21.5.1.4 Liveness Detection, Spoofing, Presentation Attack, Faces, Other Biometrics

Chapter Contents (Back)
Application, Biometrics. Presentation Attack. Liveness. Disguised Faces. Spoofing. Some related issues, deepfakes:
See also Deepfakes, Face Synthesis, Fake News, Generation, Detection.
See also Face Animation, Video Face Synthesis.
See also Liveness Detection, Spoofing, Fingerprint Recognition.

Kollreider, K.[Klaus], Fronthaler, H.[Hartwig], Bigun, J.[Josef],
Non-intrusive liveness detection by face images,
IVC(27), No. 3, February 2009, pp. 233-244.
Elsevier DOI 0804
BibRef
Earlier:
Verifying liveness by multiple experts in face biometrics,
Biometrics08(1-6).
IEEE DOI 0806
Face liveness; Liveness detection; Anti-spoofing measures; Optical flow; Motion of lines; Optical flow of lines; Orientation estimation; Face part models; Retinotopic vision; Local Gabor decomposition; Support vector machine classification BibRef

Zhang, Z.W.[Zhi-Wei], Yi, D.[Dong], Lei, Z.[Zhen], Li, S.Z.,
Regularized Transfer Boosting for Face Detection Across Spectrum,
SPLetters(19), No. 3, March 2012, pp. 131-134.
IEEE DOI 1202
BibRef

Zhang, Z.W.[Zhi-Wei], Yi, D.[Dong], Lei, Z.[Zhen], Li, S.Z.[Stan Z.],
Face Liveness Detection by Learning Multispectral Reflectance Distributions,
FG11(436-441).
IEEE DOI 1103
BibRef

Maatta, J., Hadid, A.[Abdenour], Pietikäinen, M.[Matti],
Face spoofing detection from single images using texture and local shape analysis,
IET-Bio(1), No. 1, March 2012, pp. 3-10.
DOI Link 1305
Award, IET Bio Premium. BibRef

Kose, N.[Neslihan], Dugelay, J.L.[Jean-Luc],
Mask spoofing in face recognition and countermeasures,
IVC(32), No. 10, 2014, pp. 779-789.
Elsevier DOI 1410
BibRef
Earlier:
Shape and Texture Based Countermeasure to Protect Face Recognition Systems against Mask Attacks,
Biometrics13(111-116)
IEEE DOI 1309
BibRef
And:
Countermeasure for the protection of face recognition systems against mask attacks,
FG13(1-6)
IEEE DOI 1309
Spoofing. face recognition BibRef

Kose, N.[Neslihan], Apvrille, L., Dugelay, J.L.[Jean-Luc],
Facial makeup detection technique based on texture and shape analysis,
FG15(1-7)
IEEE DOI 1508
face recognition BibRef

de Freitas Pereira, T.[Tiago], Komulainen, J.[Jukka], Anjos, A.[Andre], de Martino, J.[Jose], Hadid, A.[Abdenour], Pietikainen, M.[Matti], Marcel, S.[Sebastien],
Face liveness detection using dynamic texture,
JIVP(2014), No. 1, 2014, pp. 2.
DOI Link 1402
BibRef

Komulainen, J.[Jukka], Hadid, A.[Abdenour], Pietikäinen, M.[Matti],
Face Spoofing Detection Using Dynamic Texture,
CVLBP12(I:146-157).
Springer DOI 1304
BibRef

Biggio, B.[Battista], Akhtar, Z.[Zahid], Fumera, G.[Giorgio], Marcialis, G.L.[Gian Luca], Roli, F.[Fabio],
Security evaluation of biometric authentication systems under real spoofing attacks,
IET-Bio(1), No. 1, March 2012, pp. 11-24.
DOI Link 1305
Award, IET Bio Premium. BibRef
Earlier: A2, A3, A4, A5, Only:
Robustness Evaluation of Biometric Systems under Spoof Attacks,
CIAP11(I: 159-168).
Springer DOI 1109
BibRef

