
BibRef
Wu, H.T.[Hang-Tong],
Zeng, D.[Dan],
Hu, Y.[Yibo],
Shi, H.L.[Hai-Lin],
Mei, T.[Tao],
Dual Spoof Disentanglement Generation for Face Anti-Spoofing With
Depth Uncertainty Learning,
CirSysVideo(32), No. 7, July 2022, pp. 4626-4638.
IEEE DOI
2207
Faces, Training, Face recognition, Uncertainty, Feature extraction,
Generators, Soft sensors, Face anti-spoofing,
depth uncertainty learning
BibRef
Peng, F.[Fei],
Qin, L.[Le],
Long, M.[Min],
Face morphing attack detection and attacker identification based on a
watchlist,
SP:IC(107), 2022, pp. 116748.
Elsevier DOI
2208
Automated border control, Face verification, Morphing attacks,
Morphing attack detection, Watchlist
BibRef
Qin, Y.X.[Yun-Xiao],
Yu, Z.T.[Zi-Tong],
Yan, L.B.[Long-Bin],
Wang, Z.Z.[Ze-Zheng],
Zhao, C.X.[Chen-Xu],
Lei, Z.[Zhen],
Meta-Teacher For Face Anti-Spoofing,
PAMI(44), No. 10, October 2022, pp. 6311-6326.
IEEE DOI
2209
Detectors, Face recognition, Training, Faces, Feature extraction,
Training data, Optimization, Face anti-spoofing, meta-teacher,
deep-learning
BibRef
Wu, Y.Q.[Yi-Qiang],
Tao, D.P.[Da-Peng],
Luo, Y.[Yong],
Cheng, J.[Jun],
Li, X.L.[Xue-Long],
Covered Style Mining via Generative Adversarial Networks for Face
Anti-spoofing,
PR(132), 2022, pp. 108957.
Elsevier DOI
2209
Face anti-spoofing, Generative adversarial networks, Deep learning
BibRef
Raja, K.[Kiran],
Gupta, G.[Gourav],
Venkatesh, S.[Sushma],
Ramachandra, R.[Raghavendra],
Busch, C.[Christoph],
Towards generalized morphing attack detection by learning residuals,
IVC(126), 2022, pp. 104535.
Elsevier DOI
2209
Morphing attacks, Morphing attack detection, Face recognition,
Vulnerability of biometric systems
BibRef
Fu, B.Y.[Bi-Ying],
Damer, N.[Naser],
Face morphing attacks and face image quality: The effect of morphing
and the unsupervised attack detection by quality,
IET-Bio(11), No. 5, 2022, pp. 359-382.
DOI Link
2210
BibRef
Mudgalgundurao, R.[Raghavendra],
Schuch, P.[Patrick],
Raja, K.[Kiran],
Ramachandra, R.[Raghavendra],
Damer, N.[Naser],
Pixel-wise supervision for presentation attack detection on identity
document cards,
IET-Bio(11), No. 5, 2022, pp. 383-395.
DOI Link
2210
BibRef
Kantarci, A.[Alperen],
Dertli, H.[Hasan],
Ekenel, H.K.[Hazim Kemal],
Deep patch-wise supervision for presentation attack detection,
IET-Bio(11), No. 5, 2022, pp. 396-406.
DOI Link
2210
convolutional neural networks, face antispoofing,
presentation attack detection, real-world dataset
BibRef
Rezgui, Z.[Zohra],
Bassit, A.[Amina],
Veldhuis, R.[Raymond],
Transferability analysis of adversarial attacks on gender
classification to face recognition: Fixed and variable attack
perturbation,
IET-Bio(11), No. 5, 2022, pp. 407-419.
DOI Link
2210
adversarial attacks, face recognition, gender classification, privacy protection
BibRef
Zheng, X.[Xin],
Fan, Y.B.[Yan-Bo],
Wu, B.Y.[Bao-Yuan],
Zhang, Y.[Yong],
Wang, J.[Jue],
Pan, S.R.[Shi-Rui],
Robust Physical-World Attacks on Face Recognition,
PR(133), 2023, pp. 109009.
Elsevier DOI
2210
Physical-world adversarial attack, Face recognition,
Environmental variations, Curriculum learning
BibRef
Zhang, W.T.[Wen-Tian],
Liu, H.Z.[Hao-Zhe],
Liu, F.[Feng],
Ramachandra, R.[Raghavendra],
Busch, C.[Christoph],
Effective Presentation Attack Detection Driven by Face Related Task,
ECCV22(V:408-423).
Springer DOI
2211
BibRef
Marcialis, G.L.[Gian Luca],
Liu, X.M.[Xiao-Ming],
Didaci, L.[Luca],
Biometric presentation attacks: Handcrafted features versus deep
learning approaches,
PRL(163), 2022, pp. 55-56.
Elsevier DOI
2212
BibRef
Huang, R.[Rui],
Wang, X.[Xin],
Face anti-spoofing using feature distilling and global attention
learning,
PR(135), 2023, pp. 109147.
Elsevier DOI
2212
Face anti-spoofing, Anti-interference, Multi-level distillation,
Global spatial attention learning, Pixel-wise supervision
BibRef
Pei, M.T.[Ming-Tao],
Yan, B.[Bin],
Hao, H.L.[Hui-Ling],
Zhao, M.[Meng],
Person-Specific Face Spoofing Detection Based on a Siamese Network,
PR(135), 2023, pp. 109148.
Elsevier DOI
2212
Face spoofing detection, Identity information, Siamese network
BibRef
Wang, C.X.[Cai-Xun],
Yu, B.Y.[Bing-Yao],
Zhou, J.[Jie],
A Learnable Gradient operator for face presentation attack detection,
PR(135), 2023, pp. 109146.
Elsevier DOI
2212
Face presentation attack detection,
Learnable gradient operator, Depth-supervised network
BibRef
Li, Z.[Zhi],
Li, H.L.[Hao-Liang],
Luo, X.[Xin],
Hu, Y.J.[Yong-Jian],
Lam, K.Y.[Kwok-Yan],
Kot, A.C.[Alex C.],
Asymmetric Modality Translation for Face Presentation Attack
Detection,
MultMed(25), 2023, pp. 62-76.
IEEE DOI
2301
Faces, Lighting, Face recognition, Transforms, Training, Cameras,
Task analysis, Face presentation attack detection,
illumination normalization
BibRef
Li, H.,
Wang, S.,
Kot, A.C.,
Face spoofing detection with image quality regression,
IPTA16(1-6)
IEEE DOI
1703
biometrics (access control)
BibRef
Liu, Y.J.[Yao-Jie],
Liu, X.M.[Xiao-Ming],
Spoof Trace Disentanglement for Generic Face Anti-Spoofing,
PAMI(45), No. 3, March 2023, pp. 3813-3830.
IEEE DOI
2302
Face recognition, Task analysis, Faces, Feature extraction, Deep learning,
Data models, Deep learning, face anti-spoofing, weak supervision
BibRef
Liu, Y.J.[Yao-Jie],
Stehouwer, J.[Joel],
Liu, X.M.[Xiao-Ming],
On Disentangling Spoof Trace for Generic Face Anti-spoofing,
ECCV20(XVIII:406-422).
Springer DOI
2012
BibRef
Zhang, H.T.[Hai-Tao],
Chen, B.[Beijing],
Wang, J.W.[Jin-Wei],
Zhao, G.Y.[Guo-Ying],
A Local Perturbation Generation Method for GAN-Generated Face
Anti-Forensics,
CirSysVideo(33), No. 2, February 2023, pp. 661-676.
IEEE DOI
2302
Faces, Detectors, Perturbation methods, Forensics, Visualization,
Face recognition, Generative adversarial networks, double mask
BibRef
da Silva, V.L.[Vitor Luiz],
Lérida, J.L.[Josep Luis],
Sarret, M.[Marta],
Valls, M.[Magda],
Giné, F.[Francesc],
Residual spatiotemporal convolutional networks for face anti-spoofing,
JVCIR(91), 2023, pp. 103744.
Elsevier DOI
2303
Face anti-spoofing, Residual networks,
Channel-separated networks, Spoofing detection, Biometrics
BibRef
Yu, Z.T.[Zi-Tong],
Qin, Y.[Yunxiao],
Li, X.B.[Xiao-Bai],
Zhao, C.X.[Chen-Xu],
Lei, Z.[Zhen],
Zhao, G.Y.[Guo-Ying],
Deep Learning for Face Anti-Spoofing: A Survey,
PAMI(45), No. 5, May 2023, pp. 5609-5631.
IEEE DOI
2304
Face recognition, Deep learning, Cameras, Task analysis, Sensors,
Protocols, Face anti-spoofing,
domain generalization
BibRef
Wu, B.[Bin],
Su, L.C.[Li-Chao],
Chen, D.[Dan],
Cheng, Y.L.[Yong-Li],
FPC-Net: Learning to detect face forgery by adaptive feature fusion
of patch correlation with CG-Loss,
IET-CV(17), No. 3, 2023, pp. 330-340.
DOI Link
2305
adaptive feature fusion, facial forgery detection
BibRef
Liu, Y.[Yongluo],
Wu, L.F.[Li-Fang],
Li, Z.[Zun],
Wang, Z.[Zhuming],
Dual-stream correlation exploration for face anti-Spoofing,
PRL(170), 2023, pp. 17-23.
Elsevier DOI
2306
Face anti-spoofing, Metric correlation learning,
Liveness and content feature learning
BibRef
Zhu, X.Y.[Xiang-Yu],
Fei, H.Y.[Hong-Yan],
Zhang, B.[Bin],
Zhang, T.S.[Tian-Shuo],
Zhang, X.Y.[Xiao-Yu],
Li, S.Z.[Stan Z.],
Lei, Z.[Zhen],
Face Forgery Detection by 3D Decomposition and Composition Search,
PAMI(45), No. 7, July 2023, pp. 8342-8357.
IEEE DOI
2306
Faces, Forgery, Face recognition, Feature extraction, Lighting,
Composition search, differentiable search, fake face,
3D face model
BibRef
Zhu, X.Y.[Xiang-Yu],
Wang, H.[Hao],
Fei, H.Y.[Hong-Yan],
Lei, Z.[Zhen],
Li, S.Z.[Stan Z.],
Face Forgery Detection by 3D Decomposition,
CVPR21(2928-2938)
IEEE DOI
2111
Geometry, Shape,
Face recognition, Lighting, Production
BibRef
Chen, S.J.[Sheng-Jie],
Wu, G.[Gang],
Yang, Y.[Yujiu],
Guo, Z.H.[Zhen-Hua],
A simple and effective patch-Based method for frame-level face
anti-spoofing,
PRL(171), 2023, pp. 1-7.
Elsevier DOI
2306
Face anti-spoofing, Liveness detection, Image-level,
Attention mechanism, Patch sampling
BibRef
Jiang, F.L.[Fang-Ling],
Li, Q.[Qi],
Liu, P.C.[Peng-Cheng],
Zhou, X.D.[Xiang-Dong],
Sun, Z.A.[Zhen-An],
Adversarial Learning Domain-Invariant Conditional Features for Robust
Face Anti-spoofing,
IJCV(131), No. 7, July 2023, pp. 1680-1703.
