22.5.1.5 Liveness Detection, Spoofing, Presentation Attack, Faces, Other Biometrics

Chapter Contents (Back)
Application, Biometrics. Presentation Attack. Liveness. Disguised Faces. Very related:
See also Spoofing, Faces, Other Biometrics. Some related issues, forgery:
See also Face Forgery. And deepfakes:
See also Deepfakes, Face Synthesis, Fake News, Generation, Detection.
See also Liveness Detection, Spoofing, Presentation Attack, Faces, Other Biometrics.
See also Face Animation, Video Face Synthesis.
See also Liveness Detection, Spoofing, Fingerprint Recognition.

Kollreider, K.[Klaus], Fronthaler, H.[Hartwig], Bigun, J.[Josef],
Non-intrusive liveness detection by face images,
IVC(27), No. 3, February 2009, pp. 233-244.
Elsevier DOI 0804
BibRef
Earlier:
Verifying liveness by multiple experts in face biometrics,
Biometrics08(1-6).
IEEE DOI 0806
Face liveness; Liveness detection; Anti-spoofing measures; Optical flow; Motion of lines; Optical flow of lines; Orientation estimation; Face part models; Retinotopic vision; Local Gabor decomposition; Support vector machine classification BibRef

Zhang, Z.W.[Zhi-Wei], Yi, D.[Dong], Lei, Z.[Zhen], Li, S.Z.,
Regularized Transfer Boosting for Face Detection Across Spectrum,
SPLetters(19), No. 3, March 2012, pp. 131-134.
IEEE DOI 1202
BibRef

Zhang, Z.W.[Zhi-Wei], Yi, D.[Dong], Lei, Z.[Zhen], Li, S.Z.[Stan Z.],
Face Liveness Detection by Learning Multispectral Reflectance Distributions,
FG11(436-441).
IEEE DOI 1103
BibRef

de Freitas Pereira, T.[Tiago], Komulainen, J.[Jukka], Anjos, A.[Andre], de Martino, J.[Jose], Hadid, A.[Abdenour], Pietikainen, M.[Matti], Marcel, S.[Sebastien],
Face liveness detection using dynamic texture,
JIVP(2014), No. 1, 2014, pp. 2.
DOI Link 1402
BibRef

Komulainen, J.[Jukka], Hadid, A.[Abdenour], Pietikäinen, M.[Matti],
Face Spoofing Detection Using Dynamic Texture,
CVLBP12(I:146-157).
Springer DOI 1304
BibRef

Feng, Y.C.[Yi C.], Lim, M.H.[Meng-Hui], Yuen, P.C.[Pong C.],
Masquerade attack on transform-based binary-template protection based on perceptron learning,
PR(47), No. 9, 2014, pp. 3019-3033.
Elsevier DOI 1406
Masquerade attack BibRef

Bustard, J.D., Carter, J.N., Nixon, M.S., Hadid, A.,
Measuring and mitigating targeted biometric impersonation,
IET-Bio(3), No. 2, June 2014, pp. 55-61.
DOI Link 1407
BibRef

Kim, W., Suh, S., Han, J.,
Face Liveness Detection From a Single Image via Diffusion Speed Model,
IP(24), No. 8, August 2015, pp. 2456-2465.
IEEE DOI 1505
Face BibRef

Mohammadi, A.[Amir], Bhattacharjee, S.[Sushil], Marcel, S.[Sébastien],
Deeply vulnerable: a study of the robustness of face recognition to presentation attacks,
IET-Bio(7), No. 1, January 2018, pp. 15-26.
DOI Link 1712
BibRef

Alotaibi, A.[Aziz], Mahmood, A.[Ausif],
Deep face liveness detection based on nonlinear diffusion using convolution neural network,
SIViP(11), No. 4, May 2017, pp. 713-720.
WWW Link. 1704
BibRef

Xia, Z.Q.[Zhao-Qiang], Peng, X.L.[Xian-Lin], Feng, X.Y.[Xiao-Yi], Hadid, A.[Abdenour],
Scarce face recognition via two-layer collaborative representation,
IET-Bio(7), No. 1, January 2018, pp. 56-62.
DOI Link 1712
BibRef

Gomez-Barrero, M.[Marta], Rathgeb, C.[Christian], Scherhag, U.[Ulrich], Busch, C.[Christoph],
Predicting the vulnerability of biometric systems to attacks based on morphed biometric information,
IET-Bio(7), No. 4, July 2018, pp. 333-341.
DOI Link 1807
BibRef

Hamdan, B.[Bensenane], Mokhtar, K.[Keche],
A self-immune to 3D masks attacks face recognition system,
SIViP(12), No. 6, September 2018, pp. 1053-1060.
WWW Link. 1808
BibRef

Chen, L.Y.[Ling-Ying], Zhao, G.H.[Guang-Hui], Zhou, J.W.[Jun-Wei], Ho, A.T.S.[Anthony T.S.], Cheng, L.M.[Lee-Ming],
Face template protection using deep LDPC codes learning,
IET-Bio(8), No. 3, May 2019, pp. 190-197.
DOI Link 1904
BibRef

Goswami, G.[Gaurav], Agarwal, A.[Akshay], Ratha, N.[Nalini], Vatsa, M.[Mayank],
Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition,
IJCV(127), No. 6-7, June 2019, pp. 719-742.
Springer DOI 1906
BibRef

Camińa, J.B.[José Benito], Medina-Pérez, M.A.[Miguel Angel], Monroy, R.[Raúl], Loyola-González, O.[Octavio], Villanueva, L.A.P.[Luis Angel Pereyra], González Gurrola, L.C.[Luis Carlos],
Bagging-RandomMiner: A one-class classifier for file access-based masquerade detection,
MVA(30), No. 5, July 2019, pp. 959-974.
Springer DOI 1907
BibRef

Yu, C.Y.[Chang-Yong], Yao, C.T.[Cheng-Tang], Pei, M.T.[Ming-Tao], Jia, Y.D.[Yun-De],
Diffusion-based kernel matrix model for face liveness detection,
IVC(89), 2019, pp. 88-94.
Elsevier DOI 1909
Face liveness detection, Anisotropic diffusion, Kernel matrix model, DK feature BibRef

Chen, F.M.[Fu-Mei], Wen, C.[Chang], Xie, K.[Kai], Wen, F.Q.[Fang-Qing], Sheng, G.Q.[Guan-Qun], Tang, X.G.[Xin-Gong],
Face liveness detection: fusing colour texture feature and deep feature,
IET-Bio(8), No. 6, November 2019, pp. 369-377.
DOI Link 1911
BibRef

Jia, S.[Shan], Guo, G.D.[Guo-Dong], Xu, Z.Q.[Zheng-Quan], Wang, Q.C.[Qiang-Chang],
Face presentation attack detection in mobile scenarios: A comprehensive evaluation,
IVC(93), 2020, pp. 103826.
Elsevier DOI 2001
Face presentation attack, Face recognition, Performance evaluation, Biometrics BibRef