Biggio, B.[Battista], Fumera, G.[Giorgio], Marcialis, G.L.[Gian Luca], Roli, F.[Fabio],
Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems,
PAMI(39), No. 3, March 2017, pp. 561-575.
IEEE DOI 1702
Biometrics (access control) BibRef

Roli, F.[Fabio], Biggio, B.[Battista], Fumera, G.[Giorgio],
Pattern Recognition Systems under Attack,
CIARP13(I:1-8).
Springer DOI 1311
BibRef

Galbally, J.[Javier], Marcel, S.[Sebastien], Fierrez, J.,
Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition,
IP(23), No. 2, February 2014, pp. 710-724.
IEEE DOI 1402
face recognition BibRef

Galbally, J.[Javier], Marcel, S.[Sebastien],
Face Anti-spoofing Based on General Image Quality Assessment,
ICPR14(1173-1178)
IEEE DOI 1412
Databases BibRef

Feng, Y.C.[Yi C.], Lim, M.H.[Meng-Hui], Yuen, P.C.[Pong C.],
Masquerade attack on transform-based binary-template protection based on perceptron learning,
PR(47), No. 9, 2014, pp. 3019-3033.
Elsevier DOI 1406
Masquerade attack BibRef

Bustard, J.D., Carter, J.N., Nixon, M.S., Hadid, A.,
Measuring and mitigating targeted biometric impersonation,
IET-Bio(3), No. 2, June 2014, pp. 55-61.
DOI Link 1407
BibRef

Kim, W., Suh, S., Han, J.,
Face Liveness Detection From a Single Image via Diffusion Speed Model,
IP(24), No. 8, August 2015, pp. 2456-2465.
IEEE DOI 1505
Face BibRef

Hadid, A., Evans, N., Marcel, S., Fierrez, J.,
Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned,
SPMag(32), No. 5, September 2015, pp. 20-30.
IEEE DOI 1509
biometrics (access control) BibRef

Biggio, B., Fumera, G., Russu, P., Didaci, L., Roli, F.,
Adversarial Biometric Recognition: A review on biometric system security from the adversarial machine-learning perspective,
SPMag(32), No. 5, September 2015, pp. 31-41.
IEEE DOI 1509
biometrics (access control) BibRef

Pinto, A., Pedrini, H., Robson Schwartz, W., Rocha, A.,
Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes,
IP(24), No. 12, December 2015, pp. 4726-4740.
IEEE DOI 1512
face recognition BibRef

Feng, L.T.[Li-Tong], Po, L.M.[Lai-Man], Li, Y.M.[Yu-Ming], Xu, X.Y.[Xu-Yuan], Yuan, F.[Fang], Cheung, T.C.H.[Terence Chun-Ho], Cheung, K.W.[Kwok-Wai],
Integration of image quality and motion cues for face anti-spoofing: A neural network approach,
JVCIR(38), No. 1, 2016, pp. 451-460.
Elsevier DOI 1605
Face anti-spoofing BibRef

Galbally, J.[Javier], Satta, R.[Riccardo],
Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models,
IET-Bio(5), No. 2, 2016, pp. 83-91.
DOI Link 1606
biometrics (access control) BibRef

Gavrilescu, M.,
Study on using individual differences in facial expressions for a face recognition system immune to spoofing attacks,
IET-Bio(5), No. 3, 2016, pp. 236-242.
DOI Link 1609
emotion recognition BibRef

Schuckers, S.[Stephanie],
Presentations and attacks, and spoofs, oh my,
IVC(55, Part 1), No. 1, 2016, pp. 26-30.
Elsevier DOI 1612
Biometric recognition BibRef

Boulkenafet, Z., Komulainen, J., Hadid, A.,
Face Antispoofing Using Speeded-Up Robust Features and Fisher Vector Encoding,
SPLetters(24), No. 2, February 2017, pp. 141-145.
IEEE DOI 1702
face recognition BibRef

