Kollreider, K.[Klaus],
Fronthaler, H.[Hartwig],
Bigun, J.[Josef],
Non-intrusive liveness detection by face images,
IVC(27), No. 3, February 2009, pp. 233-244.
Elsevier DOI
0804
BibRef
Earlier:
Verifying liveness by multiple experts in face biometrics,
Biometrics08(1-6).
IEEE DOI
0806
Face liveness; Liveness detection; Anti-spoofing measures; Optical
flow; Motion of lines; Optical flow of lines; Orientation estimation;
Face part models; Retinotopic vision; Local Gabor decomposition;
Support vector machine classification
BibRef
Zhang, Z.W.[Zhi-Wei],
Yi, D.[Dong],
Lei, Z.[Zhen],
Li, S.Z.,
Regularized Transfer Boosting for Face Detection Across Spectrum,
SPLetters(19), No. 3, March 2012, pp. 131-134.
IEEE DOI
1202
BibRef
Zhang, Z.W.[Zhi-Wei],
Yi, D.[Dong],
Lei, Z.[Zhen],
Li, S.Z.[Stan Z.],
Face Liveness Detection by Learning Multispectral Reflectance
Distributions,
FG11(436-441).
IEEE DOI
1103
BibRef
de Freitas Pereira, T.[Tiago],
Komulainen, J.[Jukka],
Anjos, A.[Andre],
de Martino, J.[Jose],
Hadid, A.[Abdenour],
Pietikainen, M.[Matti],
Marcel, S.[Sebastien],
Face liveness detection using dynamic texture,
JIVP(2014), No. 1, 2014, pp. 2.
DOI Link
1402
BibRef
Komulainen, J.[Jukka],
Hadid, A.[Abdenour],
Pietikäinen, M.[Matti],
Face Spoofing Detection Using Dynamic Texture,
CVLBP12(I:146-157).
Springer DOI
1304
BibRef
Feng, Y.C.[Yi C.],
Lim, M.H.[Meng-Hui],
Yuen, P.C.[Pong C.],
Masquerade attack on transform-based binary-template protection based
on perceptron learning,
PR(47), No. 9, 2014, pp. 3019-3033.
Elsevier DOI
1406
Masquerade attack
BibRef
Bustard, J.D.,
Carter, J.N.,
Nixon, M.S.,
Hadid, A.,
Measuring and mitigating targeted biometric impersonation,
IET-Bio(3), No. 2, June 2014, pp. 55-61.
DOI Link
1407
BibRef
Kim, W.,
Suh, S.,
Han, J.,
Face Liveness Detection From a Single Image via Diffusion Speed Model,
IP(24), No. 8, August 2015, pp. 2456-2465.
IEEE DOI
1505
Face
BibRef
Mohammadi, A.[Amir],
Bhattacharjee, S.[Sushil],
Marcel, S.[Sébastien],
Deeply vulnerable: a study of the robustness of face recognition to
presentation attacks,
IET-Bio(7), No. 1, January 2018, pp. 15-26.
DOI Link
1712
BibRef
Alotaibi, A.[Aziz],
Mahmood, A.[Ausif],
Deep face liveness detection based on nonlinear diffusion using
convolution neural network,
SIViP(11), No. 4, May 2017, pp. 713-720.
WWW Link.
1704
BibRef
Xia, Z.Q.[Zhao-Qiang],
Peng, X.L.[Xian-Lin],
Feng, X.Y.[Xiao-Yi],
Hadid, A.[Abdenour],
Scarce face recognition via two-layer collaborative representation,
IET-Bio(7), No. 1, January 2018, pp. 56-62.
DOI Link
1712
BibRef
Gomez-Barrero, M.[Marta],
Rathgeb, C.[Christian],
Scherhag, U.[Ulrich],
Busch, C.[Christoph],
Predicting the vulnerability of biometric systems to attacks based on
morphed biometric information,
IET-Bio(7), No. 4, July 2018, pp. 333-341.
DOI Link
1807
BibRef
Hamdan, B.[Bensenane],
Mokhtar, K.[Keche],
A self-immune to 3D masks attacks face recognition system,
SIViP(12), No. 6, September 2018, pp. 1053-1060.
WWW Link.
1808
BibRef
Chen, L.Y.[Ling-Ying],
Zhao, G.H.[Guang-Hui],
Zhou, J.W.[Jun-Wei],
Ho, A.T.S.[Anthony T.S.],
Cheng, L.M.[Lee-Ming],
Face template protection using deep LDPC codes learning,
IET-Bio(8), No. 3, May 2019, pp. 190-197.
DOI Link
1904
BibRef
Goswami, G.[Gaurav],
Agarwal, A.[Akshay],
Ratha, N.[Nalini],
Vatsa, M.[Mayank],
Detecting and Mitigating Adversarial Perturbations for Robust Face
Recognition,
IJCV(127), No. 6-7, June 2019, pp. 719-742.
Springer DOI
1906
BibRef
Camińa, J.B.[José Benito],
Medina-Pérez, M.A.[Miguel Angel],
Monroy, R.[Raúl],
Loyola-González, O.[Octavio],
Villanueva, L.A.P.[Luis Angel Pereyra],
González Gurrola, L.C.[Luis Carlos],
Bagging-RandomMiner:
A one-class classifier for file access-based masquerade detection,
MVA(30), No. 5, July 2019, pp. 959-974.
Springer DOI
1907
BibRef
Yu, C.Y.[Chang-Yong],
Yao, C.T.[Cheng-Tang],
Pei, M.T.[Ming-Tao],
Jia, Y.D.[Yun-De],
Diffusion-based kernel matrix model for face liveness detection,
IVC(89), 2019, pp. 88-94.
Elsevier DOI
1909
Face liveness detection, Anisotropic diffusion,
Kernel matrix model, DK feature
BibRef
Chen, F.M.[Fu-Mei],
Wen, C.[Chang],
Xie, K.[Kai],
Wen, F.Q.[Fang-Qing],
Sheng, G.Q.[Guan-Qun],
Tang, X.G.[Xin-Gong],
Face liveness detection: fusing colour texture feature and deep feature,
IET-Bio(8), No. 6, November 2019, pp. 369-377.
DOI Link
1911
BibRef
Jia, S.[Shan],
Guo, G.D.[Guo-Dong],
Xu, Z.Q.[Zheng-Quan],
Wang, Q.C.[Qiang-Chang],
Face presentation attack detection in mobile scenarios:
A comprehensive evaluation,
IVC(93), 2020, pp. 103826.
Elsevier DOI
2001
Face presentation attack, Face recognition,
Performance evaluation, Biometrics
BibRef
Peng, F.[Fei],
Qin, L.[Le],
Long, M.[Min],
Face presentation attack detection based on chromatic co-occurrence
of local binary pattern and ensemble learning,
JVCIR(66), 2020, pp. 102746.
Elsevier DOI
2003
Presentation attack detection, Face recognition,
Color distortion, Ensemble learning
BibRef
Bresan, R.[Rodrigo],
Beluzo, C.[Carlos],
Carvalho, T.[Tiago],
Exposing Presentation Attacks by a Combination of Multi-intrinsic Image
Properties, Convolutional Networks and Transfer Learning,
ACIVS20(153-165).