Peng, F.[Fei], Qin, L.[Le], Long, M.[Min],
Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning,
JVCIR(66), 2020, pp. 102746.
Elsevier DOI 2003
Presentation attack detection, Face recognition, Color distortion, Ensemble learning BibRef

Bresan, R.[Rodrigo], Beluzo, C.[Carlos], Carvalho, T.[Tiago],
Exposing Presentation Attacks by a Combination of Multi-intrinsic Image Properties, Convolutional Networks and Transfer Learning,
ACIVS20(153-165).
Springer DOI 2003
BibRef

Raj, S.[Sunny], Pannu, J.S.[Jodh S.], Fernandes, S.L.[Steven L.], Ramanathan, A.[Arvind], Pullum, L.L.[Laura L.], Jha, S.K.[Sumit K.],
Attacking NIST biometric image software using nonlinear optimization,
PRL(131), 2020, pp. 79-84.
Elsevier DOI 2004
NIST biometric image software, MINDTCT, BOZORTH3, NLopt BibRef

Ma, Y.[Yukun], Wu, L.[Lifang], Li, Z.[Zeyu], liu, F.[Fanghao],
A novel face presentation attack detection scheme based on multi-regional convolutional neural networks,
PRL(131), 2020, pp. 261-267.
Elsevier DOI 2004
Face presentation attack detection, Adversarial examples, Local classification loss, Multi-regional convolutional neural networks BibRef

Li, L.[Lei], Xia, Z.Q.[Zhao-Qiang], Jiang, X.Y.[Xiao-Yue], Ma, Y.P.[Yu-Peng], Roli, F.[Fabio], Feng, X.Y.[Xiao-Yi],
3D face mask presentation attack detection based on intrinsic image analysis,
IET-Bio(9), No. 3, May 2020, pp. 100-108.
DOI Link 2005
BibRef

Rathgeb, C.[Christian], Botaljov, A.[Angelika], Stockhardt, F.[Fabian], Isadskiy, S.[Sergey], Debiasi, L.[Luca], Uhl, A.[Andreas], Busch, C.[Christoph],
PRNU-based detection of facial retouching,
IET-Bio(9), No. 4, July 2020, pp. 154-164.
DOI Link 2006
BibRef

Peng, F., Yin, L.P., Zhang, L.B., Long, M.,
CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network,
MultMed(22), No. 10, October 2020, pp. 2511-2525.
IEEE DOI 2009
Feature extraction, Detectors, Forensics, Image color analysis, Convolution, Histograms, Generative adversarial networks, computer-generated graphics (CG) detector BibRef

Scherhag, U.[Ulrich], Kunze, J.[Jonas], Rathgeb, C.[Christian], Busch, C.[Christoph],
Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach,
IET-Bio(9), No. 6, November 2020, pp. 278-289.
DOI Link 2010
BibRef

Massoli, F.V.[Fabio Valerio], Carrara, F.[Fabio], Amato, G.[Giuseppe], Falchi, F.[Fabrizio],
Detection of Face Recognition Adversarial Attacks,
CVIU(202), 2021, pp. 103103.
Elsevier DOI 2012
Deep Learning, Face Recognition, Adversarial attacks, Adversarial detection, Adversarial biometrics BibRef

Guo, Z.Q.[Zhi-Qing], Yang, G.B.[Gao-Bo], Chen, J.Y.[Ji-You], Sun, X.M.[Xing-Ming],
Fake face detection via adaptive manipulation traces extraction network,
CVIU(204), 2021, pp. 103170.
Elsevier DOI 2102
Face image manipulation, Passive image forensics, Manipulation traces extraction BibRef

Guo, W.[Wei], Tondi, B.[Benedetta], Barni, M.[Mauro],
A Master Key backdoor for universal impersonation attack against DNN-based face verification,
PRL(144), 2021, pp. 61-67.
Elsevier DOI 2103
Backdoor attacks to CNN, Face verification, Biometric security, Presentation attacks, Adversarial machine learning BibRef

Wang, Y.W.[Yong-Wei], Ding, X.[Xin], Yang, Y.X.[Yi-Xin], Ding, L.[Li], Ward, R.[Rabab], Wang, Z.J.[Z. Jane],
Perception matters: Exploring imperceptible and transferable anti-forensics for GAN-generated fake face imagery detection,
PRL(146), 2021, pp. 15-22.
Elsevier DOI 2105
Fake face imagery anti-forensics, Imperceptible attacks, Transferable attacks, Improved adversarial attack BibRef

Bisogni, C.[Carmen], Cascone, L.[Lucia], Dugelay, J.L.[Jean-Luc], Pero, C.[Chiara],
Adversarial attacks through architectures and spectra in face recognition,
PRL(147), 2021, pp. 55-62.
Elsevier DOI 2106
Adversarial Attack, Deep Neural Networks, White-Box Attack, Black-Box Attack, Near Infrared Images, Thermal Images BibRef

Ngô, L.M.[Lę Minh], Wang, W.[Wei], Mandira, B.[Burak], Karaoglu, S.[Sezer], Bouma, H.[Henri], Dibeklioglu, H.[Hamdi], Gevers, T.[Theo],
Identity Unbiased Deception Detection by 2D-to-3D Face Reconstruction,
WACV21(145-154)
IEEE DOI 2106
Video sequences, Pipelines, Feature extraction, Real-time systems, Magnetic heads, Reliability, Convolutional neural networks BibRef

Hofbauer, H.[Heinz], Debiasi, L.[Luca], Kränkl, S.[Susanne], Uhl, A.[Andreas],
Exploring presentation attack vulnerability and usability of face recognition systems,
IET-Bio(10), No. 2, 2021, pp. 219-232.
DOI Link 2106
BibRef

Bonomi, M.[Mattia], Pasquini, C.[Cecilia], Boato, G.[Giulia],
Dynamic texture analysis for detecting fake faces in video sequences,
JVCIR(79), 2021, pp. 103239.
Elsevier DOI 2109
Manipulated videos, Deepfakes, Video forensics, Local Derivative Patterns BibRef

González-Soler, L.J.[Lázaro J.], Gomez-Barrero, M.[Marta], Busch, C.[Christoph],
On the generalisation capabilities of Fisher vector-based face presentation attack detection,
IET-Bio(10), No. 5, 2021, pp. 480-496.
DOI Link 2109
BibRef

Arashloo, S.R.[Shervin Rahimzadeh],
Unseen Face Presentation Attack Detection Using Sparse Multiple Kernel Fisher Null-Space,
CirSysVideo(31), No. 10, October 2021, pp. 4084-4095.
IEEE DOI 2110
Faces, Kernel, Face recognition, Training, Anomaly detection, Task analysis, Support vector machines, sparse regularisation BibRef