Springer DOI
2307
BibRef
Zhang, D.H.[Dong-Heng],
Meng, J.[Jia],
Zhang, J.[Jian],
Deng, X.Z.[Xin-Zhe],
Ding, S.H.[Shou-Hong],
Zhou, M.[Man],
Wang, Q.[Qian],
Li, Q.[Qi],
Chen, Y.[Yan],
SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices,
CirSysVideo(33), No. 8, August 2023, pp. 4401-4414.
IEEE DOI
2308
Ultrasonic imaging, Lips, Faces, Hardware, Mobile handsets,
Face recognition, Authentication, Liveness detection,
information fusion
BibRef
Zhu, S.[Shiwei],
Xiang, S.J.[Shi-Jun],
Multiscale residual gradient attention for face anti-spoofing,
JVCIR(95), 2023, pp. 103886.
Elsevier DOI
2309
Face anti-spoofing, Residual gradient convolution,
Adjacent depth loss, Local depth auxiliary supervision
BibRef
Chen, J.W.[Jia-Wei],
Yang, X.[Xiao],
Yin, H.[Heng],
Ma, M.Z.[Ming-Zhi],
Chen, B.[Bihui],
Peng, J.T.[Jian-Teng],
Guo, Y.D.[Yan-Dong],
Yin, Z.X.[Zhao-Xia],
Su, H.[Hang],
AdvFAS: A robust face anti-spoofing framework against adversarial
examples,
CVIU(235), 2023, pp. 103779.
Elsevier DOI
2310
Face anti-spoofing, Adversarial attack, Deep neural networks,
Coupled relationship
BibRef
Hu, C.[Cong],
Li, Y.B.[Yuan-Bo],
Feng, Z.H.[Zhen-Hua],
Wu, X.J.[Xiao-Jun],
Attention-guided evolutionary attack with elastic-net regularization
on face recognition,
PR(143), 2023, pp. 109760.
Elsevier DOI
2310
Face recognition, Convolutional neural networks,
Adversarial examples, Evolutionary attack, Attention mechanisms
BibRef
Li, Y.J.[Yan-Jie],
Li, Y.[Yiquan],
Dai, X.L.[Xue-Long],
Guo, S.T.[Song-Tao],
Xiao, B.[Bin],
Physical-World Optical Adversarial Attacks on 3D Face Recognition,
CVPR23(24699-24708)
IEEE DOI
2309
BibRef
Li, Z.X.[Ze-Xin],
Yin, B.[Bangjie],
Yao, T.P.[Tai-Ping],
Guo, J.F.[Jun-Feng],
Ding, S.H.[Shou-Hong],
Chen, S.[Simin],
Liu, C.[Cong],
Sibling-Attack: Rethinking Transferable Adversarial Attacks against
Face Recognition,
CVPR23(24626-24637)
IEEE DOI
2309
BibRef
Shamshad, F.[Fahad],
Srivatsan, K.[Koushik],
Nandakumar, K.[Karthik],
Evading Forensic Classifiers with Attribute-Conditioned Adversarial
Faces,
CVPR23(16469-16478)
IEEE DOI
2309
BibRef
Mundra, S.[Shivansh],
Porcile, G.J.A.[Gonzalo J. Aniano],
Marvaniya, S.[Smit],
Verbus, J.R.[James R.],
Farid, H.[Hany],
Exposing GAN-Generated Profile Photos from Compact Embeddings,
WMF23(884-892)
IEEE DOI
2309
BibRef
Yu, Z.T.[Zi-Tong],
Liu, A.[Ajian],
Zhao, C.X.[Chen-Xu],
Cheng, K.H.M.[Kevin H. M.],
Cheng, X.[Xu],
Zhao, G.Y.[Guo-Ying],
Flexible-Modal Face Anti-Spoofing: A Benchmark,
ChaLearnFAS23(6346-6351)
IEEE DOI
2309
BibRef
Liu, Y.L.[Yong-Luo],
Xu, Y.W.[Yao-Wen],
Zou, Z.F.[Zhao-Fan],
Wang, Z.M.[Zhu-Ming],
Zhang, B.[Bowen],
Wu, L.F.[Li-Fang],
Guo, Z.Z.[Zhi-Zhi],
He, Z.X.[Zhi-Xiang],
Adversarial Domain Generalization for Surveillance Face Anti-Spoofing,
ChaLearnFAS23(6352-6360)
IEEE DOI
2309
BibRef
Wang, K.[Keyao],
Huang, M.[Mouxiao],
Zhang, G.S.[Guo-Sheng],
Yue, H.X.[Hai-Xiao],
Zhang, G.[Gang],
Qiao, Y.[Yu],
Dynamic Feature Queue for Surveillance Face Anti-spoofing via
Progressive Training,
ChaLearnFAS23(6372-6379)
IEEE DOI
2309
BibRef
Wang, D.[Dong],
Guo, J.[Jia],
Shao, Q.Q.[Qi-Qi],
He, H.[Haochi],
Chen, Z.[Zhian],
Xiao, C.[Chuanbao],
Liu, A.[Ajian],
Escalera, S.[Sergio],
Escalante, H.J.[Hugo Jair],
Lei, Z.[Zhen],
Wan, J.[Jun],
Deng, J.K.[Jian-Kang],
Wild Face Anti-Spoofing Challenge 2023: Benchmark and Results,
ChaLearnFAS23(6380-6391)
IEEE DOI
2309
BibRef
Martínez-Díaz, Y.[Yoanna],
Méndez-Vázquez, H.[Heydi],
Luevano, L.S.[Luis S.],
Gonzalez-Mendoza, M.[Miguel],
Exploring the Effectiveness of Lightweight Architectures for Face
Anti-Spoofing,
ChaLearnFAS23(6392-6402)
IEEE DOI
2309
BibRef
Zeng, D.H.[Ding-Heng],
Gao, L.[Liang],
Fang, H.[Hao],
Xiang, G.H.[Guo-Hui],
Feng, Y.[Yue],
Lu, Q.[Quan],
Bandpass Filter Based Dual-stream Network for Face Anti-spoofing,
ChaLearnFAS23(6403-6410)
IEEE DOI
2309
BibRef
Chang, C.J.[Chih-Jung],
Lee, Y.C.[Yaw-Chern],
Yao, S.H.[Shih-Hsuan],
Chen, M.H.[Min-Hung],
Wang, C.Y.[Chien-Yi],
Lai, S.H.[Shang-Hong],
Chen, T.P.C.[Trista Pei-Chun],
A Closer Look at Geometric Temporal Dynamics for Face Anti-Spoofing,
Biometrics23(1081-1091)
IEEE DOI
2309
BibRef
Fang, M.L.[Mei-Ling],
Huber, M.[Marco],
Damer, N.[Naser],
SynthASpoof: Developing Face Presentation Attack Detection Based on
Privacy-friendly Synthetic Data,
Biometrics23(1061-1070)
IEEE DOI
2309
BibRef
Yang, S.L.[Song-Lin],
Wang, W.[Wei],
Xu, C.Y.[Chen-Ye],
He, Z.[Ziwen],
Peng, B.[Bo],
Dong, J.[Jing],
Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing
Models,
Biometrics23(1001-1010)
IEEE DOI
2309
BibRef
Liu, A.[Ajian],
Tan, Z.C.[Zi-Chang],
Liang, Y.Y.[Yan-Yan],
Wan, J.[Jun],
Attack-Agnostic Deep Face Anti-Spoofing,
ChaLearnFAS23(6336-6345)
IEEE DOI
2309
BibRef
Bai, W.M.[Wei-Ming],
Liu, Y.F.[Yu-Fan],
Zhang, Z.P.[Zhi-Peng],
Li, B.[Bing],
Hu, W.M.[Wei-Ming],
AUNet: Learning Relations Between Action Units for Face Forgery
Detection,
CVPR23(24709-24719)
IEEE DOI
2309
BibRef
Sun, Y.[Yiyou],
Liu, Y.[Yaojie],
Liu, X.M.[Xiao-Ming],
Li, Y.X.[Yi-Xuan],
Chu, W.S.[Wen-Sheng],
Rethinking Domain Generalization for Face Anti-spoofing: Separability
and Alignment,
CVPR23(24563-24574)
IEEE DOI
2309
BibRef
Zhou, Q.Y.[Qian-Yu],
Zhang, K.Y.[Ke-Yue],
Yao, T.P.[Tai-Ping],
Lu, X.Q.[Xue-Quan],
Yi, R.[Ran],
Ding, S.H.[Shou-Hong],
Ma, L.Z.[Li-Zhuang],
Instance-Aware Domain Generalization for Face Anti-Spoofing,
CVPR23(20453-20463)
IEEE DOI
2309
BibRef
Shi, L.[Liang],
Zhang, J.[Jie],
Liang, C.Y.[Chen-Yue],
Shan, S.G.[Shi-Guang],
Unknown Aware Feature Learning for Face Forgery Detection,
FG21(1-5)
IEEE DOI
2303
Representation learning, Face recognition,
Predictive models, Benchmark testing, Forgery
BibRef
Deb, D.[Debayan],
Liu, X.M.[Xiao-Ming],
Jain, A.K.[Anil K.],
FaceGuard: A Self-Supervised Defense Against Adversarial Face Images,
FG23(1-8)
IEEE DOI
2303
Training, Codes, Purification, Face recognition,
Perturbation methods, Gesture recognition
BibRef
Chuang, C.C.[Chu-Chun],
Wang, C.Y.[Chien-Yi],
Lai, S.H.[Shang-Hong],
Generalized Face Anti-Spoofing via Multi-Task Learning and One-Side
Meta Triplet Loss,
FG23(1-8)
IEEE DOI
2303
Training, Face recognition, Estimation, Gesture recognition,
Multitasking, Task analysis
BibRef
Panwar, A.[Ankush],
Singh, P.[Pratyush],
Saha, S.[Suman],
Paudel, D.P.[Danda Pani],
Van Gool, L.J.[Luc J.],
Unsupervised Compound Domain Adaptation for Face Anti-Spoofing,
FG21(1-8)
IEEE DOI
2303
Training, Performance evaluation, Adaptation models,
Face recognition, Lighting, Gesture recognition
BibRef
Thakral, K.[Kartik],
Mittal, S.[Surbhi],
Vatsa, M.[Mayank],
Singh, R.[Richa],
PhygitalNet: Unified Face Presentation Attack Detection via One-Class
Isolation Learning,
FG23(1-6)
IEEE DOI
2303
Training, Face recognition, Biological system modeling,
Gesture recognition, Performance gain, Classification algorithms, Faces
BibRef
Shmelkin, R.[Ron],
Friedlander, T.[Tomer],
Wolf, L.[Lior],
Generating Master Faces for Dictionary Attacks with a
Network-Assisted Latent Space Evolution,
FG21(01-08)
IEEE DOI
2303
Dictionaries, Face recognition, Sociology,
Neural networks, Gesture recognition, Evolutionary computation
BibRef
Vepakomma, P.[Praneeth],
Singh, A.[Abhishek],
Zhang, E.[Emily],
Gupta, O.[Otkrist],
Raskar, R.[Ramesh],
NoPeek-Infer: Preventing face reconstruction attacks in distributed
inference after on-premise training,
FG21(1-8)
IEEE DOI
2303
Training, Privacy, Correlation, Computational modeling,
Distributed databases, Machine learning, Predictive models
BibRef
Shao, R.[Rui],
Zhang, B.[Bochao],
Yuen, P.C.[Pong C.],
Patel, V.M.[Vishal M.],
Federated Test-Time Adaptive Face Presentation Attack Detection with
Dual-Phase Privacy Preservation,
FG21(1-8)
IEEE DOI
2303
Training, Adaptation models, Data privacy, Data centers,
Face recognition, Soft sensors, Predictive models
BibRef
Hamblin, J.[Jennifer],
Nikhal, K.[Kshitij],
Riggan, B.S.[Benjamin S.],
Understanding Cross Domain Presentation Attack Detection for Visible
Face Recognition,
FG21(1-8)
IEEE DOI
2303