Springer DOI
2003
BibRef
Raj, S.[Sunny],
Pannu, J.S.[Jodh S.],
Fernandes, S.L.[Steven L.],
Ramanathan, A.[Arvind],
Pullum, L.L.[Laura L.],
Jha, S.K.[Sumit K.],
Attacking NIST biometric image software using nonlinear optimization,
PRL(131), 2020, pp. 79-84.
Elsevier DOI
2004
NIST biometric image software, MINDTCT, BOZORTH3, NLopt
BibRef
Ma, Y.[Yukun],
Wu, L.[Lifang],
Li, Z.[Zeyu],
liu, F.[Fanghao],
A novel face presentation attack detection scheme based on
multi-regional convolutional neural networks,
PRL(131), 2020, pp. 261-267.
Elsevier DOI
2004
Face presentation attack detection, Adversarial examples,
Local classification loss, Multi-regional convolutional neural networks
BibRef
Li, L.[Lei],
Xia, Z.Q.[Zhao-Qiang],
Jiang, X.Y.[Xiao-Yue],
Ma, Y.P.[Yu-Peng],
Roli, F.[Fabio],
Feng, X.Y.[Xiao-Yi],
3D face mask presentation attack detection based on intrinsic image
analysis,
IET-Bio(9), No. 3, May 2020, pp. 100-108.
DOI Link
2005
BibRef
Rathgeb, C.[Christian],
Botaljov, A.[Angelika],
Stockhardt, F.[Fabian],
Isadskiy, S.[Sergey],
Debiasi, L.[Luca],
Uhl, A.[Andreas],
Busch, C.[Christoph],
PRNU-based detection of facial retouching,
IET-Bio(9), No. 4, July 2020, pp. 154-164.
DOI Link
2006
BibRef
Peng, F.,
Yin, L.P.,
Zhang, L.B.,
Long, M.,
CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on
Generative Adversarial Network,
MultMed(22), No. 10, October 2020, pp. 2511-2525.
IEEE DOI
2009
Feature extraction, Detectors, Forensics, Image color analysis,
Convolution, Histograms, Generative adversarial networks,
computer-generated graphics (CG) detector
BibRef
Scherhag, U.[Ulrich],
Kunze, J.[Jonas],
Rathgeb, C.[Christian],
Busch, C.[Christoph],
Face morph detection for unknown morphing algorithms and image sources:
a multi-scale block local binary pattern fusion approach,
IET-Bio(9), No. 6, November 2020, pp. 278-289.
DOI Link
2010
BibRef
Massoli, F.V.[Fabio Valerio],
Carrara, F.[Fabio],
Amato, G.[Giuseppe],
Falchi, F.[Fabrizio],
Detection of Face Recognition Adversarial Attacks,
CVIU(202), 2021, pp. 103103.
Elsevier DOI
2012
Deep Learning, Face Recognition, Adversarial attacks,
Adversarial detection, Adversarial biometrics
BibRef
Guo, Z.Q.[Zhi-Qing],
Yang, G.B.[Gao-Bo],
Chen, J.Y.[Ji-You],
Sun, X.M.[Xing-Ming],
Fake face detection via adaptive manipulation traces extraction
network,
CVIU(204), 2021, pp. 103170.
Elsevier DOI
2102
Face image manipulation, Passive image forensics, Manipulation traces extraction
BibRef
Guo, W.[Wei],
Tondi, B.[Benedetta],
Barni, M.[Mauro],
A Master Key backdoor for universal impersonation attack against
DNN-based face verification,
PRL(144), 2021, pp. 61-67.
Elsevier DOI
2103
Backdoor attacks to CNN, Face verification, Biometric security,
Presentation attacks, Adversarial machine learning
BibRef
Wang, Y.W.[Yong-Wei],
Ding, X.[Xin],
Yang, Y.X.[Yi-Xin],
Ding, L.[Li],
Ward, R.[Rabab],
Wang, Z.J.[Z. Jane],
Perception matters: Exploring imperceptible and transferable
anti-forensics for GAN-generated fake face imagery detection,
PRL(146), 2021, pp. 15-22.
Elsevier DOI
2105
Fake face imagery anti-forensics, Imperceptible attacks,
Transferable attacks, Improved adversarial attack
BibRef
Bisogni, C.[Carmen],
Cascone, L.[Lucia],
Dugelay, J.L.[Jean-Luc],
Pero, C.[Chiara],
Adversarial attacks through architectures and spectra in face
recognition,
PRL(147), 2021, pp. 55-62.
Elsevier DOI
2106
Adversarial Attack, Deep Neural Networks, White-Box Attack,
Black-Box Attack, Near Infrared Images, Thermal Images
BibRef
Ngô, L.M.[Lę Minh],
Wang, W.[Wei],
Mandira, B.[Burak],
Karaoglu, S.[Sezer],
Bouma, H.[Henri],
Dibeklioglu, H.[Hamdi],
Gevers, T.[Theo],
Identity Unbiased Deception Detection by 2D-to-3D Face Reconstruction,
WACV21(145-154)
IEEE DOI
2106
Video sequences, Pipelines, Feature extraction, Real-time systems,
Magnetic heads, Reliability, Convolutional neural networks
BibRef
Hofbauer, H.[Heinz],
Debiasi, L.[Luca],
Kränkl, S.[Susanne],
Uhl, A.[Andreas],
Exploring presentation attack vulnerability and usability of face
recognition systems,
IET-Bio(10), No. 2, 2021, pp. 219-232.
DOI Link
2106
BibRef
Bonomi, M.[Mattia],
Pasquini, C.[Cecilia],
Boato, G.[Giulia],
Dynamic texture analysis for detecting fake faces in video sequences,
JVCIR(79), 2021, pp. 103239.
Elsevier DOI
2109
Manipulated videos, Deepfakes, Video forensics, Local Derivative Patterns
BibRef
González-Soler, L.J.[Lázaro J.],
Gomez-Barrero, M.[Marta],
Busch, C.[Christoph],
On the generalisation capabilities of Fisher vector-based face
presentation attack detection,
IET-Bio(10), No. 5, 2021, pp. 480-496.
DOI Link
2109
BibRef
Arashloo, S.R.[Shervin Rahimzadeh],
Unseen Face Presentation Attack Detection Using Sparse Multiple
Kernel Fisher Null-Space,
CirSysVideo(31), No. 10, October 2021, pp. 4084-4095.
IEEE DOI
2110
Faces, Kernel, Face recognition, Training, Anomaly detection,
Task analysis, Support vector machines,
sparse regularisation
BibRef
Peng, F.[Fei],
Meng, S.H.[Shao-Hua],
Long, M.[Min],
Presentation attack detection based on two-stream vision transformers
with self-attention fusion,
JVCIR(85), 2022, pp. 103518.
Elsevier DOI
2205
Presentation attack detection,
Multi-scale retinex with color restoration, Feature fusion
BibRef
Khalid, S.S.[Syed Safwan],
Awais, M.[Muhammad],
Feng, Z.H.[Zhen-Hua],
Chan, C.H.[Chi-Ho],
Farooq, A.[Ammarah],
Akbari, A.[Ali],
Kittler, J.V.[Josef V.],
NPT-Loss:
Demystifying Face Recognition Losses With Nearest Proxies Triplet,
PAMI(45), No. 12, December 2023, pp. 15249-15259.