Peng, F.[Fei], Meng, S.H.[Shao-Hua], Long, M.[Min],
Presentation attack detection based on two-stream vision transformers with self-attention fusion,
JVCIR(85), 2022, pp. 103518.
Elsevier DOI 2205
Presentation attack detection, Multi-scale retinex with color restoration, Feature fusion BibRef

Khalid, S.S.[Syed Safwan], Awais, M.[Muhammad], Feng, Z.H.[Zhen-Hua], Chan, C.H.[Chi-Ho], Farooq, A.[Ammarah], Akbari, A.[Ali], Kittler, J.V.[Josef V.],
NPT-Loss: Demystifying Face Recognition Losses With Nearest Proxies Triplet,
PAMI(45), No. 12, December 2023, pp. 15249-15259.
IEEE DOI 2311
BibRef

Peng, F.[Fei], Qin, L.[Le], Long, M.[Min],
Face morphing attack detection and attacker identification based on a watchlist,
SP:IC(107), 2022, pp. 116748.
Elsevier DOI 2208
Automated border control, Face verification, Morphing attacks, Morphing attack detection, Watchlist BibRef

Raja, K.[Kiran], Gupta, G.[Gourav], Venkatesh, S.[Sushma], Ramachandra, R.[Raghavendra], Busch, C.[Christoph],
Towards generalized morphing attack detection by learning residuals,
IVC(126), 2022, pp. 104535.
Elsevier DOI 2209
Morphing attacks, Morphing attack detection, Face recognition, Vulnerability of biometric systems BibRef

Fu, B.Y.[Bi-Ying], Damer, N.[Naser],
Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality,
IET-Bio(11), No. 5, 2022, pp. 359-382.
DOI Link 2210
BibRef

Mudgalgundurao, R.[Raghavendra], Schuch, P.[Patrick], Raja, K.[Kiran], Ramachandra, R.[Raghavendra], Damer, N.[Naser],
Pixel-wise supervision for presentation attack detection on identity document cards,
IET-Bio(11), No. 5, 2022, pp. 383-395.
DOI Link 2210
BibRef

Rezgui, Z.[Zohra], Bassit, A.[Amina], Veldhuis, R.[Raymond],
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation,
IET-Bio(11), No. 5, 2022, pp. 407-419.
DOI Link 2210
adversarial attacks, face recognition, gender classification, privacy protection BibRef

Zheng, X.[Xin], Fan, Y.B.[Yan-Bo], Wu, B.Y.[Bao-Yuan], Zhang, Y.[Yong], Wang, J.[Jue], Pan, S.R.[Shi-Rui],
Robust Physical-World Attacks on Face Recognition,
PR(133), 2023, pp. 109009.
Elsevier DOI 2210
Physical-world adversarial attack, Face recognition, Environmental variations, Curriculum learning BibRef

Zhang, W.T.[Wen-Tian], Liu, H.Z.[Hao-Zhe], Liu, F.[Feng], Ramachandra, R.[Raghavendra], Busch, C.[Christoph],
Effective Presentation Attack Detection Driven by Face Related Task,
ECCV22(V:408-423).
Springer DOI 2211
BibRef

Marcialis, G.L.[Gian Luca], Liu, X.M.[Xiao-Ming], Didaci, L.[Luca],
Biometric presentation attacks: Handcrafted features versus deep learning approaches,
PRL(163), 2022, pp. 55-56.
Elsevier DOI 2212
BibRef

Wang, C.X.[Cai-Xun], Yu, B.Y.[Bing-Yao], Zhou, J.[Jie],
A Learnable Gradient operator for face presentation attack detection,
PR(135), 2023, pp. 109146.
Elsevier DOI 2212
Face presentation attack detection, Learnable gradient operator, Depth-supervised network BibRef

Zhang, H.T.[Hai-Tao], Chen, B.[Beijing], Wang, J.W.[Jin-Wei], Zhao, G.Y.[Guo-Ying],
A Local Perturbation Generation Method for GAN-Generated Face Anti-Forensics,
CirSysVideo(33), No. 2, February 2023, pp. 661-676.
IEEE DOI 2302
Faces, Detectors, Perturbation methods, Forensics, Visualization, Face recognition, Generative adversarial networks, double mask BibRef

Zhang, D.H.[Dong-Heng], Meng, J.[Jia], Zhang, J.[Jian], Deng, X.Z.[Xin-Zhe], Ding, S.H.[Shou-Hong], Zhou, M.[Man], Wang, Q.[Qian], Li, Q.[Qi], Chen, Y.[Yan],
SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices,
CirSysVideo(33), No. 8, August 2023, pp. 4401-4414.
IEEE DOI 2308
Ultrasonic imaging, Lips, Faces, Hardware, Mobile handsets, Face recognition, Authentication, Liveness detection, information fusion BibRef

Hu, C.[Cong], Li, Y.B.[Yuan-Bo], Feng, Z.H.[Zhen-Hua], Wu, X.J.[Xiao-Jun],
Attention-guided evolutionary attack with elastic-net regularization on face recognition,
PR(143), 2023, pp. 109760.
Elsevier DOI 2310
Face recognition, Convolutional neural networks, Adversarial examples, Evolutionary attack, Attention mechanisms BibRef

Shahreza, H.O.[Hatef Otroshi], Marcel, S.[Sébastien],
Comprehensive Vulnerability Evaluation of Face Recognition Systems to Template Inversion Attacks via 3D Face Reconstruction,
PAMI(45), No. 12, December 2023, pp. 14248-14265.
IEEE DOI 2311
BibRef
And:
Template Inversion Attack against Face Recognition Systems using 3D Face Reconstruction,
ICCV23(19605-19615)
IEEE DOI Code:
WWW Link. 2401
BibRef

Fang, M.L.[Mei-Ling], Yang, W.[Wufei], Kuijper, A.[Arjan], S?truc, V.[Vitomir], Damer, N.[Naser],
Fairness in face presentation attack detection,
PR(147), 2024, pp. 110002.
Elsevier DOI 2312
Face presentation attack detection, Fairness assessment, Bias mitigation BibRef

Qi, H.[Hongda], Wang, J.L.[Jun-Li], Yan, C.[Chungang], Jiang, C.J.[Chang-Jun],
The Probabilistic Liveness Decision Method of Unbounded Petri Nets Based on Machine Learning,
SMCS(54), No. 2, February 2024, pp. 1070-1081.
IEEE DOI 2402
System recovery, Feature extraction, Machine learning, Probabilistic logic, Petri nets, Logic gates, Convolution, unbounded Petri nets (UPN) BibRef


Aravena, C.[Carlos], Pasmińo, D.[Diego], Tapia, J.[Juan], Busch, C.[Christoph],
Face Image Quality Estimation on Presentation Attack Detection,
CIARP23(I:358-373).
Springer DOI 2312
BibRef