Training, Costs, Protocols, Shape, Face recognition, Transforms, Sensor systems
BibRef
Mirzaalian, H.[Hengameh],
Hussein, M.E.[Mohamed E.],
Spinoulas, L.[Leonidas],
May, J.[Jonathan],
Abd-Almageed, W.[Wael],
Explaining Face Presentation Attack Detection Using Natural Language,
FG21(1-8)
IEEE DOI
2303
Training, Face recognition, Biological system modeling,
Natural languages, Semantics, Neural networks, Predictive models
BibRef
Deb, D.[Debayan],
Liu, X.M.[Xiao-Ming],
Jain, A.K.[Anil K.],
Unified Detection of Digital and Physical Face Attacks,
FG23(1-8)
IEEE DOI
2303
Codes, Face recognition, Gesture recognition, Detectors,
Multitasking, Faces
BibRef
Wang, H.[Hanrui],
Wang, S.[Shuo],
Jin, Z.[Zhe],
Wang, Y.[Yandan],
Chen, C.[Cunjian],
Tistarelli, M.[Massimo],
Similarity-based Gray-box Adversarial Attack Against Deep Face
Recognition,
FG21(1-8)
IEEE DOI
2303
Resistance, Data privacy, Databases, Face recognition,
Authentication, Gesture recognition
BibRef
Al-Refai, R.[Rouqaiah],
Nandakumar, K.[Karthik],
A Unified Model for Face Matching and Presentation Attack Detection
using an Ensemble of Vision Transformer Features,
BioAttack23(662-671)
IEEE DOI
2302
Deep learning, Face recognition, Conferences, Neural networks,
Feature extraction, Transformers, Multitasking
BibRef
Liao, C.H.[Chen-Hao],
Chen, W.C.[Wen-Cheng],
Liu, H.T.[Hsuan-Tung],
Yeh, Y.R.[Yi-Ren],
Hu, M.C.[Min-Chun],
Chen, C.S.[Chu-Song],
Domain Invariant Vision Transformer Learning for Face Anti-spoofing,
WACV23(6087-6096)
IEEE DOI
2302
Protocols, Computational modeling, Aggregates, Transformers,
Feature extraction, Data models, Algorithms: Biometrics, face
BibRef
Zhu, Y.Z.[Yi-Zhe],
Gao, J.L.[Jia-Lin],
Liu, Q.[Qiong],
Zhou, X.[Xi],
Attention-guided Fine-grained Feature Learning For Robust Face
Forgery Detection,
ICPR22(1222-1228)
IEEE DOI
2212
Representation learning, Face recognition,
Frequency-domain analysis, Perturbation methods, Semantics,
Streaming media
BibRef
Liu, A.[Ajian],
Wan, J.[Jun],
Jiang, N.[Ning],
Wang, H.B.[Hong-Bin],
Liang, Y.Y.[Yan-Yan],
Disentangling Facial Pose and Appearance Information for Face
Anti-spoofing,
ICPR22(4537-4543)
IEEE DOI
2212
Codes, Face recognition, Instruments, Switches, Interference,
Benchmark testing, Control systems
BibRef
Zhang, S.[Sheng],
Gao, Z.B.[Zhi-Bin],
Lin, Y.H.[Yun-Hao],
Lu, Y.H.[Yu-Hang],
Huang, L.[Lianfen],
Dynamic Attention based Domain Generalization for Face Anti-Spoofing,
ICPR22(3413-3421)
IEEE DOI
2212
Convolution, Face recognition, Lighting, Gaussian distribution,
Cameras, Frequency division multiplexing, Task analysis
BibRef
Sun, C.Y.[Chun-Yu],
Chen, S.L.[Song-Lu],
Li, X.J.[Xin-Jie],
Chen, F.[Feng],
Yin, X.C.[Xu-Cheng],
DANet: Dynamic Attention to Spoof Patterns for Face Anti-Spoofing,
ICPR22(1929-1936)
IEEE DOI
2212
Face recognition, Lighting, Feature extraction,
Cameras, Robustness, Security
BibRef
Hasan, M.[Md],
Roy, K.[Koushik],
Rupty, L.[Labiba],
Hossain, M.S.[Md. Sourave],
Sengupta, S.[Shirshajit],
Taus, S.N.[Shehzad Noor],
Mohammed, N.[Nabeel],
MHASAN: Multi-Head Angular Self Attention Network for Spoof Detection,
ICPR22(154-160)
IEEE DOI
2212
Measurement, Protocols, Error analysis, Face recognition, Pipelines,
Neural networks, Authentication
BibRef
Belli, D.[Davide],
Das, D.[Debasmit],
Major, B.[Bence],
Porikli, F.M.[Fatih M.],
Online Adaptive Personalization for Face Anti-Spoofing,
ICIP22(351-355)
IEEE DOI
2211
Training, Adaptation models, Costs, Error analysis, Face recognition,
Biological system modeling, Face anti-spoofing, personalization,
unsupervised adaptation
BibRef
Huang, H.P.[Hsin-Ping],
Sun, D.Q.[De-Qing],
Liu, Y.[Yaojie],
Chu, W.S.[Wen-Sheng],
Xiao, T.[Taihong],
Yuan, J.[Jinwei],
Adam, H.[Hartwig],
Yang, M.H.[Ming-Hsuan],
Adaptive Transformers for Robust Few-shot Cross-domain Face
Anti-spoofing,
ECCV22(XIII:37-54).
Springer DOI
2211
BibRef
Liu, Y.C.[Yu-Chen],
Chen, Y.[Yabo],
Dai, W.R.[Wen-Rui],
Gou, M.R.[Meng-Ran],
Huang, C.T.[Chun-Ting],
Xiong, H.K.[Hong-Kai],
Source-Free Domain Adaptation with Contrastive Domain Alignment and
Self-supervised Exploration for Face Anti-spoofing,
ECCV22(XII:511-528).
Springer DOI
2211
BibRef
Zhou, Q.Y.[Qian-Yu],
Zhang, K.Y.[Ke-Yue],
Yao, T.P.[Tai-Ping],
Yi, R.[Ran],
Sheng, K.[Kekai],
Ding, S.H.[Shou-Hong],
Ma, L.Z.[Li-Zhuang],
Generative Domain Adaptation for Face Anti-Spoofing,
ECCV22(V:335-356).
Springer DOI
2211
BibRef
Rathgeb, C.,
Nichols, R.,
Ibsen, M.,
Drozdowski, P.,
Busch, C.,
Crowd-Powered Face Manipulation Detection:
Fusing Human Examiner Decisions,
ICIP22(181-185)
IEEE DOI
2211
Image analysis, Forensics, Reliability, Task analysis, Faces,
Image forensics, manipulation detection, information fusion, human examiners
BibRef
Zhuang, W.[Wanyi],
Chu, Q.[Qi],
Tan, Z.T.[Zhen-Tao],
Liu, Q.K.[Qian-Kun],
Yuan, H.J.[Hao-Jie],
Miao, C.T.[Chang-Tao],
Luo, Z.X.[Zi-Xiang],
Yu, N.H.[Neng-Hai],
UIA-ViT: Unsupervised Inconsistency-Aware Method Based on Vision
Transformer for Face Forgery Detection,
ECCV22(V:391-407).
Springer DOI
2211
BibRef
Sun, K.[Ke],
Liu, H.[Hong],
Yao, T.P.[Tai-Ping],
Sun, X.S.[Xiao-Shuai],
Chen, S.[Shen],
Ding, S.H.[Shou-Hong],
Ji, R.R.[Rong-Rong],
An Information Theoretic Approach for Attention-Driven Face Forgery
Detection,
ECCV22(XIV:111-127).
Springer DOI
2211
BibRef
Liang, J.H.[Jia-Hao],
Shi, H.F.[Hua-Feng],
Deng, W.H.[Wei-Hong],
Exploring Disentangled Content Information for Face Forgery Detection,
ECCV22(XIV:128-145).
Springer DOI
2211
BibRef
Song, L.[Luchuan],
Fang, Z.[Zheng],
Li, X.D.[Xiao-Dan],
Dong, X.Y.[Xiao-Yi],
Jin, Z.C.[Zhen-Chao],
Chen, Y.F.[Yue-Feng],
Lyu, S.W.[Si-Wei],
Adaptive Face Forgery Detection in Cross Domain,
ECCV22(XXXIV:467-484).
Springer DOI
2211
BibRef
Ming, Z.H.[Zu-Heng],
Yu, Z.T.[Zi-Tong],
Al-Ghadi, M.[Musab],
Visani, M.[Muriel],
Luqman, M.M.[Muhammad Muzzamil],
Burie, J.C.[Jean-Christophe],
Vitranspad: Video Transformer Using Convolution And Self-Attention
For Face Presentation Attack Detection,
ICIP22(4248-4252)
IEEE DOI
2211
Convolution, Biometrics (access control), Computational modeling,
Neural networks, Transformers, Task analysis,
face presentation attack detection
BibRef
Ni, Y.S.[Yun-Sheng],
Meng, D.[Depu],
Yu, C.Q.[Chang-Qian],
Quan, C.B.[Cheng-Bin],
Ren, D.C.[Dong-Chun],
Zhao, Y.J.[You-Jian],
CORE: Consistent Representation Learning for Face Forgery Detection,
WMF22(12-21)
IEEE DOI
2210
Representation learning, Codes, Face recognition,
Market research, Forgery
BibRef
Wang, C.Y.[Chien-Yi],
Lu, Y.D.[Yu-Ding],
Yang, S.T.[Shang-Ta],
Lai, S.H.[Shang-Hong],
PatchNet: A Simple Face Anti-Spoofing Framework via Fine-Grained
Patch Recognition,
CVPR22(20249-20258)
IEEE DOI
2210
Image recognition, Face recognition, Image capture,
Benchmark testing, Biometrics, Face and gestures
BibRef
Cao, J.[Junyi],
Ma, C.[Chao],
Yao, T.P.[Tai-Ping],
Chen, S.[Shen],
Ding, S.H.[Shou-Hong],
Yang, X.K.[Xiao-Kang],
End-to-End Reconstruction-Classification Learning for Face Forgery
Detection,
CVPR22(4103-4112)
IEEE DOI
2210
Training, Visualization, Face recognition, Benchmark testing,
Forgery, Cognition, Robustness, Face and gestures, Biometrics
BibRef
Jia, S.[Shuai],
Ma, C.[Chao],
Yao, T.P.[Tai-Ping],
Yin, B.[Bangjie],
Ding, S.H.[Shou-Hong],
Yang, X.K.[Xiao-Kang],
Exploring Frequency Adversarial Attacks for Face Forgery Detection,
CVPR22(4093-4102)
IEEE DOI
2210
Visualization, Face recognition, Frequency-domain analysis,
Perturbation methods, Computational modeling, Detectors,
Face and gestures
BibRef
Fei, J.W.[Jian-Wei],
Dai, Y.S.[Yun-Shu],
Yu, P.P.[Pei-Peng],
Shen, T.R.[Tian-Run],
Xia, Z.H.[Zhi-Hua],
Weng, J.[Jian],
Learning Second Order Local Anomaly for General Face Forgery
Detection,
CVPR22(20238-20248)
IEEE DOI
2210
Representation learning, Adaptation models, Annotations,
Face recognition, Forgery, Filtering theory, Biometrics,
Representation learning
BibRef
Guetta, N.,
Shabtai, A.,
Singh, I.,
Momiyama, S.,
Elovici, Y.,
Dodging Attack Using Carefully Crafted Natural Makeup,
Ben-Gurion Universityof the Negev, 14 Sep 2021
WWW Link.