IEEE DOI
2311
BibRef
Peng, F.[Fei],
Qin, L.[Le],
Long, M.[Min],
Face morphing attack detection and attacker identification based on a
watchlist,
SP:IC(107), 2022, pp. 116748.
Elsevier DOI
2208
Automated border control, Face verification, Morphing attacks,
Morphing attack detection, Watchlist
BibRef
Raja, K.[Kiran],
Gupta, G.[Gourav],
Venkatesh, S.[Sushma],
Ramachandra, R.[Raghavendra],
Busch, C.[Christoph],
Towards generalized morphing attack detection by learning residuals,
IVC(126), 2022, pp. 104535.
Elsevier DOI
2209
Morphing attacks, Morphing attack detection, Face recognition,
Vulnerability of biometric systems
BibRef
Mudgalgundurao, R.[Raghavendra],
Schuch, P.[Patrick],
Raja, K.[Kiran],
Ramachandra, R.[Raghavendra],
Damer, N.[Naser],
Pixel-wise supervision for presentation attack detection on identity
document cards,
IET-Bio(11), No. 5, 2022, pp. 383-395.
DOI Link
2210
BibRef
Rezgui, Z.[Zohra],
Bassit, A.[Amina],
Veldhuis, R.[Raymond],
Transferability analysis of adversarial attacks on gender
classification to face recognition: Fixed and variable attack
perturbation,
IET-Bio(11), No. 5, 2022, pp. 407-419.
DOI Link
2210
adversarial attacks, face recognition, gender classification, privacy protection
BibRef
You, D.[Dan],
Wang, S.G.[Shou-Guang],
Seatzu, C.[Carla],
A Liveness-Enforcing Supervisor Tolerant to Sensor-Reading
Modification Attacks,
SMCS(52), No. 4, April 2022, pp. 2398-2411.
IEEE DOI
2203
Robot sensing systems, Control systems, Actuators, Petri nets,
Directed graphs, Supervisory control, Security, Attacks,
Petri nets (PNs)
BibRef
Zheng, X.[Xin],
Fan, Y.B.[Yan-Bo],
Wu, B.Y.[Bao-Yuan],
Zhang, Y.[Yong],
Wang, J.[Jue],
Pan, S.R.[Shi-Rui],
Robust Physical-World Attacks on Face Recognition,
PR(133), 2023, pp. 109009.
Elsevier DOI
2210
Physical-world adversarial attack, Face recognition,
Environmental variations, Curriculum learning
BibRef
Zhang, W.T.[Wen-Tian],
Liu, H.Z.[Hao-Zhe],
Liu, F.[Feng],
Ramachandra, R.[Raghavendra],
Busch, C.[Christoph],
Effective Presentation Attack Detection Driven by Face Related Task,
ECCV22(V:408-423).
Springer DOI
2211
BibRef
Marcialis, G.L.[Gian Luca],
Liu, X.M.[Xiao-Ming],
Didaci, L.[Luca],
Biometric presentation attacks: Handcrafted features versus deep
learning approaches,
PRL(163), 2022, pp. 55-56.
Elsevier DOI
2212
BibRef
Wang, C.X.[Cai-Xun],
Yu, B.Y.[Bing-Yao],
Zhou, J.[Jie],
A Learnable Gradient operator for face presentation attack detection,
PR(135), 2023, pp. 109146.
Elsevier DOI
2212
Face presentation attack detection,
Learnable gradient operator, Depth-supervised network
BibRef
Zhang, H.T.[Hai-Tao],
Chen, B.[Beijing],
Wang, J.W.[Jin-Wei],
Zhao, G.Y.[Guo-Ying],
A Local Perturbation Generation Method for GAN-Generated Face
Anti-Forensics,
CirSysVideo(33), No. 2, February 2023, pp. 661-676.
IEEE DOI
2302
Faces, Detectors, Perturbation methods, Forensics, Visualization,
Face recognition, Generative adversarial networks, double mask
BibRef
Zhang, D.H.[Dong-Heng],
Meng, J.[Jia],
Zhang, J.[Jian],
Deng, X.Z.[Xin-Zhe],
Ding, S.H.[Shou-Hong],
Zhou, M.[Man],
Wang, Q.[Qian],
Li, Q.[Qi],
Chen, Y.[Yan],
SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices,
CirSysVideo(33), No. 8, August 2023, pp. 4401-4414.
IEEE DOI
2308
Ultrasonic imaging, Lips, Faces, Hardware, Mobile handsets,
Face recognition, Authentication, Liveness detection,
information fusion
BibRef
Hu, C.[Cong],
Li, Y.B.[Yuan-Bo],
Feng, Z.H.[Zhen-Hua],
Wu, X.J.[Xiao-Jun],
Attention-guided evolutionary attack with elastic-net regularization
on face recognition,
PR(143), 2023, pp. 109760.
Elsevier DOI
2310
Face recognition, Convolutional neural networks,
Adversarial examples, Evolutionary attack, Attention mechanisms
BibRef
Shahreza, H.O.[Hatef Otroshi],
Marcel, S.[Sébastien],
Comprehensive Vulnerability Evaluation of Face Recognition Systems to
Template Inversion Attacks via 3D Face Reconstruction,
PAMI(45), No. 12, December 2023, pp. 14248-14265.
IEEE DOI
2311
BibRef
And:
Template Inversion Attack against Face Recognition Systems using 3D
Face Reconstruction,
ICCV23(19605-19615)
IEEE DOI Code:
WWW Link.
2401
BibRef
Fang, M.L.[Mei-Ling],
Yang, W.[Wufei],
Kuijper, A.[Arjan],
Struc, V.[Vitomir],
Damer, N.[Naser],
Fairness in face presentation attack detection,
PR(147), 2024, pp. 110002.
Elsevier DOI
2312
Face presentation attack detection, Fairness assessment, Bias mitigation
BibRef
Qi, H.[Hongda],
Wang, J.L.[Jun-Li],
Yan, C.[Chungang],
Jiang, C.J.[Chang-Jun],
The Probabilistic Liveness Decision Method of Unbounded Petri Nets
Based on Machine Learning,
SMCS(54), No. 2, February 2024, pp. 1070-1081.
IEEE DOI
2402
System recovery, Feature extraction, Machine learning,
Probabilistic logic, Petri nets, Logic gates, Convolution,
unbounded Petri nets (UPN)
BibRef
Dou, H.[Hao],
Zhou, M.C.[Meng-Chu],
Wang, S.G.[Shou-Guang],
Albeshri, A.[Aiiad],
An Efficient Liveness Analysis Method for Petri Nets via Maximally
Good-Step Graphs,
SMCS(54), No. 7, July 2024, pp. 3908-3919.