Li, Q.[Qian], Hu, Y.X.[Yu-Xiao], Liu, Y.[Ye], Zhang, D.X.[Dong-Xiao], Jin, X.[Xin], Chen, Y.T.[Yun-Tian],
Discrete Point-Wise Attack is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition,
CVPR23(20575-20584)
IEEE DOI 2309
BibRef

Li, Y.J.[Yan-Jie], Li, Y.[Yiquan], Dai, X.L.[Xue-Long], Guo, S.T.[Song-Tao], Xiao, B.[Bin],
Physical-World Optical Adversarial Attacks on 3D Face Recognition,
CVPR23(24699-24708)
IEEE DOI 2309
BibRef

Li, Z.X.[Ze-Xin], Yin, B.[Bangjie], Yao, T.P.[Tai-Ping], Guo, J.F.[Jun-Feng], Ding, S.H.[Shou-Hong], Chen, S.[Simin], Liu, C.[Cong],
Sibling-Attack: Rethinking Transferable Adversarial Attacks against Face Recognition,
CVPR23(24626-24637)
IEEE DOI 2309
BibRef

Shamshad, F.[Fahad], Srivatsan, K.[Koushik], Nandakumar, K.[Karthik],
Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces,
CVPR23(16469-16478)
IEEE DOI 2309
BibRef

Mundra, S.[Shivansh], Porcile, G.J.A.[Gonzalo J. Aniano], Marvaniya, S.[Smit], Verbus, J.R.[James R.], Farid, H.[Hany],
Exposing GAN-Generated Profile Photos from Compact Embeddings,
WMF23(884-892)
IEEE DOI 2309
BibRef

Deb, D.[Debayan], Liu, X.M.[Xiao-Ming], Jain, A.K.[Anil K.],
FaceGuard: A Self-Supervised Defense Against Adversarial Face Images,
FG23(1-8)
IEEE DOI 2303
Training, Codes, Purification, Face recognition, Perturbation methods, Gesture recognition BibRef

Thakral, K.[Kartik], Mittal, S.[Surbhi], Vatsa, M.[Mayank], Singh, R.[Richa],
PhygitalNet: Unified Face Presentation Attack Detection via One-Class Isolation Learning,
FG23(1-6)
IEEE DOI 2303
Training, Face recognition, Biological system modeling, Gesture recognition, Performance gain, Classification algorithms, Faces BibRef

Shmelkin, R.[Ron], Friedlander, T.[Tomer], Wolf, L.[Lior],
Generating Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution,
FG21(01-08)
IEEE DOI 2303
Dictionaries, Face recognition, Sociology, Neural networks, Gesture recognition, Evolutionary computation BibRef

Vepakomma, P.[Praneeth], Singh, A.[Abhishek], Zhang, E.[Emily], Gupta, O.[Otkrist], Raskar, R.[Ramesh],
NoPeek-Infer: Preventing face reconstruction attacks in distributed inference after on-premise training,
FG21(1-8)
IEEE DOI 2303
Training, Privacy, Correlation, Computational modeling, Distributed databases, Machine learning, Predictive models BibRef

Shao, R.[Rui], Zhang, B.[Bochao], Yuen, P.C.[Pong C.], Patel, V.M.[Vishal M.],
Federated Test-Time Adaptive Face Presentation Attack Detection with Dual-Phase Privacy Preservation,
FG21(1-8)
IEEE DOI 2303
Training, Adaptation models, Data privacy, Data centers, Face recognition, Soft sensors, Predictive models BibRef

Hamblin, J.[Jennifer], Nikhal, K.[Kshitij], Riggan, B.S.[Benjamin S.],
Understanding Cross Domain Presentation Attack Detection for Visible Face Recognition,
FG21(1-8)
IEEE DOI 2303
Training, Costs, Protocols, Shape, Face recognition, Transforms, Sensor systems BibRef

Mirzaalian, H.[Hengameh], Hussein, M.E.[Mohamed E.], Spinoulas, L.[Leonidas], May, J.[Jonathan], Abd-Almageed, W.[Wael],
Explaining Face Presentation Attack Detection Using Natural Language,
FG21(1-8)
IEEE DOI 2303
Training, Face recognition, Biological system modeling, Natural languages, Semantics, Neural networks, Predictive models BibRef

Deb, D.[Debayan], Liu, X.M.[Xiao-Ming], Jain, A.K.[Anil K.],
Unified Detection of Digital and Physical Face Attacks,
FG23(1-8)
IEEE DOI 2303
Codes, Face recognition, Gesture recognition, Detectors, Multitasking, Faces BibRef

Wang, H.R.[Han-Rui], Wang, S.[Shuo], Jin, Z.[Zhe], Wang, Y.D.[Yan-Dan], Chen, C.J.[Cun-Jian], Tistarelli, M.[Massimo],
Similarity-based Gray-box Adversarial Attack Against Deep Face Recognition,
FG21(1-8)
IEEE DOI 2303
Resistance, Data privacy, Databases, Face recognition, Authentication, Gesture recognition BibRef

Al-Refai, R.[Rouqaiah], Nandakumar, K.[Karthik],
A Unified Model for Face Matching and Presentation Attack Detection using an Ensemble of Vision Transformer Features,
BioAttack23(662-671)
IEEE DOI 2302
Deep learning, Face recognition, Conferences, Neural networks, Feature extraction, Transformers, Multitasking BibRef

Rathgeb, C., Nichols, R., Ibsen, M., Drozdowski, P., Busch, C.,
Crowd-Powered Face Manipulation Detection: Fusing Human Examiner Decisions,
ICIP22(181-185)
IEEE DOI 2211
Image analysis, Forensics, Reliability, Task analysis, Faces, Image forensics, manipulation detection, information fusion, human examiners BibRef

Ming, Z.H.[Zu-Heng], Yu, Z.T.[Zi-Tong], Al-Ghadi, M.[Musab], Visani, M.[Muriel], Luqman, M.M.[Muhammad Muzzamil], Burie, J.C.[Jean-Christophe],
Vitranspad: Video Transformer Using Convolution And Self-Attention For Face Presentation Attack Detection,
ICIP22(4248-4252)
IEEE DOI 2211
Convolution, Biometrics (access control), Computational modeling, Neural networks, Transformers, Task analysis, face presentation attack detection BibRef

Guetta, N., Shabtai, A., Singh, I., Momiyama, S., Elovici, Y.,
Dodging Attack Using Carefully Crafted Natural Makeup,
Ben-Gurion Universityof the Negev, 14 Sep 2021
WWW Link. BibRef 2109

Mayer, J.[Jillian],
MakeUp Tutorial: How To Hide From Cameras,
YouTubeMay 30, 2013,
WWW Link. BibRef 1305

Cauli, N.[Nino], Ortis, A.[Alessandro], Battiato, S.[Sebastiano],
Fooling a Face Recognition System with a Marker-Free Label-Consistent Backdoor Attack,
CIAP22(II:176-185).
Springer DOI 2205
BibRef