BibRef
2109
Mayer, J.[Jillian],
MakeUp Tutorial: How To Hide From Cameras,
YouTubeMay 30, 2013,
WWW Link.
BibRef
1305
Cauli, N.[Nino],
Ortis, A.[Alessandro],
Battiato, S.[Sebastiano],
Fooling a Face Recognition System with a Marker-Free Label-Consistent
Backdoor Attack,
CIAP22(II:176-185).
Springer DOI
2205
BibRef
Padnevych, R.[Ruslan],
Carmo, D.[David],
Semedo, D.[David],
Magalhães, J.[João],
Temporal Convolutional Networks for Robust Face Liveness Detection,
IbPRIA22(255-267).
Springer DOI
2205
BibRef
Rostami, M.[Mohammad],
Spinoulas, L.[Leonidas],
Hussein, M.[Mohamed],
Mathai, J.[Joe],
Abd-Almageed, W.[Wael],
Detection and Continual Learning of Novel Face Presentation Attacks,
ICCV21(14831-14840)
IEEE DOI
2203
Training, Deep learning, Pollution, Neural networks, Training data,
Benchmark testing,
Machine learning architectures and formulations
BibRef
Byun, J.[Junyoung],
Go, H.[Hyojun],
Kim, C.[Changick],
Geometrically Adaptive Dictionary Attack on Face Recognition,
WACV22(3809-3818)
IEEE DOI
2202
Limiting, Dictionaries,
Perturbation methods, Face recognition, Semantics, Search problems,
Adversarial Attack and Defense Methods Deep Learning
BibRef
Singh, I.[Inderjeet],
Araki, T.[Toshinori],
Kakizaki, K.[Kazuya],
Powerful Physical Adversarial Examples Against Practical Face
Recognition Systems,
BioAttack22(301-310)
IEEE DOI
2202
Face recognition, Conferences, Machine learning,
Performance gain, Complexity theory, Risk management
BibRef
Neto, P.C.[Pedro C.],
Sequeira, A.F.[Ana F.],
Cardoso, J.S.[Jaime S.],
Myope Models:
Are face presentation attack detection models short-sighted?,
Explain-Bio22(390-399)
IEEE DOI
2202
Training, Analytical models, Error analysis, Crops,
Predictive models, Visual systems, Inspection
BibRef
Fang, M.L.[Mei-Ling],
Damer, N.[Naser],
Kirchbuchner, F.[Florian],
Kuijper, A.[Arjan],
Learnable Multi-level Frequency Decomposition and Hierarchical
Attention Mechanism for Generalized Face Presentation Attack
Detection,
WACV22(1131-1140)
IEEE DOI
2202
Training, Fuses, Frequency-domain analysis, Face recognition,
Semantics, Neural networks, Streaming media,
Biometrics Biometrics -> Face Processing
BibRef
Aghdaie, P.[Poorya],
Chaudhary, B.[Baaria],
Soleymani, S.[Sobhan],
Dawson, J.[Jeremy],
Nasrabadi, N.M.[Nasser M.],
Morph Detection Enhanced by Structured Group Sparsity,
BioAttack22(311-320)
IEEE DOI
2202
Training, Visualization, Wavelet domain, Face recognition,
Neural networks, Detectors, Feature extraction
BibRef
Ghafourian, M.[Mahdi],
Fierrez, J.[Julian],
Vera-Rodriguez, R.[Ruben],
Serna, I.[Ignacio],
Morales, A.[Aythami],
OTB-morph: One-Time Biometrics via Morphing applied to Face Templates,
BioAttack22(321-329)
IEEE DOI
2202
Visualization, Face recognition, Conferences, Aging, Servers, Cryptography
BibRef
Ramachandra, R.[Raghavendra],
Raja, K.[Kiran],
Busch, C.[Christoph],
Algorithmic Fairness in Face Morphing Attack Detection,
Perform-Bio22(410-418)
IEEE DOI
2202
Measurement, Ethics, Protocols, Law, Face recognition, Conferences,
Training data
BibRef
Belli, D.[Davide],
Das, D.[Debasmit],
Major, B.[Bence],
Porikli, F.M.[Fatih M.],
A Personalized Benchmark for Face Anti-spoofing,
BioAttack22(338-348)
IEEE DOI
2202
Image recognition, Face recognition, Conferences,
Authentication, Benchmark testing, Data models
BibRef
Jeong, Y.[Yonghyun],
Kim, D.[Doyeon],
Lee, J.[Jaehyeon],
Hong, M.[Minki],
Hwang, S.[Solbi],
Choi, J.W.[Jong-Won],
mToFNet: Object Anti-Spoofing with Mobile Time-of-Flight Data,
WACV22(2997-3006)
IEEE DOI
2202
Training, Geometry, Ethics, Object detection, Media, Lead,
Security/Surveillance
BibRef
Wang, Y.C.[Yu-Chun],
Wang, C.Y.[Chien-Yi],
Lai, S.H.[Shang-Hong],
Disentangled Representation with Dual-stage Feature Learning for Face
Anti-spoofing,
WACV22(1234-1243)
IEEE DOI
2202
Training, Representation learning, Protocols,
Face recognition, Training data, Computer architecture,
Biometrics -> Face Processing Biometrics
BibRef
Fatemifar, S.[Soroush],
Awais, M.[Muhammad],
Akbari, A.[Ali],
Kittler, J.V.[Josef V.],
Particle Swarm and Pattern Search Optimisation of An Ensemble of Face
Anomaly Detectors,
ICIP21(3622-3626)
IEEE DOI
2201
Databases, Optimization methods, Detectors,
Learning (artificial intelligence), Feature extraction, Deep Learning
BibRef
Luo, Z.B.[Zheng-Bo],
Kamata, S.I.[Sei-Ichiro],
Sun, Z.T.[Zi-Tang],
Transformer and Node-Compressed DNN Based Dual-Path System for
Manipulated Face Detection,
ICIP21(3882-3886)
IEEE DOI
2201
Learning systems, Deep learning, Visualization, Image processing,
Pipelines, Neural networks, Ordinary differential equations,
face manipulation
BibRef
Kaichi, T.[Tomoya],
Ozasa, Y.[Yuko],
A Hyperspectral Approach for Unsupervised Spoof Detection With
Intra-Sample Distribution,
ICIP21(839-843)
IEEE DOI
2201
Training, Deep learning, Feature extraction, Hyperspectral imaging,
Unsupervised spoof detection, hyperspectral image,
single-pixel classification
BibRef
Hossain, M.S.[M. Sourave],
Rupty, L.[Labiba],
Roy, K.[Koushik],
Hasan, M.,
Sengupta, S.[Shirshajit],
Mohammed, N.[Nabeel],
A-DeepPixBis: Attentional Angular Margin for Face Anti-Spoofing,
DICTA20(1-8)
IEEE DOI
2201
Training, Protocols, Face recognition, Digital images,
Neural networks, Entropy, Task analysis
BibRef
Yao, C.L.[Cheng-Lin],
Wang, S.[Shihe],
Zhang, J.[Jialu],
He, W.T.[Wen-Tao],
Du, H.[Heshan],
Ren, J.F.[Jian-Feng],
Bai, R.[Ruibin],
Liu, J.[Jiang],
rPPG-Based Spoofing Detection for Face Mask Attack using Efficientnet
on Weighted Spatial-Temporal Representation,
ICIP21(3872-3876)
IEEE DOI
2201
Image processing, Resists, Photoplethysmography, Distortion,
Spatial databases, Noise measurement, Face spoofing detection,
spatial-temporal representation
BibRef
Damer, N.[Naser],
Raja, K.[Kiran],
Süßmilch, M.[Marius],
Venkatesh, S.[Sushma],
Boutros, F.[Fadi],
Fang, M.L.[Mei-Ling],
Kirchbuchner, F.[Florian],
Ramachandra, R.[Raghavendra],
Kuijper, A.[Arjan],
ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by
Attack Re-generation,
ISVC21(I:251-264).
Springer DOI
2112
BibRef
Damer, N.[Naser],
Spiller, N.[Noémie],
Fang, M.L.[Mei-Ling],
Boutros, F.[Fadi],
Kirchbuchner, F.[Florian],
Kuijper, A.[Arjan],
PW-MAD: Pixel-Wise Supervision for Generalized Face Morphing Attack
Detection,
ISVC21(I:291-304).