Ramachandra, R.[Raghavendra], Busch, C.[Christoph],
Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey,
Surveys(50), No. 1, April 2017, pp. Article No 8.
DOI Link 1704
Survey, Spoofing. The vulnerability of face recognition systems to presentation attacks (also known as direct attacks or spoof attacks) has received a great deal of interest from the biometric community.
See also Presentation Attack Detection Methods for Fingerprint Recognition Systems: A Survey. BibRef

Raghavendra, R., Raja, K.B.[Kiran B.], Marcel, S.[Sébastien], Busch, C.[Christoph],
Face presentation attack detection across spectrum using time-frequency descriptors of maximal response in Laplacian scale-space,
IPTA16(1-6)
IEEE DOI 1703
face recognition. Targeted attacks. BibRef

Mohammadi, A.[Amir], Bhattacharjee, S.[Sushil], Marcel, S.[Sébastien],
Deeply vulnerable: a study of the robustness of face recognition to presentation attacks,
IET-Bio(7), No. 1, January 2018, pp. 15-26.
DOI Link 1712
BibRef

Alotaibi, A.[Aziz], Mahmood, A.[Ausif],
Deep face liveness detection based on nonlinear diffusion using convolution neural network,
SIViP(11), No. 4, May 2017, pp. 713-720.
WWW Link. 1704
BibRef

Sepas-Moghaddam, A.[Alireza], Malhadas, L.[Luis], Correia, P.L.[Paulo Lobato], Pereira, F.M.[Fernando M.],
Face spoofing detection using a light field imaging framework,
IET-Bio(7), No. 1, January 2018, pp. 39-48.
DOI Link 1712
BibRef

Li, L.[Lei], Correia, P.L.[Paulo Lobato], Hadid, A.[Abdenour],
Face recognition under spoofing attacks: countermeasures and research directions,
IET-Bio(7), No. 1, January 2018, pp. 3-14.
DOI Link 1712
BibRef

Hadid, A.[Abdenour],
Face Biometrics Under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions,
Biometrics14(113-118)
IEEE DOI 1409
BibRef

Guest Editorial: Face Recognition and Spoofing Attacks,
IET-Bio(7), No. 1, January 2018, pp. 1-2.
DOI Link 1712
BibRef

Edmunds, T.[Taiamiti], Caplier, A.[Alice],
Face spoofing detection based on colour distortions,
IET-Bio(7), No. 1, January 2018, pp. 27-38.
DOI Link 1712
BibRef
Earlier:
Fake face detection based on radiometric distortions,
IPTA16(1-6)
IEEE DOI 1703
face recognition BibRef

Xia, Z.Q.[Zhao-Qiang], Peng, X.L.[Xian-Lin], Feng, X.Y.[Xiao-Yi], Hadid, A.[Abdenour],
Scarce face recognition via two-layer collaborative representation,
IET-Bio(7), No. 1, January 2018, pp. 56-62.
DOI Link 1712
BibRef

Li, L., Feng, X.Y.[Xiao-Yi], Boulkenafet, Z., Xia, Z.Q.[Zhao-Qiang], Li, M., Hadid, A.[Abdenour],
An original face anti-spoofing approach using partial convolutional neural network,
IPTA16(1-6)
IEEE DOI 1703
computer vision BibRef

Zhao, X., Lin, Y., Heikkilä, J.,
Dynamic Texture Recognition Using Volume Local Binary Count Patterns With an Application to 2D Face Spoofing Detection,
MultMed(20), No. 3, March 2018, pp. 552-566.
IEEE DOI 1802
Dynamics, Face, Face recognition, Fractals, Histograms, Videos, 2D face spoofing detection, volume local binary count BibRef

Edmunds, T.[Taiamiti], Caplier, A.[Alice],
Motion-based countermeasure against photo and video spoofing attacks in face recognition,
JVCIR(50), 2018, pp. 314-332.
Elsevier DOI 1802
Motion cues, Face anti-spoofing, Fisher kernel, Replay attacks BibRef