IEEE DOI
2406
System recovery, Petri nets, Computational complexity, Explosions,
Analytical models, Vectors, Manufacturing systems, Petri nets (PNs)
BibRef
Ramachandra, R.[Raghavendra],
Vetrekar, N.[Narayan],
Venkatesh, S.[Sushma],
Nageshker, S.[Savita],
Singh, J.M.[Jag Mohan],
Gad, R.S.,
VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for
Generalizable Face Presentation Attack Detection,
FG24(1-9)
IEEE DOI
2408
Point cloud compression, Performance evaluation, Protocols,
Face recognition, Instruments, Gesture recognition
BibRef
Li, Q.[Qian],
Hu, Y.X.[Yu-Xiao],
Liu, Y.[Ye],
Zhang, D.X.[Dong-Xiao],
Jin, X.[Xin],
Chen, Y.T.[Yun-Tian],
Discrete Point-Wise Attack is Not Enough: Generalized Manifold
Adversarial Attack for Face Recognition,
CVPR23(20575-20584)
IEEE DOI
2309
BibRef
Li, Y.J.[Yan-Jie],
Li, Y.[Yiquan],
Dai, X.L.[Xue-Long],
Guo, S.T.[Song-Tao],
Xiao, B.[Bin],
Physical-World Optical Adversarial Attacks on 3D Face Recognition,
CVPR23(24699-24708)
IEEE DOI
2309
BibRef
Li, Z.X.[Ze-Xin],
Yin, B.[Bangjie],
Yao, T.P.[Tai-Ping],
Guo, J.F.[Jun-Feng],
Ding, S.H.[Shou-Hong],
Chen, S.[Simin],
Liu, C.[Cong],
Sibling-Attack: Rethinking Transferable Adversarial Attacks against
Face Recognition,
CVPR23(24626-24637)
IEEE DOI
2309
BibRef
Shamshad, F.[Fahad],
Srivatsan, K.[Koushik],
Nandakumar, K.[Karthik],
Evading Forensic Classifiers with Attribute-Conditioned Adversarial
Faces,
CVPR23(16469-16478)
IEEE DOI
2309
BibRef
Mundra, S.[Shivansh],
Porcile, G.J.A.[Gonzalo J. Aniano],
Marvaniya, S.[Smit],
Verbus, J.R.[James R.],
Farid, H.[Hany],
Exposing GAN-Generated Profile Photos from Compact Embeddings,
WMF23(884-892)
IEEE DOI
2309
BibRef
Deb, D.[Debayan],
Liu, X.M.[Xiao-Ming],
Jain, A.K.[Anil K.],
FaceGuard: A Self-Supervised Defense Against Adversarial Face Images,
FG23(1-8)
IEEE DOI
2303
Training, Codes, Purification, Face recognition,
Perturbation methods, Gesture recognition
BibRef
Thakral, K.[Kartik],
Mittal, S.[Surbhi],
Vatsa, M.[Mayank],
Singh, R.[Richa],
PhygitalNet: Unified Face Presentation Attack Detection via One-Class
Isolation Learning,
FG23(1-6)
IEEE DOI
2303
Training, Face recognition, Biological system modeling,
Gesture recognition, Performance gain, Classification algorithms, Faces
BibRef
Shmelkin, R.[Ron],
Friedlander, T.[Tomer],
Wolf, L.[Lior],
Generating Master Faces for Dictionary Attacks with a
Network-Assisted Latent Space Evolution,
FG21(01-08)
IEEE DOI
2303
Dictionaries, Face recognition, Sociology,
Neural networks, Gesture recognition, Evolutionary computation
BibRef
Vepakomma, P.[Praneeth],
Singh, A.[Abhishek],
Zhang, E.[Emily],
Gupta, O.[Otkrist],
Raskar, R.[Ramesh],
NoPeek-Infer: Preventing face reconstruction attacks in distributed
inference after on-premise training,
FG21(1-8)
IEEE DOI
2303
Training, Privacy, Correlation, Computational modeling,
Distributed databases, Machine learning, Predictive models
BibRef
Shao, R.[Rui],
Zhang, B.[Bochao],
Yuen, P.C.[Pong C.],
Patel, V.M.[Vishal M.],
Federated Test-Time Adaptive Face Presentation Attack Detection with
Dual-Phase Privacy Preservation,
FG21(1-8)
IEEE DOI
2303
Training, Adaptation models, Data privacy, Data centers,
Face recognition, Soft sensors, Predictive models
BibRef
Hamblin, J.[Jennifer],
Nikhal, K.[Kshitij],
Riggan, B.S.[Benjamin S.],
Understanding Cross Domain Presentation Attack Detection for Visible
Face Recognition,
FG21(1-8)
IEEE DOI
2303
Training, Costs, Protocols, Shape, Face recognition, Transforms, Sensor systems
BibRef
Mirzaalian, H.[Hengameh],
Hussein, M.E.[Mohamed E.],
Spinoulas, L.[Leonidas],
May, J.[Jonathan],
Abd-Almageed, W.[Wael],
Explaining Face Presentation Attack Detection Using Natural Language,
FG21(1-8)
IEEE DOI
2303
Training, Face recognition, Biological system modeling,
Natural languages, Semantics, Neural networks, Predictive models
BibRef
Deb, D.[Debayan],
Liu, X.M.[Xiao-Ming],
Jain, A.K.[Anil K.],
Unified Detection of Digital and Physical Face Attacks,
FG23(1-8)
IEEE DOI
2303
Codes, Face recognition, Gesture recognition, Detectors,
Multitasking, Faces
BibRef
Wang, H.R.[Han-Rui],
Wang, S.[Shuo],
Jin, Z.[Zhe],
Wang, Y.D.[Yan-Dan],
Chen, C.J.[Cun-Jian],
Tistarelli, M.[Massimo],
Similarity-based Gray-box Adversarial Attack Against Deep Face
Recognition,
FG21(1-8)
IEEE DOI
2303
Resistance, Data privacy, Databases, Face recognition,
Authentication, Gesture recognition
BibRef
Al-Refai, R.[Rouqaiah],
Nandakumar, K.[Karthik],
A Unified Model for Face Matching and Presentation Attack Detection
using an Ensemble of Vision Transformer Features,
BioAttack23(662-671)
IEEE DOI
2302
Deep learning, Face recognition, Conferences, Neural networks,
Feature extraction, Transformers, Multitasking
BibRef
Rathgeb, C.,
Nichols, R.,
Ibsen, M.,
Drozdowski, P.,
Busch, C.,
Crowd-Powered Face Manipulation Detection:
Fusing Human Examiner Decisions,
ICIP22(181-185)
IEEE DOI
2211
Image analysis, Forensics, Reliability, Task analysis, Faces,
Image forensics, manipulation detection, information fusion, human examiners
BibRef
Ming, Z.H.[Zu-Heng],
Yu, Z.T.[Zi-Tong],
Al-Ghadi, M.[Musab],
Visani, M.[Muriel],
Luqman, M.M.[Muhammad Muzzamil],
Burie, J.C.[Jean-Christophe],
Vitranspad: Video Transformer Using Convolution And Self-Attention
For Face Presentation Attack Detection,
ICIP22(4248-4252)
IEEE DOI
2211
Convolution, Biometrics (access control), Computational modeling,
Neural networks, Transformers, Task analysis,
face presentation attack detection
BibRef
Guetta, N.,
Shabtai, A.,
Singh, I.,
Momiyama, S.,
Elovici, Y.,
Dodging Attack Using Carefully Crafted Natural Makeup,
Ben-Gurion Universityof the Negev, 14 Sep 2021
WWW Link.
BibRef
2109
Mayer, J.[Jillian],
MakeUp Tutorial: How To Hide From Cameras,
YouTubeMay 30, 2013,
WWW Link.
BibRef
1305
Cauli, N.[Nino],
Ortis, A.[Alessandro],
Battiato, S.[Sebastiano],
Fooling a Face Recognition System with a Marker-Free Label-Consistent
Backdoor Attack,
CIAP22(II:176-185).