Springer DOI
2112
BibRef
Xu, X.[Xiang],
Xiong, Y.J.[Yuan-Jun],
Xia, W.[Wei],
On Improving Temporal Consistency for Online Face Liveness Detection
System,
ChaLearnFAS21(824-833)
IEEE DOI
2112
Training, Adaptation models, Uncertainty,
Face recognition, Computational modeling, Conferences
BibRef
Fang, H.[Hao],
Liu, A.[Ajian],
Wan, J.[Jun],
Escalera, S.[Sergio],
Escalante, H.J.[Hugo Jair],
Lei, Z.[Zhen],
Surveillance Face Presentation Attack Detection Challenge,
ChaLearnFAS23(6361-6371)
IEEE DOI
2309
BibRef
Liu, A.[Ajian],
Zhao, C.X.[Chen-Xu],
Yu, Z.T.[Zi-Tong],
Su, A.Y.[An-Yang],
Liu, X.[Xing],
Kong, Z.J.[Zi-Jian],
Wan, J.[Jun],
Escalera, S.[Sergio],
Escalante, H.J.[Hugo Jair],
Lei, Z.[Zhen],
Guo, G.D.[Guo-Dong],
3D High-Fidelity Mask Face Presentation Attack Detection Challenge,
ChaLearnFAS21(814-823)
IEEE DOI
2112
Measurement, Protocols, Face recognition, Companies
BibRef
Chen, S.[Shen],
Yao, T.P.[Tai-Ping],
Zhang, K.Y.[Ke-Yue],
Chen, Y.[Yang],
Sun, K.[Ke],
Ding, S.H.[Shou-Hong],
Li, J.L.[Ji-Lin],
Huang, F.Y.[Fei-Yue],
Ji, R.R.[Rong-Rong],
A Dual-stream Framework for 3D Mask Face Presentation Attack
Detection,
ChaLearnFAS21(834-841)
IEEE DOI
2112
Degradation,
Smoothing methods, Convolution, Face recognition, Conferences
BibRef
Huang, S.[Samuel],
Cheng, W.H.[Wen-Huang],
Cheng, R.[Robert],
Single Patch Based 3D High-Fidelity Mask Face Anti-Spoofing,
ChaLearnFAS21(842-845)
IEEE DOI
2112
Solid modeling,
Protocols, Error analysis, Face recognition, Conferences
BibRef
Grinchuk, O.[Oleg],
Parkin, A.[Aleksandr],
Glazistova, E.[Evgenija],
3D mask presentation attack detection via high resolution face parts,
ChaLearnFAS21(846-853)
IEEE DOI
2112
Training, Deep learning,
Data mining, Faces
BibRef
Wang, Z.M.[Zhu-Ming],
Xu, Y.W.[Yao-Wen],
Wu, L.F.[Li-Fang],
Han, H.[Hu],
Ma, Y.K.[Yu-Kun],
Ma, G.Z.[Guo-Zhang],
Multi-Perspective Features Learning for Face Anti-Spoofing,
HTCV21(4099-4105)
IEEE DOI
2112
Training, Protocols, Face recognition,
Design methodology, Neural networks
BibRef
Gao, G.[Gege],
Huang, H.B.[Huai-Bo],
Fu, C.Y.[Chao-You],
Li, Z.Y.[Zhao-Yang],
He, R.[Ran],
Information Bottleneck Disentanglement for Identity Swapping,
CVPR21(3403-3412)
IEEE DOI
2111
Face recognition, Buildings, Detectors,
Benchmark testing, Feature extraction, Forgery
BibRef
Luo, Y.C.[Yu-Chen],
Zhang, Y.[Yong],
Yan, J.C.[Jun-Chi],
Liu, W.[Wei],
Generalizing Face Forgery Detection with High-frequency Features,
CVPR21(16312-16321)
IEEE DOI
2111
Training, Correlation, Image color analysis, Databases,
Face recognition, Detectors, Feature extraction
BibRef
George, A.[Anjith],
Marcel, S.[Sébastien],
Cross Modal Focal Loss for RGBD Face Anti-Spoofing,
CVPR21(7878-7887)
IEEE DOI
2111
Face recognition, Computational modeling,
Computer architecture, Robustness
BibRef
Li, J.M.[Jia-Ming],
Xie, H.T.[Hong-Tao],
Li, J.H.[Jia-Hong],
Wang, Z.Y.[Zhong-Yuan],
Zhang, Y.D.[Yong-Dong],
Frequency-aware Discriminative Feature Learning Supervised by
Single-Center Loss for Face Forgery Detection,
CVPR21(6454-6463)
IEEE DOI
2111
Measurement, Face recognition,
Frequency-domain analysis, Filter banks, Boosting, Forgery
BibRef
Zhou, T.F.[Tian-Fei],
Wang, W.G.[Wen-Guan],
Liang, Z.Y.[Zhi-Yuan],
Shen, J.B.[Jian-Bing],
Face Forensics in the Wild,
CVPR21(5774-5784)
IEEE DOI
2111
Location awareness, Costs, Face recognition, Forensics,
Benchmark testing, Forgery, Classification algorithms
BibRef
He, Y.N.[Yi-Nan],
Gan, B.[Bei],
Chen, S.[Siyu],
Zhou, Y.C.[Yi-Chun],
Yin, G.J.[Guo-Jun],
Song, L.C.[Lu-Chuan],
Sheng, L.[Lu],
Shao, J.[Jing],
Liu, Z.[Ziwei],
ForgeryNet: A Versatile Benchmark for Comprehensive Forgery Analysis,
CVPR21(4358-4367)
IEEE DOI
2111
Location awareness, Image segmentation, Technological innovation,
Annotations, Face recognition, Perturbation methods, Benchmark testing
BibRef
Liu, H.G.[Hong-Gu],
Li, X.D.[Xiao-Dan],
Zhou, W.[Wenbo],
Chen, Y.F.[Yue-Feng],
He, Y.[Yuan],
Xue, H.[Hui],
Zhang, W.M.[Wei-Ming],
Yu, N.H.[Neng-Hai],
Spatial-Phase Shallow Learning:
Rethinking Face Forgery Detection in Frequency Domain,
CVPR21(772-781)
IEEE DOI
2111
Face recognition, Frequency-domain analysis,
Semantics, Forgery, Robustness, Security
BibRef
Wang, C.R.[Cheng-Rui],
Deng, W.H.[Wei-Hong],
Representative Forgery Mining for Fake Face Detection,
CVPR21(14918-14927)
IEEE DOI
2111
Codes, Face recognition, Refining, Training data, Data visualization,
Detectors, Forgery
BibRef
Wenger, E.[Emily],
Passananti, J.[Josephine],
Bhagoji, A.N.[Arjun Nitin],
Yao, Y.[Yuanshun],
Zheng, H.T.[Hai-Tao],
Zhao, B.Y.[Ben Y.],
Backdoor Attacks Against Deep Learning Systems in the Physical World,
CVPR21(6202-6211)
IEEE DOI
2111
Deep learning, Face recognition, Robustness,
Task analysis, Facial features
BibRef
Chaudhary, B.[Baaria],
Aghdaie, P.[Poorya],
Soleymani, S.[Sobhan],
Dawson, J.[Jeremy],
Nasrabadi, N.M.[Nasser M.],
Differential Morph Face Detection using Discriminative Wavelet
Sub-bands,
Biometrics21(1425-1434)
IEEE DOI
2109
Training, Wavelet domain, Protocols, Face recognition,
Frequency-domain analysis, Neural networks, Entropy
BibRef
Sabel, J.[Johan],
Johansson, F.[Fredrik],
On the Robustness and Generalizability of Face Synthesis Detection
Methods,
WMF21(962-971)
IEEE DOI
2109
Training, Learning systems, Perturbation methods,
Face recognition, Robustness
BibRef
Schwarcz, S.[Steven],
Chellappa, R.[Rama],
Finding Facial Forgery Artifacts with Parts-Based Detectors,
WMF21(933-942)
IEEE DOI
2109
Deep learning, Social networking (online),
Face recognition, Neural networks, Detectors
BibRef
Mallat, K.[Khawla],
Dugelay, J.L.[Jean-Luc],
Indirect synthetic attack on thermal face biometric systems via
visible-to-thermal spectrum conversion,
Biometrics21(1435-1443)
IEEE DOI
2109
Error analysis, Social networking (online),
Face recognition, Communication channels, Thermal sensors
BibRef
Soleymani, S.[Sobhan],
Dabouei, A.[Ali],
Taherkhani, F.[Fariborz],
Dawson, J.[Jeremy],
Nasrabadi, N.M.[Nasser M.],
Mutual Information Maximization on Disentangled Representations for
Differential Morph Detection,
WACV21(1730-1740)
IEEE DOI
2106
Faces, Mutual information
BibRef
Liu, Z.[Zhao],
Feng, Z.[Zunlei],
Zou, Z.[Zeyu],
Zhang, R.[Rong],
Song, M.L.[Ming-Li],
Shen, J.P.[Jian-Ping],
Disentangled Representation based Face Anti-Spoofing,
ICPR21(2017-2024)
IEEE DOI
2105
Face recognition, Task analysis, Image reconstruction
BibRef
Sanghvi, N.[Nilay],
Singh, S.K.[Sushant Kumar],
Agarwal, A.[Akshay],
Vatsa, M.[Mayank],
Singh, R.[Richa],
MixNet for Generalized Face Presentation Attack Detection,
ICPR21(5511-5518)
IEEE DOI
2105
Databases, Face recognition, Distance measurement, Reliability,
Convolutional neural networks, Detection algorithms
BibRef
Komkov, S.[Stepan],
Petiushko, A.[Aleksandr],
AdvHat: Real-World Adversarial Attack on ArcFace Face ID System,
ICPR21(819-826)
IEEE DOI
2105
Image color analysis, Face recognition, Printers
BibRef
Shi, L.[Lei],
Zhou, Z.[Zhuo],
Guo, Z.H.[Zhen-Hua],
Face Anti-Spoofing Using Spatial Pyramid Pooling,
ICPR21(2126-2133)
IEEE DOI
2105
Fuses, Databases, Face recognition,
Complex networks, Face Anti-Spoofing, Presentation Attack,
Multi-scale Information
BibRef
Ji, Q.B.[Qiao-Bin],
Xu, S.G.[Shu-Gong],
Chen, X.D.[Xu-Dong],
Zhang, S.Q.[Shun-Qing],
Cao, S.[Shan],
A Cross Domain Multi-modal Dataset for Robust Face Anti-spoofing,
ICPR21(4309-4316)
IEEE DOI
2105
Training, Protocols, Face recognition, Data visualization, Cameras,
Robustness, Hardware
BibRef
Zhou, J.W.[Jun-Wei],
Shu, K.[Ke],
Liu, P.[Peng],
Xiang, J.W.[Jian-Wen],
Xiong, S.W.[Sheng-Wu],
Face Anti-Spoofing Based on Dynamic Color Texture Analysis Using
Local Directional Number Pattern,
ICPR21(4221-4228)
IEEE DOI
2105
Support vector machines, Databases, Image color analysis,
Face recognition, Lighting, Probabilistic logic, Feature extraction
BibRef
Dou, Y.Q.[Yong-Qiang],
Yang, H.C.[Hao-Cheng],
Yang, M.L.[Mao-Lin],
Xu, Y.Y.[Yan-Yan],
Ke, D.F.[Deng-Feng],
Dynamically Mitigating Data Discrepancy with Balanced Focal Loss for
Replay Attack Detection,
ICPR21(4115-4122)
IEEE DOI
2105
Training, Learning systems, Deep learning, Bridges,
Time-frequency analysis, Neural networks, Detectors, Anti-spoofing,
Modified GD-gram
BibRef
Han, J.[Jian],
Gevers, T.[Theo],
MMD Based Discriminative Learning for Face Forgery Detection,
ACCV20(V:121-136).
Springer DOI
2103
BibRef
Zhang, Y.G.[Yu-Ge],
Zhao, M.[Min],
Yan, L.B.[Long-Bin],
Gao, T.D.[Tian-De],
Chen, J.[Jie],
CNN-Based Anomaly Detection for Face Presentation Attack Detection
with Multi-Channel Images,
VCIP20(189-192)
IEEE DOI
2102
Face recognition, Feature extraction, Faces, Anomaly detection,
Training, Task analysis, Neural networks,
multi-channel CNN
BibRef
Chen, S.,
Li, W.,
Yang, H.,
Huang, D.,
Wang, Y.,
3D Face Mask Anti-spoofing via Deep Fusion of Dynamic Texture and
Shape Clues,
FG20(314-321)
IEEE DOI
2102
Faces, Videos, Feature extraction, Shape,
Face recognition,
deep fusion
BibRef
Kotwal, K.,
Marcel, S.,
CNN Patch Pooling for Detecting 3D Mask Presentation Attacks in NIR,
ICIP20(1336-1340)
IEEE DOI
2011
Biometrics, Face Presentation Attack Detection, 3D Mask Attacks,
Patch Pooling Layer
BibRef
Tarasiou, M.,
Zafeiriou, S.P.,
Extracting Deep Local Features to Detect Manipulated Images of Human
Faces,
ICIP20(1821-1825)
IEEE DOI
2011
Faces, Feature extraction, Training, Forgery, Task analysis,
Videos, Image segmentation
BibRef
Huang, R.,
Fang, F.,
Nguyen, H.H.,
Yamagishi, J.,
Echizen, I.,
Security of Facial Forensics Models Against Adversarial Attacks,
ICIP20(2236-2240)
IEEE DOI
2011
Perturbation methods, Image segmentation, Neurons,
Linear programming, Security, Forensics, Forgery, forgery forensics,
over-firing
BibRef
Weitzner, D.,
Mendlovic, D.,
Giryes, R.,
Face Authentication From Grayscale Coded Light Field,
ICIP20(2611-2615)
IEEE DOI
2011
Anti-spoofing, biometrics, coded light field, depth sensing, facial recognition
BibRef
Fatemifar, S.,
Awais, M.,
Akbari, A.,
Kittler, J.V.[Josef V.],
A Stacking Ensemble for Anomaly Based Client-Specific Face Spoofing
Detection,
ICIP20(1371-1375)
IEEE DOI
2011
Spoofing Detection, Anomaly detection, Ensemble Pruning, CNNs,
Fusion of Anomaly Classifiers
BibRef
Zhang, K.Y.[Ke-Yue],
Yao, T.P.[Tai-Ping],
Zhang, J.[Jian],
Tai, Y.[Ying],
Ding, S.H.[Shou-Hong],
Li, J.L.[Ji-Lin],
Huang, F.Y.[Fei-Yue],
Song, H.C.[Hai-Chuan],
Ma, L.Z.[Li-Zhuang],
Face Anti-spoofing via Disentangled Representation Learning,
ECCV20(XIX:641-657).