Padnevych, R.[Ruslan], Carmo, D.[David], Semedo, D.[David], Magalhăes, J.[Joăo],
Temporal Convolutional Networks for Robust Face Liveness Detection,
IbPRIA22(255-267).
Springer DOI 2205
BibRef

Rostami, M.[Mohammad], Spinoulas, L.[Leonidas], Hussein, M.[Mohamed], Mathai, J.[Joe], Abd-Almageed, W.[Wael],
Detection and Continual Learning of Novel Face Presentation Attacks,
ICCV21(14831-14840)
IEEE DOI 2203
Training, Deep learning, Pollution, Neural networks, Training data, Benchmark testing, Machine learning architectures and formulations BibRef

Byun, J.[Junyoung], Go, H.[Hyojun], Kim, C.[Changick],
Geometrically Adaptive Dictionary Attack on Face Recognition,
WACV22(3809-3818)
IEEE DOI 2202
Limiting, Dictionaries, Perturbation methods, Face recognition, Semantics, Search problems, Adversarial Attack and Defense Methods Deep Learning BibRef

Singh, I.[Inderjeet], Araki, T.[Toshinori], Kakizaki, K.[Kazuya],
Powerful Physical Adversarial Examples Against Practical Face Recognition Systems,
BioAttack22(301-310)
IEEE DOI 2202
Face recognition, Conferences, Machine learning, Performance gain, Complexity theory, Risk management BibRef

Neto, P.C.[Pedro C.], Sequeira, A.F.[Ana F.], Cardoso, J.S.[Jaime S.],
Myope Models: Are face presentation attack detection models short-sighted?,
Explain-Bio22(390-399)
IEEE DOI 2202
Training, Analytical models, Error analysis, Crops, Predictive models, Visual systems, Inspection BibRef

Fang, M.L.[Mei-Ling], Damer, N.[Naser], Kirchbuchner, F.[Florian], Kuijper, A.[Arjan],
Learnable Multi-level Frequency Decomposition and Hierarchical Attention Mechanism for Generalized Face Presentation Attack Detection,
WACV22(1131-1140)
IEEE DOI 2202
Training, Fuses, Frequency-domain analysis, Face recognition, Semantics, Neural networks, Streaming media, Biometrics Biometrics -> Face Processing BibRef

Aghdaie, P.[Poorya], Chaudhary, B.[Baaria], Soleymani, S.[Sobhan], Dawson, J.[Jeremy], Nasrabadi, N.M.[Nasser M.],
Morph Detection Enhanced by Structured Group Sparsity,
BioAttack22(311-320)
IEEE DOI 2202
Training, Visualization, Wavelet domain, Face recognition, Neural networks, Detectors, Feature extraction BibRef

Ghafourian, M.[Mahdi], Fierrez, J.[Julian], Vera-Rodriguez, R.[Ruben], Serna, I.[Ignacio], Morales, A.[Aythami],
OTB-morph: One-Time Biometrics via Morphing applied to Face Templates,
BioAttack22(321-329)
IEEE DOI 2202
Visualization, Face recognition, Conferences, Aging, Servers, Cryptography BibRef

Ramachandra, R.[Raghavendra], Raja, K.[Kiran], Busch, C.[Christoph],
Algorithmic Fairness in Face Morphing Attack Detection,
Perform-Bio22(410-418)
IEEE DOI 2202
Measurement, Ethics, Protocols, Law, Face recognition, Conferences, Training data BibRef

Fatemifar, S.[Soroush], Awais, M.[Muhammad], Akbari, A.[Ali], Kittler, J.V.[Josef V.],
Particle Swarm and Pattern Search Optimisation of An Ensemble of Face Anomaly Detectors,
ICIP21(3622-3626)
IEEE DOI 2201
Databases, Optimization methods, Detectors, Learning (artificial intelligence), Feature extraction, Deep Learning BibRef

Luo, Z.B.[Zheng-Bo], Kamata, S.I.[Sei-Ichiro], Sun, Z.T.[Zi-Tang],
Transformer and Node-Compressed DNN Based Dual-Path System for Manipulated Face Detection,
ICIP21(3882-3886)
IEEE DOI 2201
Learning systems, Deep learning, Visualization, Image processing, Pipelines, Neural networks, Ordinary differential equations, face manipulation BibRef

Yao, C.L.[Cheng-Lin], Wang, S.[Shihe], Zhang, J.[Jialu], He, W.T.[Wen-Tao], Du, H.[Heshan], Ren, J.F.[Jian-Feng], Bai, R.B.[Rui-Bin], Liu, J.[Jiang],
rPPG-Based Spoofing Detection for Face Mask Attack using Efficientnet on Weighted Spatial-Temporal Representation,
ICIP21(3872-3876)
IEEE DOI 2201
Image processing, Resists, Photoplethysmography, Distortion, Spatial databases, Noise measurement, Face spoofing detection, spatial-temporal representation BibRef

Damer, N.[Naser], Raja, K.[Kiran], Süßmilch, M.[Marius], Venkatesh, S.[Sushma], Boutros, F.[Fadi], Fang, M.L.[Mei-Ling], Kirchbuchner, F.[Florian], Ramachandra, R.[Raghavendra], Kuijper, A.[Arjan],
ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation,
ISVC21(I:251-264).
Springer DOI 2112
BibRef

Damer, N.[Naser], Spiller, N.[Noémie], Fang, M.L.[Mei-Ling], Boutros, F.[Fadi], Kirchbuchner, F.[Florian], Kuijper, A.[Arjan],
PW-MAD: Pixel-Wise Supervision for Generalized Face Morphing Attack Detection,
ISVC21(I:291-304).
Springer DOI 2112
BibRef

Xu, X.[Xiang], Xiong, Y.J.[Yuan-Jun], Xia, W.[Wei],
On Improving Temporal Consistency for Online Face Liveness Detection System,
ChaLearnFAS21(824-833)
IEEE DOI 2112
Training, Adaptation models, Uncertainty, Face recognition, Computational modeling, Conferences BibRef

Fang, H.[Hao], Liu, A.[Ajian], Wan, J.[Jun], Escalera, S.[Sergio], Escalante, H.J.[Hugo Jair], Lei, Z.[Zhen],
Surveillance Face Presentation Attack Detection Challenge,
ChaLearnFAS23(6361-6371)
IEEE DOI 2309
BibRef

Liu, A.[Ajian], Zhao, C.X.[Chen-Xu], Yu, Z.T.[Zi-Tong], Su, A.Y.[An-Yang], Liu, X.[Xing], Kong, Z.J.[Zi-Jian], Wan, J.[Jun], Escalera, S.[Sergio], Escalante, H.J.[Hugo Jair], Lei, Z.[Zhen], Guo, G.D.[Guo-Dong],
3D High-Fidelity Mask Face Presentation Attack Detection Challenge,
ChaLearnFAS21(814-823)
IEEE DOI 2112
Measurement, Protocols, Face recognition, Companies BibRef