Springer DOI
2205
BibRef
Padnevych, R.[Ruslan],
Carmo, D.[David],
Semedo, D.[David],
Magalhăes, J.[Joăo],
Temporal Convolutional Networks for Robust Face Liveness Detection,
IbPRIA22(255-267).
Springer DOI
2205
BibRef
Rostami, M.[Mohammad],
Spinoulas, L.[Leonidas],
Hussein, M.[Mohamed],
Mathai, J.[Joe],
Abd-Almageed, W.[Wael],
Detection and Continual Learning of Novel Face Presentation Attacks,
ICCV21(14831-14840)
IEEE DOI
2203
Training, Deep learning, Pollution, Neural networks, Training data,
Benchmark testing,
Machine learning architectures and formulations
BibRef
Byun, J.[Junyoung],
Go, H.[Hyojun],
Kim, C.[Changick],
Geometrically Adaptive Dictionary Attack on Face Recognition,
WACV22(3809-3818)
IEEE DOI
2202
Limiting, Dictionaries,
Perturbation methods, Face recognition, Semantics, Search problems,
Adversarial Attack and Defense Methods Deep Learning
BibRef
Singh, I.[Inderjeet],
Araki, T.[Toshinori],
Kakizaki, K.[Kazuya],
Powerful Physical Adversarial Examples Against Practical Face
Recognition Systems,
BioAttack22(301-310)
IEEE DOI
2202
Face recognition, Conferences, Machine learning,
Performance gain, Complexity theory, Risk management
BibRef
Neto, P.C.[Pedro C.],
Sequeira, A.F.[Ana F.],
Cardoso, J.S.[Jaime S.],
Myope Models:
Are face presentation attack detection models short-sighted?,
Explain-Bio22(390-399)
IEEE DOI
2202
Training, Analytical models, Error analysis, Crops,
Predictive models, Visual systems, Inspection
BibRef
Fang, M.L.[Mei-Ling],
Damer, N.[Naser],
Kirchbuchner, F.[Florian],
Kuijper, A.[Arjan],
Learnable Multi-level Frequency Decomposition and Hierarchical
Attention Mechanism for Generalized Face Presentation Attack
Detection,
WACV22(1131-1140)
IEEE DOI
2202
Training, Fuses, Frequency-domain analysis, Face recognition,
Semantics, Neural networks, Streaming media,
Biometrics Biometrics -> Face Processing
BibRef
Aghdaie, P.[Poorya],
Chaudhary, B.[Baaria],
Soleymani, S.[Sobhan],
Dawson, J.[Jeremy],
Nasrabadi, N.M.[Nasser M.],
Morph Detection Enhanced by Structured Group Sparsity,
BioAttack22(311-320)
IEEE DOI
2202
Training, Visualization, Wavelet domain, Face recognition,
Neural networks, Detectors, Feature extraction
BibRef
Ghafourian, M.[Mahdi],
Fierrez, J.[Julian],
Vera-Rodriguez, R.[Ruben],
Serna, I.[Ignacio],
Morales, A.[Aythami],
OTB-morph: One-Time Biometrics via Morphing applied to Face Templates,
BioAttack22(321-329)
IEEE DOI
2202
Visualization, Face recognition, Conferences, Aging, Servers, Cryptography
BibRef
Ramachandra, R.[Raghavendra],
Raja, K.[Kiran],
Busch, C.[Christoph],
Algorithmic Fairness in Face Morphing Attack Detection,
Perform-Bio22(410-418)
IEEE DOI
2202
Measurement, Ethics, Protocols, Law, Face recognition, Conferences,
Training data
BibRef
Fatemifar, S.[Soroush],
Awais, M.[Muhammad],
Akbari, A.[Ali],
Kittler, J.V.[Josef V.],
Particle Swarm and Pattern Search Optimisation of An Ensemble of Face
Anomaly Detectors,
ICIP21(3622-3626)
IEEE DOI
2201
Databases, Optimization methods, Detectors,
Learning (artificial intelligence), Feature extraction, Deep Learning
BibRef
Luo, Z.B.[Zheng-Bo],
Kamata, S.I.[Sei-Ichiro],
Sun, Z.T.[Zi-Tang],
Transformer and Node-Compressed DNN Based Dual-Path System for
Manipulated Face Detection,
ICIP21(3882-3886)
IEEE DOI
2201
Learning systems, Deep learning, Visualization, Image processing,
Pipelines, Neural networks, Ordinary differential equations,
face manipulation
BibRef
Yao, C.L.[Cheng-Lin],
Wang, S.[Shihe],
Zhang, J.[Jialu],
He, W.T.[Wen-Tao],
Du, H.[Heshan],
Ren, J.F.[Jian-Feng],
Bai, R.B.[Rui-Bin],
Liu, J.[Jiang],
rPPG-Based Spoofing Detection for Face Mask Attack using Efficientnet
on Weighted Spatial-Temporal Representation,
ICIP21(3872-3876)
IEEE DOI
2201
Image processing, Resists, Photoplethysmography, Distortion,
Spatial databases, Noise measurement, Face spoofing detection,
spatial-temporal representation
BibRef
Damer, N.[Naser],
Raja, K.[Kiran],
Süßmilch, M.[Marius],
Venkatesh, S.[Sushma],
Boutros, F.[Fadi],
Fang, M.L.[Mei-Ling],
Kirchbuchner, F.[Florian],
Ramachandra, R.[Raghavendra],
Kuijper, A.[Arjan],
ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by
Attack Re-generation,
ISVC21(I:251-264).
Springer DOI
2112
BibRef
Damer, N.[Naser],
Spiller, N.[Noémie],
Fang, M.L.[Mei-Ling],
Boutros, F.[Fadi],
Kirchbuchner, F.[Florian],
Kuijper, A.[Arjan],
PW-MAD: Pixel-Wise Supervision for Generalized Face Morphing Attack
Detection,
ISVC21(I:291-304).