Springer DOI
2011
BibRef
Li, L.,
Bao, J.,
Yang, H.,
Chen, D.,
Wen, F.,
Advancing High Fidelity Identity Swapping for Forgery Detection,
CVPR20(5073-5082)
IEEE DOI
2008
Face, Lighting, Image resolution, Adaptive systems, Shape, Generators, Training
BibRef
Wang, S.,
Wang, O.,
Zhang, R.,
Owens, A.,
Efros, A.A.,
CNN-Generated Images Are Surprisingly Easy to Spot… for Now,
CVPR20(8692-8701)
IEEE DOI
2008
Training, Image generation, Face, Image resolution,
Detectors, Generators
BibRef
Hulzebosch, N.,
Ibrahimi, S.,
Worring, M.,
Detecting CNN-Generated Facial Images in Real-World Scenarios,
WMF20(2729-2738)
IEEE DOI
2008
Training, Image color analysis, Data models,
Visualization, Forgery, Image resolution
BibRef
Jiang, L.,
Li, R.,
Wu, W.,
Qian, C.,
Loy, C.C.,
DeeperForensics-1.0: A Large-Scale Dataset for Real-World Face
Forgery Detection,
CVPR20(2886-2895)
IEEE DOI
2008
Videos, Face, Forgery, Benchmark testing, Perturbation methods,
Data collection, Lighting
BibRef
Liu, Z.,
Qi, X.,
Torr, P.H.S.,
Global Texture Enhancement for Fake Face Detection in the Wild,
CVPR20(8057-8066)
IEEE DOI
2008
Face, Skin, Face detection, Robustness,
Image color analysis, Training
BibRef
Wang, Z.D.[Zhen-Dong],
Bao, J.M.[Jian-Min],
Zhou, W.G.[Wen-Gang],
Wang, W.L.[Wei-Lun],
Li, H.Q.[Hou-Qiang],
AltFreezing for More General Video Face Forgery Detection,
CVPR23(4129-4138)
IEEE DOI
2309
BibRef
Zheng, Y.L.[Ying-Lin],
Bao, J.M.[Jian-Min],
Chen, D.[Dong],
Zeng, M.[Ming],
Wen, F.[Fang],
Exploring Temporal Coherence for More General Video Face Forgery
Detection,
ICCV21(15024-15034)
IEEE DOI
2203
Convolution, Coherence, Transformers, Feature extraction, Forgery,
Robustness, Kernel,
Video analysis and understanding
BibRef
Li, L.Z.[Ling-Zhi],
Bao, J.M.[Jian-Min],
Zhang, T.[Ting],
Yang, H.[Hao],
Chen, D.[Dong],
Wen, F.[Fang],
Guo, B.N.[Bai-Ning],
Face X-Ray for More General Face Forgery Detection,
CVPR20(5000-5009)
IEEE DOI
2008
Face, Forgery, X-ray imaging, Image color analysis, Detectors,
Forensics, Focusing
BibRef
Wang, G.,
Han, H.,
Shan, S.,
Chen, X.,
Cross-Domain Face Presentation Attack Detection via Multi-Domain
Disentangled Representation Learning,
CVPR20(6677-6686)
IEEE DOI
2008
Face, Robustness, Testing, Task analysis, Training, Machine learning
BibRef
Nguyen, D.,
Arora, S.S.,
Wu, Y.,
Yang, H.,
Adversarial Light Projection Attacks on Face Recognition Systems:
A Feasibility Study,
Biometrics20(3548-3556)
IEEE DOI
2008
Face recognition, Cameras, Face, Calibration,
Real-time systems, Target recognition
BibRef
Dang, H.,
Liu, F.,
Stehouwer, J.,
Liu, X.,
Jain, A.K.,
On the Detection of Digital Face Manipulation,
CVPR20(5780-5789)
IEEE DOI
2008
Face, Forgery, Videos, Machine learning, Cameras
BibRef
Saha, S.,
Xu, W.,
Kanakis, M.,
Georgoulis, S.,
Chen, Y.,
Paudel, D.P.[Danda Pani],
Van Gool, L.J.[Luc J.],
Domain Agnostic Feature Learning for Image and Video Based Face
Anti-spoofing,
Biometrics20(3490-3499)
IEEE DOI
2008
Face, Lighting, Authentication, Feature extraction,
Cameras, Visualization
BibRef
Yang, Q.,
Zhu, X.,
Fwu, J.,
Ye, Y.,
You, G.,
Zhu, Y.,
PipeNet: Selective Modal Pipeline of Fusion Network for Multi-Modal
Face Anti-Spoofing,
WMF20(2739-2747)
IEEE DOI
2008
Face, Pipelines, Task analysis,
Protocols, Switched mode power supplies, Streaming media
BibRef
Jia, Y.,
Zhang, J.,
Shan, S.,
Chen, X.,
Single-Side Domain Generalization for Face Anti-Spoofing,
CVPR20(8481-8490)
IEEE DOI
2008
Face, Feature extraction, Generators, Training, Aggregates, Databases, Face recognition
BibRef
Stehouwer, J.,
Jourabloo, A.,
Liu, Y.,
Liu, X.,
Noise Modeling, Synthesis and Classification for Generic Object
Anti-Spoofing,
CVPR20(7292-7301)
IEEE DOI
2008
Sensors, Image sensors, Generators, Prototypes, Face, Task analysis, Training
BibRef
Wang, Z.,
Yu, Z.,
Zhao, C.,
Zhu, X.,
Qin, Y.,
Zhou, Q.,
Zhou, F.,
Lei, Z.,
Deep Spatial Gradient and Temporal Depth Learning for Face
Anti-Spoofing,
CVPR20(5041-5050)
IEEE DOI
2008
Face, Feature extraction, Task analysis, Face recognition,
Logic gates, Estimation
BibRef
Yu, Z.T.[Zi-Tong],
Zhao, C.X.[Chen-Xu],
Wang, Z.Z.[Ze-Zheng],
Qin, Y.X.[Yun-Xiao],
Su, Z.[Zhuo],
Li, X.B.[Xiao-Bai],
Zhou, F.[Feng],
Zhao, G.Y.[Guo-Ying],
Searching Central Difference Convolutional Networks for Face
Anti-Spoofing,
CVPR20(5294-5304)
IEEE DOI
2008
Convolutional codes, Face, Task analysis, Feature extraction,
Convolution, Robustness, Videos
BibRef
Yu, Z.T.[Zi-Tong],
Qin, Y.X.[Yun-Xiao],
Li, X.B.[Xiao-Bai],
Wang, Z.Z.[Ze-Zheng],
Zhao, C.X.[Chen-Xu],
Lei, Z.[Zhen],
Zhao, G.Y.[Guo-Ying],
Multi-Modal Face Anti-Spoofing Based on Central Difference Networks,
WMF20(2766-2774)
IEEE DOI
2008
Face, Convolution, Protocols, Feature extraction, Robustness,
Task analysis, Videos
BibRef
Zhang, S.F.[Shi-Feng],
Wang, X.B.[Xiao-Bo],
Liu, A.[Ajian],
Zhao, C.X.[Chen-Xu],
Wan, J.[Jun],
Escalera, S.[Sergio],
Shi, H.L.[Hai-Lin],
Wang, Z.[Zezheng],
Li, S.Z.[Stan Z.],
A Dataset and Benchmark for Large-Scale Multi-Modal Face Anti-Spoofing,
CVPR19(919-928).
IEEE DOI
2002
BibRef
Liu, S.,
Lan, X.,
Yuen, P.C.,
Temporal Similarity Analysis of Remote Photoplethysmography for Fast
3D Mask Face Presentation Attack Detection,
WACV20(2597-2605)
IEEE DOI
2006
Face, Heart beat, Cameras, Lighting, Skin, Time-domain analysis
BibRef
Venkatesh, S.,
Ramachandra, R.,
Raja, K.,
Spreeuwers, L.J.,
Veldhuis, R.N.J.,
Busch, C.,
Detecting Morphed Face Attacks Using Residual Noise from Deep
Multi-scale Context Aggregation Network,
WACV20(269-278)
IEEE DOI
2006
Face, Noise reduction, Feature extraction, Machine learning,
Image fusion, Wavelet transforms, Reliability
BibRef
Joshi, A.,
Mukherjee, A.,
Sarkar, S.,
Hegde, C.,
Semantic Adversarial Attacks:
Parametric Transformations That Fool Deep Classifiers,
ICCV19(4772-4782)
IEEE DOI
2004
face recognition, image classification,
learning (artificial intelligence), neural nets,
Neural networks
BibRef
Rössler, A.,
Cozzolino, D.,
Verdoliva, L.,
Riess, C.,
Thies, J.,
Niessner, M.,
FaceForensics++: Learning to Detect Manipulated Facial Images,
ICCV19(1-11)
IEEE DOI
2004
data compression, face recognition, feature extraction,
image coding, image enhancement, image forensics,
Databases
BibRef
Yu, N.,
Davis, L.,
Fritz, M.,
Attributing Fake Images to GANs:
Learning and Analyzing GAN Fingerprints,
ICCV19(7555-7565)
IEEE DOI
2004
image classification, neural nets, security of data, fake images,
generative adversarial networks, photorealistic images,
Intellectual property
BibRef
Deng, J.K.[Jian-Kang],
Guo, J.[Jia],
Liu, T.L.[Tong-Liang],
Gong, M.M.[Ming-Ming],
Zafeiriou, S.P.[Stefanos P.],
Sub-center Arcface: Boosting Face Recognition by Large-scale Noisy Web
Faces,
ECCV20(XI:741-757).
Springer DOI
2011
BibRef
Deng, J.K.[Jian-Kang],
Zafeiriou, S.P.[Stefanos P.],
ArcFace for Disguised Face Recognition,
DFW19(485-493)
IEEE DOI
2004
face recognition, feature extraction, visual databases,
intra-class compactness, inter-class discrepancy,
Disguised Face Recognition
BibRef
Kim, T.,
Kim, Y.,
Kim, I.,
Kim, D.,
BASN: Enriching Feature Representation Using Bipartite Auxiliary
Supervisions for Face Anti-Spoofing,
DFW19(494-503)
IEEE DOI
2004
face recognition, feature extraction, image representation,
learning (artificial intelligence), security of data,
Deep Convolutional Neural Networks
BibRef
Chen, W.[Weilun],
Zhang, Z.X.[Zhao-Xiang],
Hu, X.L.[Xiao-Lin],
Wu, B.Y.[Bao-Yuan],
Boosting Decision-based Black-box Adversarial Attacks with Random Sign
Flip,
ECCV20(XV:276-293).