Zhang, L.B.[Le-Bing], Peng, F.[Fei], Qin, L.[Le], Long, M.[Min],
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination,
JVCIR(51), 2018, pp. 56-69.
Elsevier DOI 1802
Face anti-spoofing, Color texture Markov feature, Adjacent facial pixels discrepancy, SVM-RFE BibRef

Beham, M.P.[M. Parisa], Roomi, S.M.M.[S. Md. Mansoor],
Anti-spoofing enabled face recognition based on aggregated local weighted gradient orientation,
SIViP(12), No. 3, March 2018, pp. 531-538.
WWW Link. 1804
BibRef

Nordrum, A.,
Forging voices and faces,
Spectrum(55), No. 5, May 2018, pp. 14-15.
IEEE DOI 1805
[News] BibRef

Li, L.[Lei], Feng, X.Y.[Xiao-Yi], Xia, Z.Q.[Zhao-Qiang], Jiang, X.Y.[Xiao-Yue], Hadid, A.[Abdenour],
Face spoofing detection with local binary pattern network,
JVCIR(54), 2018, pp. 182-192.
Elsevier DOI 1806
BibRef
Earlier: A1, A2, A4, A3, A5:
Face anti-spoofing via deep local binary patterns,
ICIP17(101-105)
IEEE DOI 1803
Face spoofing detection, Deep learning, Local binary pattern. Databases, Face, Feature extraction, Image color analysis, Machine learning, Support vector machines, Training BibRef

Gomez-Barrero, M.[Marta], Rathgeb, C.[Christian], Scherhag, U.[Ulrich], Busch, C.[Christoph],
Predicting the vulnerability of biometric systems to attacks based on morphed biometric information,
IET-Bio(7), No. 4, July 2018, pp. 333-341.
DOI Link 1807
BibRef

Hamdan, B.[Bensenane], Mokhtar, K.[Keche],
A self-immune to 3D masks attacks face recognition system,
SIViP(12), No. 6, September 2018, pp. 1053-1060.
WWW Link. 1808
BibRef

Boulkenafet, Z.[Zinelabidine], Komulainen, J.[Jukka], Hadid, A.[Abdenour],
On the generalization of color texture-based face anti-spoofing,
IVC(77), 2018, pp. 1-9.
Elsevier DOI 1809
BibRef
Earlier:
Face anti-spoofing based on color texture analysis,
ICIP15(2636-2640)
IEEE DOI 1512
Face recognition, Presentation attack detection, Spoofing, Color texture analysis, Cross-database, Generalization BibRef

Chen, Q.[Ququ], Sang, L.[Lei],
Face-mask recognition for fraud prevention using Gaussian mixture model,
JVCIR(55), 2018, pp. 795-801.
Elsevier DOI 1809
Gussian Mixture Model (GMM), Dlib, Deep learning, Fraud prevention BibRef

Song, X.[Xiao], Zhao, X.[Xu], Fang, L.J.[Liang-Ji], Lin, T.W.[Tian-Wei],
Discriminative representation combinations for accurate face spoofing detection,
PR(85), 2019, pp. 220-231.
Elsevier DOI 1810
Face presentation attack detection, Template face registration, Binocular depth, Decision-level cascade strategy BibRef

Ur Rehman, Y.A.[Yasar Abbas], Po, L.M.[Lai-Man], Liu, M.Y.[Meng-Yang], Zou, Z.J.[Zi-Jie], Ou, W.F.[Wei-Feng], Zhao, Y.[Yuzhi],
Face liveness detection using convolutional-features fusion of real and deep network generated face images,
JVCIR(59), 2019, pp. 574-582.
Elsevier DOI 1903
Convolution neural networks, Face anti-spoofing, Face liveness detection, Adaptive fusion, Auto-encoder, DNG face images BibRef