Chen, S.[Shen], Yao, T.P.[Tai-Ping], Zhang, K.Y.[Ke-Yue], Chen, Y.[Yang], Sun, K.[Ke], Ding, S.H.[Shou-Hong], Li, J.L.[Ji-Lin], Huang, F.Y.[Fei-Yue], Ji, R.R.[Rong-Rong],
A Dual-stream Framework for 3D Mask Face Presentation Attack Detection,
ChaLearnFAS21(834-841)
IEEE DOI 2112
Degradation, Smoothing methods, Convolution, Face recognition, Conferences BibRef

Grinchuk, O.[Oleg], Parkin, A.[Aleksandr], Glazistova, E.[Evgenija],
3D mask presentation attack detection via high resolution face parts,
ChaLearnFAS21(846-853)
IEEE DOI 2112
Training, Deep learning, Data mining, Faces BibRef

Wenger, E.[Emily], Passananti, J.[Josephine], Bhagoji, A.N.[Arjun Nitin], Yao, Y.S.[Yuan-Shun], Zheng, H.T.[Hai-Tao], Zhao, B.Y.[Ben Y.],
Backdoor Attacks Against Deep Learning Systems in the Physical World,
CVPR21(6202-6211)
IEEE DOI 2111
Deep learning, Face recognition, Robustness, Task analysis, Facial features BibRef

Chaudhary, B.[Baaria], Aghdaie, P.[Poorya], Soleymani, S.[Sobhan], Dawson, J.[Jeremy], Nasrabadi, N.M.[Nasser M.],
Differential Morph Face Detection using Discriminative Wavelet Sub-bands,
Biometrics21(1425-1434)
IEEE DOI 2109
Training, Wavelet domain, Protocols, Face recognition, Frequency-domain analysis, Neural networks, Entropy BibRef

Sabel, J.[Johan], Johansson, F.[Fredrik],
On the Robustness and Generalizability of Face Synthesis Detection Methods,
WMF21(962-971)
IEEE DOI 2109
Training, Learning systems, Perturbation methods, Face recognition, Robustness BibRef

Mallat, K.[Khawla], Dugelay, J.L.[Jean-Luc],
Indirect synthetic attack on thermal face biometric systems via visible-to-thermal spectrum conversion,
Biometrics21(1435-1443)
IEEE DOI 2109
Error analysis, Social networking (online), Face recognition, Communication channels, Thermal sensors BibRef

Soleymani, S.[Sobhan], Dabouei, A.[Ali], Taherkhani, F.[Fariborz], Dawson, J.[Jeremy], Nasrabadi, N.M.[Nasser M.],
Mutual Information Maximization on Disentangled Representations for Differential Morph Detection,
WACV21(1730-1740)
IEEE DOI 2106
Faces, Mutual information BibRef

Sanghvi, N.[Nilay], Singh, S.K.[Sushant Kumar], Agarwal, A.[Akshay], Vatsa, M.[Mayank], Singh, R.[Richa],
MixNet for Generalized Face Presentation Attack Detection,
ICPR21(5511-5518)
IEEE DOI 2105
Databases, Face recognition, Distance measurement, Reliability, Convolutional neural networks, Detection algorithms BibRef

Komkov, S.[Stepan], Petiushko, A.[Aleksandr],
AdvHat: Real-World Adversarial Attack on ArcFace Face ID System,
ICPR21(819-826)
IEEE DOI 2105
Image color analysis, Face recognition, Printers BibRef

Zhang, Y.G.[Yu-Ge], Zhao, M.[Min], Yan, L.B.[Long-Bin], Gao, T.D.[Tian-De], Chen, J.[Jie],
CNN-Based Anomaly Detection for Face Presentation Attack Detection with Multi-Channel Images,
VCIP20(189-192)
IEEE DOI 2102
Face recognition, Feature extraction, Faces, Anomaly detection, Training, Task analysis, Neural networks, multi-channel CNN BibRef

Kotwal, K., Marcel, S.,
CNN Patch Pooling for Detecting 3D Mask Presentation Attacks in NIR,
ICIP20(1336-1340)
IEEE DOI 2011
Biometrics, Face Presentation Attack Detection, 3D Mask Attacks, Patch Pooling Layer BibRef

Wang, S., Wang, O., Zhang, R., Owens, A., Efros, A.A.,
CNN-Generated Images Are Surprisingly Easy to Spot… for Now,
CVPR20(8692-8701)
IEEE DOI 2008
Training, Image generation, Face, Image resolution, Detectors, Generators BibRef

Liu, Z., Qi, X., Torr, P.H.S.,
Global Texture Enhancement for Fake Face Detection in the Wild,
CVPR20(8057-8066)
IEEE DOI 2008
Face, Skin, Face detection, Robustness, Image color analysis, Training BibRef

Wang, G., Han, H., Shan, S., Chen, X.,
Cross-Domain Face Presentation Attack Detection via Multi-Domain Disentangled Representation Learning,
CVPR20(6677-6686)
IEEE DOI 2008
Face, Robustness, Testing, Task analysis, Training, Machine learning BibRef

Nguyen, D., Arora, S.S., Wu, Y., Yang, H.,
Adversarial Light Projection Attacks on Face Recognition Systems: A Feasibility Study,
Biometrics20(3548-3556)
IEEE DOI 2008
Face recognition, Cameras, Face, Calibration, Real-time systems, Target recognition BibRef

Liu, S., Lan, X., Yuen, P.C.,
Temporal Similarity Analysis of Remote Photoplethysmography for Fast 3D Mask Face Presentation Attack Detection,
WACV20(2597-2605)
IEEE DOI 2006
Face, Heart beat, Cameras, Lighting, Skin, Time-domain analysis BibRef

Venkatesh, S., Ramachandra, R., Raja, K., Spreeuwers, L.J., Veldhuis, R.N.J., Busch, C.,
Detecting Morphed Face Attacks Using Residual Noise from Deep Multi-scale Context Aggregation Network,
WACV20(269-278)
IEEE DOI 2006
Face, Noise reduction, Feature extraction, Machine learning, Image fusion, Wavelet transforms, Reliability BibRef

Joshi, A., Mukherjee, A., Sarkar, S., Hegde, C.,
Semantic Adversarial Attacks: Parametric Transformations That Fool Deep Classifiers,
ICCV19(4772-4782)
IEEE DOI 2004
face recognition, image classification, learning (artificial intelligence), neural nets, Neural networks BibRef

Rössler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Niessner, M.,
FaceForensics++: Learning to Detect Manipulated Facial Images,
ICCV19(1-11)
IEEE DOI 2004
data compression, face recognition, feature extraction, image coding, image enhancement, image forensics, Databases BibRef