Springer DOI
2011
BibRef
Wang, X.S.[Xiao-Sen],
Zhang, Z.L.[Ze-Liang],
Tong, K.H.[Kang-Heng],
Gong, D.H.[Di-Hong],
He, K.[Kun],
Li, Z.F.[Zhi-Feng],
Liu, W.[Wei],
Triangle Attack: A Query-Efficient Decision-Based Adversarial Attack,
ECCV22(V:156-174).
Springer DOI
2211
BibRef
Dong, Y.P.[Yin-Peng],
Su, H.[Hang],
Wu, B.Y.[Bao-Yuan],
Li, Z.F.[Zhi-Feng],
Liu, W.[Wei],
Zhang, T.[Tong],
Zhu, J.[Jun],
Efficient Decision-Based Black-Box Adversarial Attacks on Face
Recognition,
CVPR19(7706-7714).
IEEE DOI
2002
BibRef
Shao, R.[Rui],
Lan, X.Y.[Xiang-Yuan],
Li, J.W.[Jia-Wei],
Yuen, P.C.[Pong C.],
Multi-Adversarial Discriminative Deep Domain Generalization for Face
Presentation Attack Detection,
CVPR19(10015-10023).
IEEE DOI
2002
BibRef
Yang, X.[Xiao],
Luo, W.H.[Wen-Han],
Bao, L.C.[Lin-Chao],
Gao, Y.[Yuan],
Gong, D.H.[Di-Hong],
Zheng, S.B.[Shi-Bao],
Li, Z.F.[Zhi-Feng],
Liu, W.[Wei],
Face Anti-Spoofing: Model Matters, so Does Data,
CVPR19(3502-3511).
IEEE DOI
2002
BibRef
Liu, Y.[Yaojie],
Stehouwer, J.[Joel],
Jourabloo, A.[Amin],
Liu, X.M.[Xiao-Ming],
Deep Tree Learning for Zero-Shot Face Anti-Spoofing,
CVPR19(4675-4684).
IEEE DOI
2002
BibRef
Miyata, M.[Mari],
Aizawa, K.[Kiyoharu],
Estimation of Impression Associated With Portraits Using Facial
Landmarks and Visual Features,
ICIP20(1421-1425)
IEEE DOI
2011
BibRef
Earlier:
Impression Estimation for Deformed Portraits With a Landmark-Based
Ranking Network,
ICIP19(1950-1954)
IEEE DOI
1910
Not really spoofing, but manipulation.
How to manipulate a portrait for posting.
Impression estimation, Portrait manipulation, Relative attribute,
Face, Impression word.
Portrait, impression, deformation, learning to rank, relative attribute
BibRef
Jia, S.[Shan],
Hu, C.B.[Chuan-Bo],
Guo, G.D.[Guo-Dong],
Xu, Z.Q.[Zheng-Quan],
A Database for Face Presentation Attack Using Wax Figure Faces,
NTIAP19(39-47).
Springer DOI
1909
BibRef
Debiasi, L.[Luca],
Damer, N.[Naser],
Saladié, A.M.[Alexandra Moseguí],
Rathgeb, C.[Christian],
Scherhag, U.[Ulrich],
Busch, C.[Christoph],
Kirchbuchner, F.[Florian],
Uhl, A.[Andreas],
On the Detection of GAN-Based Face Morphs Using Established Morph
Detectors,
CIAP19(II:345-356).
Springer DOI
1909
BibRef
Natsume, R.[Ryota],
Inoue, K.[Kazuki],
Fukuhara, Y.[Yoshihiro],
Yamamoto, S.[Shintaro],
Morishima, S.[Shigeo],
Kataoka, H.[Hirokatsu],
Understanding Fake Faces,
BrainDriven18(III:566-576).
Springer DOI
1905
BibRef
Damer, N.[Naser],
Boller, V.[Viola],
Wainakh, Y.[Yaza],
Boutros, F.[Fadi],
Terhörst, P.[Philipp],
Braun, A.[Andreas],
Kuijper, A.[Arjan],
Detecting Face Morphing Attacks by Analyzing the Directed Distances of
Facial Landmarks Shifts,
GCPR18(518-534).
Springer DOI
1905
BibRef
Dabouei, A.,
Taherkhani, F.,
Soleymani, S.,
Dawson, J.,
Nasrabadi, N.M.,
Boosting Deep Face Recognition via Disentangling Appearance and
Geometry,
WACV20(309-318)
IEEE DOI
2006
Face, Geometry, Face recognition, Training, Task analysis, Manifolds,
Loss measurement
BibRef
Dabouei, A.[Ali],
Soleymani, S.[Sobhan],
Dawson, J.[Jeremy],
Nasrabadi, N.M.[Nasser M.],
Fast Geometrically-Perturbed Adversarial Faces,
WACV19(1979-1988)
IEEE DOI
1904
face recognition, learning (artificial intelligence),
security of data,
Transforms
BibRef
Liu, J.,
Kumar, A.,
Detecting Presentation Attacks from 3D Face Masks Under Multispectral
Imaging,
DFW18(47-475)
IEEE DOI
1812
Face, Convolution,
Biometrics (access control), Lighting, Databases, Multispectral imaging
BibRef
Sharif, M.,
Baue, L.,
Reite, M.K.,
On the Suitability of Lp-Norms for Creating and Preventing
Adversarial Examples,
PRIV18(1686-16868)
IEEE DOI
1812
Machine learning, Measurement, Training, Cancer,
Object recognition, Face recognition
BibRef
Zhang, K.,
Chang, Y.,
Hsu, W.,
Deep Disguised Faces Recognition,
DFW18(32-324)
IEEE DOI
1812
Face recognition, Training, Testing, Feature extraction,
Principal component analysis, Training data, Pipelines
BibRef
Kohli, N.,
Yadav, D.,
Noore, A.,
Face Verification with Disguise Variations via Deep Disguise
Recognizer,
DFW18(17-177)
IEEE DOI
1812
Face, Databases, Face recognition, Training, Convolution, Image recognition
BibRef
Gupta, I.,
Bhalla, I.,
Singh, R.,
Vatsa, M.,
Scattering Transform for Matching Surgically Altered Face Images,
ICPR18(2215-2220)
IEEE DOI
1812
Surgery, Face, Scattering, Feature extraction,
Face recognition, Wavelet transforms
BibRef
Ming, Z.,
Chazalon, J.,
Muzzamil Luqman, M.,
Visani, M.,
Burie, J.,
FaceLiveNet: End-to-End Networks Combining Face Verification with
Interactive Facial Expression-Based Liveness Detection,
ICPR18(3507-3512)
IEEE DOI
1812
Face, Face recognition, Training, Task analysis, Authentication,
Protocols, Image recognition
BibRef
Sun, X.,
Huang, L.,
Liu, C.,
Multimodal Face Spoofing Detection via RGB-D Images,
ICPR18(2221-2226)
IEEE DOI
1812
Face, Image color analysis, Correlation,
Color, Skin, Entropy
BibRef
Luo, S.,
Kan, M.,
Wu, S.Z.[Shu-Zhe],
Chen, X.L.[Xi-Lin],
Shan, S.G.[Shi-Guang],
Face Anti-Spoofing with Multi-Scale Information,
ICPR18(3402-3407)
IEEE DOI
1812
Face, Feature extraction, Agriculture, Training,
Convolutional neural networks, Printing
BibRef
Guo, X.[Xiao],
Liu, Y.J.[Yao-Jie],
Jain, A.[Anil],
Liu, X.M.[Xiao-Ming],
Multi-domain Learning for Updating Face Anti-spoofing Models,
ECCV22(XIII:230-249).
Springer DOI
2211
BibRef
Liu, Y.J.[Yao-Jie],
Jourabloo, A.[Amin],
Liu, X.M.[Xiao-Ming],
Learning Deep Models for Face Anti-Spoofing:
Binary or Auxiliary Supervision,
CVPR18(389-398)
IEEE DOI
1812
Face, Databases, Face recognition,
Lighting, Shape,
BibRef
Jourabloo, A.[Amin],
Liu, Y.[Yaojie],
Liu, X.M.[Xiao-Ming],
Face De-spoofing: Anti-spoofing via Noise Modeling,
ECCV18(XIII: 297-315).
Springer DOI
1810
BibRef
Liu, S.Q.[Si-Qi],
Lan, X.Y.[Xiang-Yuan],
Yuen, P.C.[Pong C.],
Remote Photoplethysmography Correspondence Feature for 3D Mask Face
Presentation Attack Detection,
ECCV18(XVI: 577-594).
Springer DOI
1810
BibRef
Lavrentyeva, G.[Galina],
Kudashev, O.[Oleg],
Melnikov, A.[Aleksandr],
de Marsico, M.[Maria],
Matveev, Y.[Yuri],
Interactive Photo Liveness for Presentation Attacks Detection,
ICIAR18(252-258).
Springer DOI
1807
BibRef
Paiz-Reyes, E.[Evelyn],
Nunes-de-Lima, N.[Nadile],
Ablanedo, J.[Jennie],
Fairchild, E.[Elaine],
Griffith, T.[Tami],
Rodeheffer, C.[Christopher],
Is This Person Real? Avatar Stylization and Its Influence on Human
Perception in a Counseling Training Environment,
VAMR18(I: 279-289).
Springer DOI
1807
BibRef
Damer, N.[Naser],
Dimitrov, K.[Kristiyan],
Practical View on Face Presentation Attack Detection,
BMVC16(xx-yy).
HTML Version.
1805
BibRef
Song, X.,
Zhao, X.,
Lin, T.,
Face spoofing detection by fusing binocular depth and spatial pyramid
coding micro-texture features,
ICIP17(96-100)
IEEE DOI
1803
Cameras, Encoding, Face, Feature extraction, Lighting, Robustness,
Support vector machines, Face spoofing detection,
template face registration
BibRef
Souza, G.B.[Gustavo B.],
Santos, D.F.S.[Daniel F. S.],
Pires, R.G.[Rafael G.],
Marana, A.N.[Aparecido N.],
Papa, J.P.[João P.],
Efficient Transfer Learning for Robust Face Spoofing Detection,
CIARP17(643-651).
Springer DOI
1802
BibRef
Ali, A.[Asad],
Alsufyani, N.[Nawal],
Hoque, S.[Sanaul],
Deravi, F.[Farzin],
Biometric Counter-Spoofing for Mobile Devices Using Gaze Information,
PReMI17(11-18).
Springer DOI
1711
BibRef
Agarwal, A.,
Yadav, D.,
Kohli, N.,
Singh, R.,
Vatsa, M.,
Noore, A.,
Face Presentation Attack with Latex Masks in Multispectral Videos,
PBVS17(275-283)
IEEE DOI
1709
Databases, Face, Face recognition, Probes, Videos
BibRef
Zhou, P.[Peng],
Han, X.T.[Xin-Tong],
Morariu, V.I.[Vlad I.],
Davis, L.S.[Larry S.],
Two-Stream Neural Networks for Tampered Face Detection,
MedForen17(1831-1839)
IEEE DOI
1709
Cameras, Face, Feature extraction, Lighting, Streaming media,
Support vector machines, Transform coding
BibRef
Raghavendra, R.,
Raja, K.B.,
Venkatesh, S.,
Busch, C.,
Transferable Deep-CNN Features for Detecting Digital and
Print-Scanned Morphed Face Images,
MedForen17(1822-1830)
IEEE DOI
1709
Convolution, Databases, Face, Face detection, Face recognition,
Feature, extraction
BibRef
Peng, B.,
Wang, W.,
Dong, J.,
Tan, T.,
Position Determines Perspective:
Investigating Perspective Distortion for Image Forensics of Faces,
MedForen17(1813-1821)
IEEE DOI
1709
Cameras, Distortion, Estimation, Forensics, Solid modeling,
BibRef
Seibold, C.[Clemens],
Samek, W.[Wojciech],
Hilsmann, A.[Anna],
Eisert, P.[Peter],
Detection of Face Morphing Attacks by Deep Learning,
IWDW17(107-120).