Chen, L.Y.[Ling-Ying], Zhao, G.H.[Guang-Hui], Zhou, J.W.[Jun-Wei], Ho, A.T.S.[Anthony T.S.], Cheng, L.M.[Lee-Ming],
Face template protection using deep LDPC codes learning,
IET-Bio(8), No. 3, May 2019, pp. 190-197.
DOI Link 1904
BibRef

Goswami, G.[Gaurav], Agarwal, A.[Akshay], Ratha, N.[Nalini], Vatsa, M.[Mayank],
Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition,
IJCV(127), No. 6-7, June 2019, pp. 719-742.
Springer DOI 1906
BibRef

Camiña, J.B.[José Benito], Medina-Pérez, M.A.[Miguel Angel], Monroy, R.[Raúl], Loyola-González, O.[Octavio], Villanueva, L.A.P.[Luis Angel Pereyra], González Gurrola, L.C.[Luis Carlos],
Bagging-RandomMiner: A one-class classifier for file access-based masquerade detection,
MVA(30), No. 5, July 2019, pp. 959-974.
Springer DOI 1907
BibRef

Yu, C.Y.[Chang-Yong], Yao, C.T.[Cheng-Tang], Pei, M.T.[Ming-Tao], Jia, Y.D.[Yun-De],
Diffusion-based kernel matrix model for face liveness detection,
IVC(89), 2019, pp. 88-94.
Elsevier DOI 1909
Face liveness detection, Anisotropic diffusion, Kernel matrix model, DK feature BibRef

Khammari, M.[Mohammed],
Robust face anti-spoofing using CNN with LBP and WLD,
IET-IPR(13), No. 11, 19 September 2019, pp. 1880-1884.
DOI Link 1909
BibRef

Sajjad, M.[Muhammad], Khan, S.[Salman], Hussain, T.[Tanveer], Muhammad, K.[Khan], Sangaiah, A.K.[Arun Kumar], Castiglione, A.[Aniello], Esposito, C.[Christian], Baik, S.W.[Sung Wook],
CNN-based anti-spoofing two-tier multi-factor authentication system,
PRL(126), 2019, pp. 123-131.
Elsevier DOI 1909
Biometric recognition, Anti-spoofing, Information security, Convolutional neural networks BibRef

Jia, S.[Shan], Guo, G.D.[Guo-Dong], Xu, Z.Q.[Zheng-Quan],
A survey on 3D mask presentation attack detection and countermeasures,
PR(98), 2020, pp. 107032.
Elsevier DOI 1911
Face presentation attack, 3D Mask spoofing, Biometrics BibRef

Chen, F.M.[Fu-Mei], Wen, C.[Chang], Xie, K.[Kai], Wen, F.Q.[Fang-Qing], Sheng, G.Q.[Guan-Qun], Tang, X.G.[Xin-Gong],
Face liveness detection: fusing colour texture feature and deep feature,
IET-Bio(8), No. 6, November 2019, pp. 369-377.
DOI Link 1911
BibRef

Jiang, F.L.[Fang-Ling], Liu, P.C.[Peng-Cheng], Zhou, X.D.[Xiang-Dong],
Multilevel fusing paired visible light and near-infrared spectral images for face anti-spoofing,
PRL(128), 2019, pp. 30-37.
Elsevier DOI 1912
Face anti-spoofing, Face anti-spoofing dataset, Visible light and near-infrared fusing BibRef

Jia, S.[Shan], Guo, G.D.[Guo-Dong], Xu, Z.Q.[Zheng-Quan], Wang, Q.C.[Qiang-Chang],
Face presentation attack detection in mobile scenarios: A comprehensive evaluation,
IVC(93), 2020, pp. 103826.
Elsevier DOI 2001
Face presentation attack, Face recognition, Performance evaluation, Biometrics BibRef