Yu, N., Davis, L., Fritz, M.,
Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints,
ICCV19(7555-7565)
IEEE DOI 2004
image classification, neural nets, security of data, fake images, generative adversarial networks, photorealistic images, Intellectual property BibRef

Deng, J.K.[Jian-Kang], Guo, J.[Jia], Liu, T.L.[Tong-Liang], Gong, M.M.[Ming-Ming], Zafeiriou, S.P.[Stefanos P.],
Sub-center Arcface: Boosting Face Recognition by Large-scale Noisy Web Faces,
ECCV20(XI:741-757).
Springer DOI 2011
BibRef

Deng, J.K.[Jian-Kang], Zafeiriou, S.P.[Stefanos P.],
ArcFace for Disguised Face Recognition,
DFW19(485-493)
IEEE DOI 2004
face recognition, feature extraction, visual databases, intra-class compactness, inter-class discrepancy, Disguised Face Recognition BibRef

Chen, W.[Weilun], Zhang, Z.X.[Zhao-Xiang], Hu, X.L.[Xiao-Lin], Wu, B.Y.[Bao-Yuan],
Boosting Decision-based Black-box Adversarial Attacks with Random Sign Flip,
ECCV20(XV:276-293).
Springer DOI 2011
BibRef

Wang, X.S.[Xiao-Sen], Zhang, Z.L.[Ze-Liang], Tong, K.H.[Kang-Heng], Gong, D.H.[Di-Hong], He, K.[Kun], Li, Z.F.[Zhi-Feng], Liu, W.[Wei],
Triangle Attack: A Query-Efficient Decision-Based Adversarial Attack,
ECCV22(V:156-174).
Springer DOI 2211
BibRef

Dong, Y.P.[Yin-Peng], Su, H.[Hang], Wu, B.Y.[Bao-Yuan], Li, Z.F.[Zhi-Feng], Liu, W.[Wei], Zhang, T.[Tong], Zhu, J.[Jun],
Efficient Decision-Based Black-Box Adversarial Attacks on Face Recognition,
CVPR19(7706-7714).
IEEE DOI 2002
BibRef

Shao, R.[Rui], Lan, X.Y.[Xiang-Yuan], Li, J.W.[Jia-Wei], Yuen, P.C.[Pong C.],
Multi-Adversarial Discriminative Deep Domain Generalization for Face Presentation Attack Detection,
CVPR19(10015-10023).
IEEE DOI 2002
BibRef

Jia, S.[Shan], Hu, C.B.[Chuan-Bo], Guo, G.D.[Guo-Dong], Xu, Z.Q.[Zheng-Quan],
A Database for Face Presentation Attack Using Wax Figure Faces,
NTIAP19(39-47).
Springer DOI 1909
BibRef

Debiasi, L.[Luca], Damer, N.[Naser], Saladié, A.M.[Alexandra Moseguí], Rathgeb, C.[Christian], Scherhag, U.[Ulrich], Busch, C.[Christoph], Kirchbuchner, F.[Florian], Uhl, A.[Andreas],
On the Detection of GAN-Based Face Morphs Using Established Morph Detectors,
CIAP19(II:345-356).
Springer DOI 1909
BibRef

Natsume, R.[Ryota], Inoue, K.[Kazuki], Fukuhara, Y.[Yoshihiro], Yamamoto, S.[Shintaro], Morishima, S.[Shigeo], Kataoka, H.[Hirokatsu],
Understanding Fake Faces,
BrainDriven18(III:566-576).
Springer DOI 1905
BibRef

Damer, N.[Naser], Boller, V.[Viola], Wainakh, Y.[Yaza], Boutros, F.[Fadi], Terhörst, P.[Philipp], Braun, A.[Andreas], Kuijper, A.[Arjan],
Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts,
GCPR18(518-534).
Springer DOI 1905
BibRef

Dabouei, A., Taherkhani, F., Soleymani, S., Dawson, J., Nasrabadi, N.M.,
Boosting Deep Face Recognition via Disentangling Appearance and Geometry,
WACV20(309-318)
IEEE DOI 2006
Face, Geometry, Face recognition, Training, Task analysis, Manifolds, Loss measurement BibRef

Dabouei, A.[Ali], Soleymani, S.[Sobhan], Dawson, J.[Jeremy], Nasrabadi, N.M.[Nasser M.],
Fast Geometrically-Perturbed Adversarial Faces,
WACV19(1979-1988)
IEEE DOI 1904
face recognition, learning (artificial intelligence), security of data, Transforms BibRef

Liu, J., Kumar, A.,
Detecting Presentation Attacks from 3D Face Masks Under Multispectral Imaging,
DFW18(47-475)
IEEE DOI 1812
Face, Convolution, Biometrics (access control), Lighting, Databases, Multispectral imaging BibRef

Sharif, M., Baue, L., Reite, M.K.,
On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples,
PRIV18(1686-16868)
IEEE DOI 1812
Machine learning, Measurement, Training, Cancer, Object recognition, Face recognition BibRef

Zhang, K., Chang, Y., Hsu, W.,
Deep Disguised Faces Recognition,
DFW18(32-324)
IEEE DOI 1812
Face recognition, Training, Testing, Feature extraction, Principal component analysis, Training data, Pipelines BibRef

Kohli, N., Yadav, D., Noore, A.,
Face Verification with Disguise Variations via Deep Disguise Recognizer,
DFW18(17-177)
IEEE DOI 1812
Face, Databases, Face recognition, Training, Convolution, Image recognition BibRef

Gupta, I., Bhalla, I., Singh, R., Vatsa, M.,
Scattering Transform for Matching Surgically Altered Face Images,
ICPR18(2215-2220)
IEEE DOI 1812
Surgery, Face, Scattering, Feature extraction, Face recognition, Wavelet transforms BibRef

Ming, Z., Chazalon, J., Muzzamil Luqman, M., Visani, M., Burie, J.,
FaceLiveNet: End-to-End Networks Combining Face Verification with Interactive Facial Expression-Based Liveness Detection,
ICPR18(3507-3512)
IEEE DOI 1812
Face, Face recognition, Training, Task analysis, Authentication, Protocols, Image recognition BibRef

Liu, S.Q.[Si-Qi], Lan, X.Y.[Xiang-Yuan], Yuen, P.C.[Pong C.],
Remote Photoplethysmography Correspondence Feature for 3D Mask Face Presentation Attack Detection,
ECCV18(XVI: 577-594).
Springer DOI 1810
BibRef

Lavrentyeva, G.[Galina], Kudashev, O.[Oleg], Melnikov, A.[Aleksandr], de Marsico, M.[Maria], Matveev, Y.[Yuri],
Interactive Photo Liveness for Presentation Attacks Detection,
ICIAR18(252-258).
Springer DOI 1807
BibRef