Springer DOI
1708
BibRef
Wandzik, L.[Lukasz],
Garcia, R.V.[Raul Vicente],
Kaeding, G.[Gerald],
Chen, X.[Xi],
CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based
Face Recognition to Image Morphing,
IWDW17(121-135).
Springer DOI
1708
BibRef
Neubert, T.[Tom],
Face Morphing Detection: An Approach Based on Image Degradation
Analysis,
IWDW17(93-106).
Springer DOI
1708
BibRef
Asim, M.[Muhammad],
Ming, Z.[Zhu],
Javed, M.Y.,
CNN based spatio-temporal feature extraction for face anti-spoofing,
ICIVC17(234-238)
IEEE DOI
1708
Error analysis, Face, Feature extraction, Histograms,
Video sequences, Videos, CASIA, LBP-TOP,
REPLAY-ATTACK, anti-spoofing, convolutional neural network (CNN), spatio-temporal
BibRef
Nowara, E.M.,
Sabharwal, A.,
Veeraraghavan, A.,
PPGSecure: Biometric Presentation Attack Detection Using
Photopletysmograms,
FG17(56-62)
IEEE DOI
1707
Authentication, Blood, Color, Face, Feature extraction, Physiology, Skin
BibRef
Tang, Y.,
Chen, L.,
3D Facial Geometric Attributes Based Anti-Spoofing Approach against
Mask Attacks,
FG17(589-595)
IEEE DOI
1707
Databases, Estimation, Face, Face recognition, Facial features, Shape,
Three-dimensional, displays
BibRef
Lucena, O.[Oeslle],
Junior, A.[Amadeu],
Moia, V.[Vitor],
Souza, R.[Roberto],
Valle, E.[Eduardo],
Lotufo, R.[Roberto],
Transfer Learning Using Convolutional Neural Networks for Face
Anti-spoofing,
ICIAR17(27-34).
Springer DOI
1706
BibRef
Zhang, X.[Xu],
Hu, X.,
Ma, M.,
Chen, C.[Chen],
Peng, S.,
Face spoofing detection based on 3D lighting environment analysis of
image pair,
ICPR16(2995-3000)
IEEE DOI
1705
Cameras, Correlation, Face, Face recognition, Harmonic analysis,
Lighting, Three-dimensional, displays
BibRef
Li, X.B.[Xiao-Bai],
Komulainen, J.,
Zhao, G.,
Yuen, P.C.[Pong-Chi],
Pietikäinen, M.,
Generalized face anti-spoofing by detecting pulse from face videos,
ICPR16(4244-4249)
IEEE DOI
1705
Color, Databases, Face, Feature extraction, Skin,
Videos, Face liveness, anti-spoofing,
cross-database, mask, pulse
BibRef
Sun, X.D.[Xu-Dong],
Huang, L.[Lei],
Liu, C.P.[Chang-Ping],
Context based face spoofing detection using active near-infrared
images,
ICPR16(4262-4267)
IEEE DOI
1705
Cameras, Context, Face, Feature extraction, Histograms, Lighting, Media
BibRef
Siddiqui, T.A.,
Bharadwaj, S.,
Dhamecha, T.I.,
Agarwal, A.,
Vatsa, M.,
Singh, R.,
Ratha, N.,
Face anti-spoofing with multifeature videolet aggregation,
ICPR16(1035-1040)
IEEE DOI
1705
Biometrics (access control), Databases, Encoding, Face,
Feature extraction, Histograms, Support, vector, machines
BibRef
Tian, G.,
Mori, T.,
Okuda, Y.,
Spoofing detection for embedded face recognition system using a low
cost stereo camera,
ICPR16(1017-1022)
IEEE DOI
1705
Cameras, Face, Face recognition, Fitting, Nose, Surface fitting,
point cloud, spoof detection,
stereo vision, surface, fitting
BibRef
Rudd, E.M.[Ethan M.],
Günther, M.,
Boult, T.E.[Terrance E.],
PARAPH: Presentation Attack Rejection by Analyzing Polarization
Hypotheses,
Biometrics16(171-178)
IEEE DOI
1612
BibRef
Liu, S.Q.[Si-Qi],
Yuen, P.C.[Pong C.],
Zhang, S.P.[Sheng-Ping],
Zhao, G.Y.[Guo-Ying],
3D Mask Face Anti-spoofing with Remote Photoplethysmography,
ECCV16(VII: 85-100).
Springer DOI
1611
BibRef
Liu, S.Q.[Si-Qi],
Yang, B.,
Yuen, P.C.[Pong C.],
Zhao, G.Y.[Guo-Ying],
A 3D Mask Face Anti-Spoofing Database with Real World Variations,
Affect16(1551-1557)
IEEE DOI
1612
BibRef
Phan, Q.T.[Quoc-Tin],
Dang-Nguyen, D.T.[Duc-Tien],
Boato, G.[Giulia],
de Natale, F.G.B.[Francesco G. B.],
Using LDP-TOP in Video-Based Spoofing Detection,
CIAP17(II:614-624).
Springer DOI
1711
BibRef
Earlier:
FACE spoofing detection using LDP-TOP,
ICIP16(404-408)
IEEE DOI
1610
Face
BibRef
Garcia, D.C.[Diogo C.],
de Queiroz, R.L.[Ricardo L.],
Evaluating the effects of image compression in Moire-pattern-based
face-spoofing detection,
ICIP15(4843-4847)
IEEE DOI
1512
Biometrics; face recognition; face-spoofing detection
BibRef
Melnikov, A.[Aleksandr],
Akhunzyanov, R.[Rasim],
Kudashev, O.[Oleg],
Luckyanets, E.[Eugene],
Audiovisual Liveness Detection,
CIAP15(II:643-652).
Springer DOI
1511
BibRef
Cai, L.J.[Li-Jun],
Xiong, C.S.[Chun-Shui],
Huang, L.[Lei],
Liu, C.P.[Chang-Ping],
A Novel Face Spoofing Detection Method Based on Gaze Estimation,
ACCV14(III: 547-561).
Springer DOI
1504
BibRef
Raghavendra, R.,
Busch, C.[Christoph],
Improved face recognition by combining information from multiple
cameras in Automatic Border Control system,
AVSS15(1-6)
IEEE DOI
1511
BibRef
Earlier:
Novel presentation attack detection algorithm for face recognition
system: Application to 3D face mask attack,
ICIP14(323-327)
IEEE DOI
1502
cameras.
Databases
BibRef
Liu, W.W.[Wei-Wen],
Face liveness detection using analysis of Fourier spectra based on
hair,
ICWAPR14(75-80)
IEEE DOI
1402
Accuracy
BibRef
Peng, J.Y.[Jun-Yan],
Chan, P.P.K.[Patrick P.K.],
Face liveness detection for combating the spoofing attack in face
recognition,
ICWAPR14(176-181)
IEEE DOI
1402
Accuracy
BibRef
Yang, L.B.[Li-Bin],
Face liveness detection by focusing on frontal faces and image
backgrounds,
ICWAPR14(93-97)
IEEE DOI
1402
BibRef
d'Souza, D.[Darryl],
Yampolskiy, R.V.[Roman V.],
Natural vs. Artificial Face Classification Using Uniform Local
Directional Patterns and Wavelet Uniform Local Directional Patterns,
Biometrics14(27-33)
IEEE DOI
1409
Avatars
BibRef
de Freitas Pereira, T.[Tiago],
Anjos, A.[André],
de Martino, J.M.[José Mario],
Marcel, S.[Sébastien],
LBP-TOP Based Countermeasure against Face Spoofing Attacks,
CVLBP12(I:121-132).
Springer DOI
1304
BibRef
Wang, Y.Y.[Yue-Yang],
Hao, X.L.[Xiao-Li],
Hou, Y.[Yali],
Guo, C.Q.[Chang-Qing],
A New Multispectral Method for Face Liveness Detection,
ACPR13(922-926)
IEEE DOI
1408
face recognition
BibRef
Bharadwaj, S.[Samarth],
Dhamecha, T.I.[Tejas I.],
Vatsa, M.[Mayank],
Singh, R.[Richa],
Computationally Efficient Face Spoofing Detection with Motion
Magnification,
Biometrics13(105-110)
IEEE DOI
1309
Face spoofing; biometrics; face recognition; liveness detection
BibRef
Rattani, A.[Ajita],
Poh, N.[Norman],
Ross, A.[Arun],
Analysis of user-specific score characteristics for spoof biometric
attacks,
Biometrics12(124-129).
IEEE DOI
1207
BibRef
Yan, J.J.[Jun-Jie],
Zhang, Z.W.[Zhi-Wei],
Lei, Z.[Zhen],
Yi, D.[Dong],
Li, S.Z.,
Face liveness detection by exploring multiple scenic clues,
ICARCV12(188-193).
IEEE DOI
1304
See also Face detection by structural models.
BibRef
Markovski, J.,
Reniers, M.A.,
An integrated state- and event-based framework for verifying liveness
in supervised systems,
ICARCV12(246-251).
IEEE DOI
1304
BibRef
Hu, H.[Hesuan],
Su, R.[Rong],
A novel approach to liveness supervision of AMS with assembly
operations using Petri nets,
ICARCV12(264-269).
IEEE DOI
1304
BibRef
Peixoto, B.[Bruno],
Michelassi, C.[Carolina],
Rocha, A.[Anderson],
Face liveness detection under bad illumination conditions,
ICIP11(3557-3560).
IEEE DOI
1201
BibRef
Sun, L.[Lin],
Huang, W.B.[Wai-Bin],
Wu, M.H.[Ming-Hui],
TIR/VIS Correlation for Liveness Detection in Face Recognition,
CAIP11(II: 114-121).
Springer DOI
1109
BibRef
Tan, X.Y.[Xiao-Yang],
Li, Y.[Yi],
Liu, J.[Jun],
Jiang, L.[Lin],
Face Liveness Detection from a Single Image with Sparse Low Rank
Bilinear Discriminative Model,
ECCV10(VI: 504-517).
Springer DOI
1009
BibRef
Bao, W.[Wei],
Li, H.[Hong],
Li, N.[Nan],
Jiang, W.[Wei],
A liveness detection method for face recognition based on optical flow
field,
IASP09(233-236).
IEEE DOI
0904
BibRef
Pan, G.[Gang],
Sun, L.[Lin],
Wu, Z.H.[Zhao-Hui],
Lao, S.H.[Shi-Hong],
Eyeblink-based Anti-Spoofing in Face Recognition from a Generic
Webcamera,
ICCV07(1-8).
IEEE DOI
0710
BibRef
Chapter on Face Recognition, Detection, Tracking, Gesture Recognition, Fingerprints, Biometrics continues in
Biometrics, Cross-Modal, Multi-Modal Systems, Multibiometrics, Combined Face and Other Features, Fusion .