Springer DOI
2112
BibRef
Xu, X.[Xiang],
Xiong, Y.J.[Yuan-Jun],
Xia, W.[Wei],
On Improving Temporal Consistency for Online Face Liveness Detection
System,
ChaLearnFAS21(824-833)
IEEE DOI
2112
Training, Adaptation models, Uncertainty,
Face recognition, Computational modeling, Conferences
BibRef
Fang, H.[Hao],
Liu, A.[Ajian],
Wan, J.[Jun],
Escalera, S.[Sergio],
Escalante, H.J.[Hugo Jair],
Lei, Z.[Zhen],
Surveillance Face Presentation Attack Detection Challenge,
ChaLearnFAS23(6361-6371)
IEEE DOI
2309
BibRef
Liu, A.[Ajian],
Zhao, C.X.[Chen-Xu],
Yu, Z.T.[Zi-Tong],
Su, A.Y.[An-Yang],
Liu, X.[Xing],
Kong, Z.J.[Zi-Jian],
Wan, J.[Jun],
Escalera, S.[Sergio],
Escalante, H.J.[Hugo Jair],
Lei, Z.[Zhen],
Guo, G.D.[Guo-Dong],
3D High-Fidelity Mask Face Presentation Attack Detection Challenge,
ChaLearnFAS21(814-823)
IEEE DOI
2112
Measurement, Protocols, Face recognition, Companies
BibRef
Chen, S.[Shen],
Yao, T.P.[Tai-Ping],
Zhang, K.Y.[Ke-Yue],
Chen, Y.[Yang],
Sun, K.[Ke],
Ding, S.H.[Shou-Hong],
Li, J.L.[Ji-Lin],
Huang, F.Y.[Fei-Yue],
Ji, R.R.[Rong-Rong],
A Dual-stream Framework for 3D Mask Face Presentation Attack
Detection,
ChaLearnFAS21(834-841)
IEEE DOI
2112
Degradation,
Smoothing methods, Convolution, Face recognition, Conferences
BibRef
Grinchuk, O.[Oleg],
Parkin, A.[Aleksandr],
Glazistova, E.[Evgenija],
3D mask presentation attack detection via high resolution face parts,
ChaLearnFAS21(846-853)
IEEE DOI
2112
Training, Deep learning,
Data mining, Faces
BibRef
Wenger, E.[Emily],
Passananti, J.[Josephine],
Bhagoji, A.N.[Arjun Nitin],
Yao, Y.S.[Yuan-Shun],
Zheng, H.T.[Hai-Tao],
Zhao, B.Y.[Ben Y.],
Backdoor Attacks Against Deep Learning Systems in the Physical World,
CVPR21(6202-6211)
IEEE DOI
2111
Deep learning, Face recognition, Robustness,
Task analysis, Facial features
BibRef
Chaudhary, B.[Baaria],
Aghdaie, P.[Poorya],
Soleymani, S.[Sobhan],
Dawson, J.[Jeremy],
Nasrabadi, N.M.[Nasser M.],
Differential Morph Face Detection using Discriminative Wavelet
Sub-bands,
Biometrics21(1425-1434)
IEEE DOI
2109
Training, Wavelet domain, Protocols, Face recognition,
Frequency-domain analysis, Neural networks, Entropy
BibRef
Sabel, J.[Johan],
Johansson, F.[Fredrik],
On the Robustness and Generalizability of Face Synthesis Detection
Methods,
WMF21(962-971)
IEEE DOI
2109
Training, Learning systems, Perturbation methods,
Face recognition, Robustness
BibRef
Mallat, K.[Khawla],
Dugelay, J.L.[Jean-Luc],
Indirect synthetic attack on thermal face biometric systems via
visible-to-thermal spectrum conversion,
Biometrics21(1435-1443)
IEEE DOI
2109
Error analysis, Social networking (online),
Face recognition, Communication channels, Thermal sensors
BibRef
Soleymani, S.[Sobhan],
Dabouei, A.[Ali],
Taherkhani, F.[Fariborz],
Dawson, J.[Jeremy],
Nasrabadi, N.M.[Nasser M.],
Mutual Information Maximization on Disentangled Representations for
Differential Morph Detection,
WACV21(1730-1740)
IEEE DOI
2106
Faces, Mutual information
BibRef
Sanghvi, N.[Nilay],
Singh, S.K.[Sushant Kumar],
Agarwal, A.[Akshay],
Vatsa, M.[Mayank],
Singh, R.[Richa],
MixNet for Generalized Face Presentation Attack Detection,
ICPR21(5511-5518)
IEEE DOI
2105
Databases, Face recognition, Distance measurement, Reliability,
Convolutional neural networks, Detection algorithms
BibRef
Komkov, S.[Stepan],
Petiushko, A.[Aleksandr],
AdvHat: Real-World Adversarial Attack on ArcFace Face ID System,
ICPR21(819-826)
IEEE DOI
2105
Image color analysis, Face recognition, Printers
BibRef
Zhang, Y.G.[Yu-Ge],
Zhao, M.[Min],
Yan, L.B.[Long-Bin],
Gao, T.D.[Tian-De],
Chen, J.[Jie],
CNN-Based Anomaly Detection for Face Presentation Attack Detection
with Multi-Channel Images,
VCIP20(189-192)
IEEE DOI
2102
Face recognition, Feature extraction, Faces, Anomaly detection,
Training, Task analysis, Neural networks,
multi-channel CNN
BibRef
Kotwal, K.,
Marcel, S.,
CNN Patch Pooling for Detecting 3D Mask Presentation Attacks in NIR,
ICIP20(1336-1340)
IEEE DOI
2011
Biometrics, Face Presentation Attack Detection, 3D Mask Attacks,
Patch Pooling Layer
BibRef
Wang, S.,
Wang, O.,
Zhang, R.,
Owens, A.,
Efros, A.A.,
CNN-Generated Images Are Surprisingly Easy to Spot… for Now,
CVPR20(8692-8701)
IEEE DOI
2008
Training, Image generation, Face, Image resolution,
Detectors, Generators
BibRef
Liu, Z.,
Qi, X.,
Torr, P.H.S.,
Global Texture Enhancement for Fake Face Detection in the Wild,
CVPR20(8057-8066)
IEEE DOI
2008
Face, Skin, Face detection, Robustness,
Image color analysis, Training
BibRef
Wang, G.,
Han, H.,
Shan, S.,
Chen, X.,
Cross-Domain Face Presentation Attack Detection via Multi-Domain
Disentangled Representation Learning,
CVPR20(6677-6686)
IEEE DOI
2008
Face, Robustness, Testing, Task analysis, Training, Machine learning
BibRef
Nguyen, D.,
Arora, S.S.,
Wu, Y.,
Yang, H.,
Adversarial Light Projection Attacks on Face Recognition Systems:
A Feasibility Study,
Biometrics20(3548-3556)
IEEE DOI
2008
Face recognition, Cameras, Face, Calibration,
Real-time systems, Target recognition
BibRef
Liu, S.,
Lan, X.,
Yuen, P.C.,
Temporal Similarity Analysis of Remote Photoplethysmography for Fast
3D Mask Face Presentation Attack Detection,
WACV20(2597-2605)
IEEE DOI
2006
Face, Heart beat, Cameras, Lighting, Skin, Time-domain analysis
BibRef
Venkatesh, S.,
Ramachandra, R.,
Raja, K.,
Spreeuwers, L.J.,
Veldhuis, R.N.J.,
Busch, C.,
Detecting Morphed Face Attacks Using Residual Noise from Deep
Multi-scale Context Aggregation Network,
WACV20(269-278)
IEEE DOI
2006
Face, Noise reduction, Feature extraction, Machine learning,
Image fusion, Wavelet transforms, Reliability
BibRef
Joshi, A.,
Mukherjee, A.,
Sarkar, S.,
Hegde, C.,
Semantic Adversarial Attacks:
Parametric Transformations That Fool Deep Classifiers,
ICCV19(4772-4782)
IEEE DOI
2004
face recognition, image classification,
learning (artificial intelligence), neural nets,
Neural networks
BibRef
Rössler, A.,
Cozzolino, D.,
Verdoliva, L.,
Riess, C.,
Thies, J.,
Niessner, M.,
FaceForensics++: Learning to Detect Manipulated Facial Images,
ICCV19(1-11)
IEEE DOI
2004
data compression, face recognition, feature extraction,
image coding, image enhancement, image forensics,
Databases
BibRef
Yu, N.,
Davis, L.,
Fritz, M.,
Attributing Fake Images to GANs:
Learning and Analyzing GAN Fingerprints,
ICCV19(7555-7565)
IEEE DOI
2004
image classification, neural nets, security of data, fake images,
generative adversarial networks, photorealistic images,
Intellectual property
BibRef
Deng, J.K.[Jian-Kang],
Guo, J.[Jia],
Liu, T.L.[Tong-Liang],
Gong, M.M.[Ming-Ming],
Zafeiriou, S.P.[Stefanos P.],
Sub-center Arcface: Boosting Face Recognition by Large-scale Noisy Web
Faces,
ECCV20(XI:741-757).