Paiz-Reyes, E.[Evelyn], Nunes-de-Lima, N.[Nadile], Ablanedo, J.[Jennie], Fairchild, E.[Elaine], Griffith, T.[Tami], Rodeheffer, C.[Christopher],
Is This Person Real? Avatar Stylization and Its Influence on Human Perception in a Counseling Training Environment,
VAMR18(I: 279-289).
Springer DOI 1807
BibRef

Damer, N.[Naser], Dimitrov, K.[Kristiyan],
Practical View on Face Presentation Attack Detection,
BMVC16(xx-yy).
HTML Version. 1805
BibRef

Agarwal, A., Yadav, D., Kohli, N., Singh, R., Vatsa, M., Noore, A.,
Face Presentation Attack with Latex Masks in Multispectral Videos,
PBVS17(275-283)
IEEE DOI 1709
Databases, Face, Face recognition, Probes, Videos BibRef

Zhou, P.[Peng], Han, X.T.[Xin-Tong], Morariu, V.I.[Vlad I.], Davis, L.S.[Larry S.],
Two-Stream Neural Networks for Tampered Face Detection,
MedForen17(1831-1839)
IEEE DOI 1709
Cameras, Face, Feature extraction, Lighting, Streaming media, Support vector machines, Transform coding BibRef

Raghavendra, R., Raja, K.B., Venkatesh, S., Busch, C.,
Transferable Deep-CNN Features for Detecting Digital and Print-Scanned Morphed Face Images,
MedForen17(1822-1830)
IEEE DOI 1709
Convolution, Databases, Face, Face detection, Face recognition, Feature, extraction BibRef

Peng, B., Wang, W., Dong, J., Tan, T.,
Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces,
MedForen17(1813-1821)
IEEE DOI 1709
Cameras, Distortion, Estimation, Forensics, Solid modeling, BibRef

Seibold, C.[Clemens], Samek, W.[Wojciech], Hilsmann, A.[Anna], Eisert, P.[Peter],
Detection of Face Morphing Attacks by Deep Learning,
IWDW17(107-120).
Springer DOI 1708
BibRef

Wandzik, L.[Lukasz], Garcia, R.V.[Raul Vicente], Kaeding, G.[Gerald], Chen, X.[Xi],
CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing,
IWDW17(121-135).
Springer DOI 1708
BibRef

Neubert, T.[Tom],
Face Morphing Detection: An Approach Based on Image Degradation Analysis,
IWDW17(93-106).
Springer DOI 1708
BibRef

Nowara, E.M., Sabharwal, A., Veeraraghavan, A.,
PPGSecure: Biometric Presentation Attack Detection Using Photopletysmograms,
FG17(56-62)
IEEE DOI 1707
Authentication, Blood, Color, Face, Feature extraction, Physiology, Skin BibRef

Rudd, E.M.[Ethan M.], Günther, M., Boult, T.E.[Terrance E.],
PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses,
Biometrics16(171-178)
IEEE DOI 1612
BibRef

Melnikov, A.[Aleksandr], Akhunzyanov, R.[Rasim], Kudashev, O.[Oleg], Luckyanets, E.[Eugene],
Audiovisual Liveness Detection,
CIAP15(II:643-652).
Springer DOI 1511
BibRef

Raghavendra, R., Busch, C.[Christoph],
Improved face recognition by combining information from multiple cameras in Automatic Border Control system,
AVSS15(1-6)
IEEE DOI 1511
BibRef
Earlier:
Novel presentation attack detection algorithm for face recognition system: Application to 3D face mask attack,
ICIP14(323-327)
IEEE DOI 1502
cameras. Databases BibRef

Liu, W.W.[Wei-Wen],
Face liveness detection using analysis of Fourier spectra based on hair,
ICWAPR14(75-80)
IEEE DOI 1402
Accuracy BibRef

Peng, J.Y.[Jun-Yan], Chan, P.P.K.[Patrick P.K.],
Face liveness detection for combating the spoofing attack in face recognition,
ICWAPR14(176-181)
IEEE DOI 1402
Accuracy BibRef

Yang, L.B.[Li-Bin],
Face liveness detection by focusing on frontal faces and image backgrounds,
ICWAPR14(93-97)
IEEE DOI 1402
BibRef

d'Souza, D.[Darryl], Yampolskiy, R.V.[Roman V.],
Natural vs. Artificial Face Classification Using Uniform Local Directional Patterns and Wavelet Uniform Local Directional Patterns,
Biometrics14(27-33)
IEEE DOI 1409
Avatars BibRef

Wang, Y.Y.[Yue-Yang], Hao, X.L.[Xiao-Li], Hou, Y.[Yali], Guo, C.Q.[Chang-Qing],
A New Multispectral Method for Face Liveness Detection,
ACPR13(922-926)
IEEE DOI 1408
face recognition BibRef

Yan, J.J.[Jun-Jie], Zhang, Z.W.[Zhi-Wei], Lei, Z.[Zhen], Yi, D.[Dong], Li, S.Z.,
Face liveness detection by exploring multiple scenic clues,
ICARCV12(188-193).
IEEE DOI 1304

See also Face detection by structural models. BibRef

Markovski, J., Reniers, M.A.,
An integrated state- and event-based framework for verifying liveness in supervised systems,
ICARCV12(246-251).
IEEE DOI 1304
BibRef

Hu, H.[Hesuan], Su, R.[Rong],
A novel approach to liveness supervision of AMS with assembly operations using Petri nets,
ICARCV12(264-269).
IEEE DOI 1304
BibRef

Peixoto, B.[Bruno], Michelassi, C.[Carolina], Rocha, A.[Anderson],
Face liveness detection under bad illumination conditions,
ICIP11(3557-3560).
IEEE DOI 1201
BibRef

Sun, L.[Lin], Huang, W.B.[Wai-Bin], Wu, M.H.[Ming-Hui],
TIR/VIS Correlation for Liveness Detection in Face Recognition,
CAIP11(II: 114-121).
Springer DOI 1109
BibRef

Tan, X.Y.[Xiao-Yang], Li, Y.[Yi], Liu, J.[Jun], Jiang, L.[Lin],
Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model,
ECCV10(VI: 504-517).
Springer DOI 1009
BibRef

Bao, W.[Wei], Li, H.[Hong], Li, N.[Nan], Jiang, W.[Wei],
A liveness detection method for face recognition based on optical flow field,
IASP09(233-236).
IEEE DOI 0904
BibRef

Pan, G.[Gang], Sun, L.[Lin], Wu, Z.H.[Zhao-Hui], Lao, S.H.[Shi-Hong],
Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera,
ICCV07(1-8).
IEEE DOI 0710
BibRef

Chapter on Face Recognition, Detection, Tracking, Gesture Recognition, Fingerprints, Biometrics continues in
Spoofing, Faces, Other Biometrics .


Last update:Mar 16, 2024 at 20:36:19