Springer DOI
2011
BibRef
Deng, J.K.[Jian-Kang],
Zafeiriou, S.P.[Stefanos P.],
ArcFace for Disguised Face Recognition,
DFW19(485-493)
IEEE DOI
2004
face recognition, feature extraction, visual databases,
intra-class compactness, inter-class discrepancy,
Disguised Face Recognition
BibRef
Chen, W.[Weilun],
Zhang, Z.X.[Zhao-Xiang],
Hu, X.L.[Xiao-Lin],
Wu, B.Y.[Bao-Yuan],
Boosting Decision-based Black-box Adversarial Attacks with Random Sign
Flip,
ECCV20(XV:276-293).
Springer DOI
2011
BibRef
Wang, X.S.[Xiao-Sen],
Zhang, Z.L.[Ze-Liang],
Tong, K.H.[Kang-Heng],
Gong, D.H.[Di-Hong],
He, K.[Kun],
Li, Z.F.[Zhi-Feng],
Liu, W.[Wei],
Triangle Attack: A Query-Efficient Decision-Based Adversarial Attack,
ECCV22(V:156-174).
Springer DOI
2211
BibRef
Dong, Y.P.[Yin-Peng],
Su, H.[Hang],
Wu, B.Y.[Bao-Yuan],
Li, Z.F.[Zhi-Feng],
Liu, W.[Wei],
Zhang, T.[Tong],
Zhu, J.[Jun],
Efficient Decision-Based Black-Box Adversarial Attacks on Face
Recognition,
CVPR19(7706-7714).
IEEE DOI
2002
BibRef
Shao, R.[Rui],
Lan, X.Y.[Xiang-Yuan],
Li, J.W.[Jia-Wei],
Yuen, P.C.[Pong C.],
Multi-Adversarial Discriminative Deep Domain Generalization for Face
Presentation Attack Detection,
CVPR19(10015-10023).
IEEE DOI
2002
BibRef
Jia, S.[Shan],
Hu, C.B.[Chuan-Bo],
Guo, G.D.[Guo-Dong],
Xu, Z.Q.[Zheng-Quan],
A Database for Face Presentation Attack Using Wax Figure Faces,
NTIAP19(39-47).
Springer DOI
1909
BibRef
Debiasi, L.[Luca],
Damer, N.[Naser],
Saladié, A.M.[Alexandra Moseguí],
Rathgeb, C.[Christian],
Scherhag, U.[Ulrich],
Busch, C.[Christoph],
Kirchbuchner, F.[Florian],
Uhl, A.[Andreas],
On the Detection of GAN-Based Face Morphs Using Established Morph
Detectors,
CIAP19(II:345-356).
Springer DOI
1909
BibRef
Natsume, R.[Ryota],
Inoue, K.[Kazuki],
Fukuhara, Y.[Yoshihiro],
Yamamoto, S.[Shintaro],
Morishima, S.[Shigeo],
Kataoka, H.[Hirokatsu],
Understanding Fake Faces,
BrainDriven18(III:566-576).
Springer DOI
1905
BibRef
Damer, N.[Naser],
Boller, V.[Viola],
Wainakh, Y.[Yaza],
Boutros, F.[Fadi],
Terhörst, P.[Philipp],
Braun, A.[Andreas],
Kuijper, A.[Arjan],
Detecting Face Morphing Attacks by Analyzing the Directed Distances of
Facial Landmarks Shifts,
GCPR18(518-534).
Springer DOI
1905
BibRef
Dabouei, A.,
Taherkhani, F.,
Soleymani, S.,
Dawson, J.,
Nasrabadi, N.M.,
Boosting Deep Face Recognition via Disentangling Appearance and
Geometry,
WACV20(309-318)
IEEE DOI
2006
Face, Geometry, Face recognition, Training, Task analysis, Manifolds,
Loss measurement
BibRef
Dabouei, A.[Ali],
Soleymani, S.[Sobhan],
Dawson, J.[Jeremy],
Nasrabadi, N.M.[Nasser M.],
Fast Geometrically-Perturbed Adversarial Faces,
WACV19(1979-1988)
IEEE DOI
1904
face recognition, learning (artificial intelligence),
security of data,
Transforms
BibRef
Liu, J.,
Kumar, A.,
Detecting Presentation Attacks from 3D Face Masks Under Multispectral
Imaging,
DFW18(47-475)
IEEE DOI
1812
Face, Convolution,
Biometrics (access control), Lighting, Databases, Multispectral imaging
BibRef
Sharif, M.,
Baue, L.,
Reite, M.K.,
On the Suitability of Lp-Norms for Creating and Preventing
Adversarial Examples,
PRIV18(1686-16868)
IEEE DOI
1812
Machine learning, Measurement, Training, Cancer,
Object recognition, Face recognition
BibRef
Zhang, K.,
Chang, Y.,
Hsu, W.,
Deep Disguised Faces Recognition,
DFW18(32-324)
IEEE DOI
1812
Face recognition, Training, Testing, Feature extraction,
Principal component analysis, Training data, Pipelines
BibRef
Kohli, N.,
Yadav, D.,
Noore, A.,
Face Verification with Disguise Variations via Deep Disguise
Recognizer,
DFW18(17-177)
IEEE DOI
1812
Face, Databases, Face recognition, Training, Convolution, Image recognition
BibRef
Gupta, I.,
Bhalla, I.,
Singh, R.,
Vatsa, M.,
Scattering Transform for Matching Surgically Altered Face Images,
ICPR18(2215-2220)
IEEE DOI
1812
Surgery, Face, Scattering, Feature extraction,
Face recognition, Wavelet transforms
BibRef
Ming, Z.,
Chazalon, J.,
Muzzamil Luqman, M.,
Visani, M.,
Burie, J.,
FaceLiveNet: End-to-End Networks Combining Face Verification with
Interactive Facial Expression-Based Liveness Detection,
ICPR18(3507-3512)
IEEE DOI
1812
Face, Face recognition, Training, Task analysis, Authentication,
Protocols, Image recognition
BibRef
Liu, S.Q.[Si-Qi],
Lan, X.Y.[Xiang-Yuan],
Yuen, P.C.[Pong C.],
Remote Photoplethysmography Correspondence Feature for 3D Mask Face
Presentation Attack Detection,
ECCV18(XVI: 577-594).
Springer DOI
1810
BibRef
Lavrentyeva, G.[Galina],
Kudashev, O.[Oleg],
Melnikov, A.[Aleksandr],
de Marsico, M.[Maria],
Matveev, Y.[Yuri],
Interactive Photo Liveness for Presentation Attacks Detection,
ICIAR18(252-258).
Springer DOI
1807
BibRef
Paiz-Reyes, E.[Evelyn],
Nunes-de-Lima, N.[Nadile],
Ablanedo, J.[Jennie],
Fairchild, E.[Elaine],
Griffith, T.[Tami],
Rodeheffer, C.[Christopher],
Is This Person Real? Avatar Stylization and Its Influence on Human
Perception in a Counseling Training Environment,
VAMR18(I: 279-289).
Springer DOI
1807
BibRef
Damer, N.[Naser],
Dimitrov, K.[Kristiyan],
Practical View on Face Presentation Attack Detection,
BMVC16(xx-yy).
HTML Version.
1805
BibRef
Agarwal, A.,
Yadav, D.,
Kohli, N.,
Singh, R.,
Vatsa, M.,
Noore, A.,
Face Presentation Attack with Latex Masks in Multispectral Videos,
PBVS17(275-283)
IEEE DOI
1709
Databases, Face, Face recognition, Probes, Videos
BibRef
Zhou, P.[Peng],
Han, X.T.[Xin-Tong],
Morariu, V.I.[Vlad I.],
Davis, L.S.[Larry S.],
Two-Stream Neural Networks for Tampered Face Detection,
MedForen17(1831-1839)
IEEE DOI
1709
Cameras, Face, Feature extraction, Lighting, Streaming media,
Support vector machines, Transform coding
BibRef
Raghavendra, R.,
Raja, K.B.,
Venkatesh, S.,
Busch, C.,
Transferable Deep-CNN Features for Detecting Digital and
Print-Scanned Morphed Face Images,
MedForen17(1822-1830)
IEEE DOI
1709
Convolution, Databases, Face, Face detection, Face recognition,
Feature, extraction
BibRef
Peng, B.,
Wang, W.,
Dong, J.,
Tan, T.,
Position Determines Perspective:
Investigating Perspective Distortion for Image Forensics of Faces,
MedForen17(1813-1821)
IEEE DOI
1709
Cameras, Distortion, Estimation, Forensics, Solid modeling,
BibRef
Seibold, C.[Clemens],
Samek, W.[Wojciech],
Hilsmann, A.[Anna],
Eisert, P.[Peter],
Detection of Face Morphing Attacks by Deep Learning,
IWDW17(107-120).
Springer DOI
1708
BibRef
Wandzik, L.[Lukasz],
Garcia, R.V.[Raul Vicente],
Kaeding, G.[Gerald],
Chen, X.[Xi],
CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based
Face Recognition to Image Morphing,
IWDW17(121-135).
Springer DOI
1708
BibRef
Neubert, T.[Tom],
Face Morphing Detection: An Approach Based on Image Degradation
Analysis,
IWDW17(93-106).
Springer DOI
1708
BibRef
Nowara, E.M.,
Sabharwal, A.,
Veeraraghavan, A.,
PPGSecure: Biometric Presentation Attack Detection Using
Photopletysmograms,
FG17(56-62)
IEEE DOI
1707
Authentication, Blood, Color, Face, Feature extraction, Physiology, Skin
BibRef
Rudd, E.M.[Ethan M.],
Günther, M.,
Boult, T.E.[Terrance E.],
PARAPH: Presentation Attack Rejection by Analyzing Polarization
Hypotheses,
Biometrics16(171-178)
IEEE DOI
1612
BibRef
Melnikov, A.[Aleksandr],
Akhunzyanov, R.[Rasim],
Kudashev, O.[Oleg],
Luckyanets, E.[Eugene],
Audiovisual Liveness Detection,
CIAP15(II:643-652).
Springer DOI
1511
BibRef
Raghavendra, R.,
Busch, C.[Christoph],
Improved face recognition by combining information from multiple
cameras in Automatic Border Control system,
AVSS15(1-6)
IEEE DOI
1511
BibRef
Earlier:
Novel presentation attack detection algorithm for face recognition
system: Application to 3D face mask attack,
ICIP14(323-327)
IEEE DOI
1502
cameras.
Databases
BibRef
Liu, W.W.[Wei-Wen],
Face liveness detection using analysis of Fourier spectra based on
hair,
ICWAPR14(75-80)
IEEE DOI
1402
Accuracy
BibRef
Peng, J.Y.[Jun-Yan],
Chan, P.P.K.[Patrick P.K.],
Face liveness detection for combating the spoofing attack in face
recognition,
ICWAPR14(176-181)
IEEE DOI
1402
Accuracy
BibRef
Yang, L.B.[Li-Bin],
Face liveness detection by focusing on frontal faces and image
backgrounds,
ICWAPR14(93-97)
IEEE DOI
1402
BibRef
d'Souza, D.[Darryl],
Yampolskiy, R.V.[Roman V.],
Natural vs. Artificial Face Classification Using Uniform Local
Directional Patterns and Wavelet Uniform Local Directional Patterns,
Biometrics14(27-33)
IEEE DOI
1409
Avatars
BibRef
Wang, Y.Y.[Yue-Yang],
Hao, X.L.[Xiao-Li],
Hou, Y.[Yali],
Guo, C.Q.[Chang-Qing],
A New Multispectral Method for Face Liveness Detection,
ACPR13(922-926)
IEEE DOI
1408
face recognition
BibRef
Yan, J.J.[Jun-Jie],
Zhang, Z.W.[Zhi-Wei],
Lei, Z.[Zhen],
Yi, D.[Dong],
Li, S.Z.,
Face liveness detection by exploring multiple scenic clues,
ICARCV12(188-193).
IEEE DOI
1304
See also Face detection by structural models.
BibRef
Markovski, J.,
Reniers, M.A.,
An integrated state- and event-based framework for verifying liveness
in supervised systems,
ICARCV12(246-251).
IEEE DOI
1304
BibRef
Hu, H.[Hesuan],
Su, R.[Rong],
A novel approach to liveness supervision of AMS with assembly
operations using Petri nets,
ICARCV12(264-269).
IEEE DOI
1304
BibRef
Peixoto, B.[Bruno],
Michelassi, C.[Carolina],
Rocha, A.[Anderson],
Face liveness detection under bad illumination conditions,
ICIP11(3557-3560).
IEEE DOI
1201
BibRef
Sun, L.[Lin],
Huang, W.B.[Wai-Bin],
Wu, M.H.[Ming-Hui],
TIR/VIS Correlation for Liveness Detection in Face Recognition,
CAIP11(II: 114-121).
Springer DOI
1109
BibRef
Tan, X.Y.[Xiao-Yang],
Li, Y.[Yi],
Liu, J.[Jun],
Jiang, L.[Lin],
Face Liveness Detection from a Single Image with Sparse Low Rank
Bilinear Discriminative Model,
ECCV10(VI: 504-517).
Springer DOI
1009
BibRef
Bao, W.[Wei],
Li, H.[Hong],
Li, N.[Nan],
Jiang, W.[Wei],
A liveness detection method for face recognition based on optical flow
field,
IASP09(233-236).
IEEE DOI
0904
BibRef
Pan, G.[Gang],
Sun, L.[Lin],
Wu, Z.H.[Zhao-Hui],
Lao, S.H.[Shi-Hong],
Eyeblink-based Anti-Spoofing in Face Recognition from a Generic
Webcamera,
ICCV07(1-8).
IEEE DOI
0710
BibRef
Chapter on Face Recognition, Detection, Tracking, Gesture Recognition, Fingerprints, Biometrics continues in
Spoofing, Faces, Other Biometrics .