Toprak, I.[Imren], Toygar, Ö.[Önsen],
Ear anti-spoofing against print attacks using three-level fusion of image quality measures,
SIViP(14), No. 2, March 2020, pp. 417-424.
WWW Link. 2003
BibRef

Ur Rehman, Y.A.[Yasar Abbas], Po, L.M.[Lai-Man], Komulainen, J.[Jukka],
Enhancing deep discriminative feature maps via perturbation for face presentation attack detection,
IVC(94), 2020, pp. 103858.
Elsevier DOI 2003
Spoofing, Presentation attack detection, CNN, Attention, Face-biometrics BibRef

Peng, F.[Fei], Qin, L.[Le], Long, M.[Min],
Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning,
JVCIR(66), 2020, pp. 102746.
Elsevier DOI 2003
Presentation attack detection, Face recognition, Color distortion, Ensemble learning BibRef

Bresan, R.[Rodrigo], Beluzo, C.[Carlos], Carvalho, T.[Tiago],
Exposing Presentation Attacks by a Combination of Multi-intrinsic Image Properties, Convolutional Networks and Transfer Learning,
ACIVS20(153-165).
Springer DOI 2003
BibRef

Raj, S.[Sunny], Pannu, J.S.[Jodh S.], Fernandes, S.L.[Steven L.], Ramanathan, A.[Arvind], Pullum, L.L.[Laura L.], Jha, S.K.[Sumit K.],
Attacking NIST biometric image software using nonlinear optimization,
PRL(131), 2020, pp. 79-84.
Elsevier DOI 2004
NIST biometric image software, MINDTCT, BOZORTH3, NLopt BibRef

Ma, Y.[Yukun], Wu, L.[Lifang], Li, Z.[Zeyu], liu, F.[Fanghao],
A novel face presentation attack detection scheme based on multi-regional convolutional neural networks,
PRL(131), 2020, pp. 261-267.
Elsevier DOI 2004
Face presentation attack detection, Adversarial examples, Local classification loss, Multi-regional convolutional neural networks BibRef

Li, L.[Lei], Xia, Z.Q.[Zhao-Qiang], Jiang, X.Y.[Xiao-Yue], Ma, Y.P.[Yu-Peng], Roli, F.[Fabio], Feng, X.Y.[Xiao-Yi],
3D face mask presentation attack detection based on intrinsic image analysis,
IET-Bio(9), No. 3, May 2020, pp. 100-108.
DOI Link 2005
BibRef

Rathgeb, C.[Christian], Botaljov, A.[Angelika], Stockhardt, F.[Fabian], Isadskiy, S.[Sergey], Debiasi, L.[Luca], Uhl, A.[Andreas], Busch, C.[Christoph],
PRNU-based detection of facial retouching,
IET-Bio(9), No. 4, July 2020, pp. 154-164.
DOI Link 2006
BibRef

Zhang, B.[Bowen], Tondi, B.[Benedetta], Barni, M.[Mauro],
Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability,
CVIU(197-198), 2020, pp. 102988.
Elsevier DOI 2008
Adversarial examples, Anti-spoofing, Physical domain adversarial examples, Presentation attack, Face authentication BibRef

Peng, F., Yin, L.P., Zhang, L.B., Long, M.,
CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network,
MultMed(22), No. 10, October 2020, pp. 2511-2525.
IEEE DOI 2009
Feature extraction, Detectors, Forensics, Image color analysis, Convolution, Histograms, Generative adversarial networks, computer-generated graphics (CG) detector BibRef

Zhang, W.L.[Wan-Ling], Xiang, S.J.[Shi-Jun],
Face anti-spoofing detection based on DWT-LBP-DCT features,
SP:IC(89), 2020, pp. 115990.
Elsevier DOI 2010
Face anti-spoofing, DWT, LBP, DCT, REPLAY-ATTACK, CASIA-FASD BibRef

Tian, Y.[Ye], Xiang, S.J.[Shi-Jun],
Detection of Video-Based Face Spoofing Using LBP and Multiscale DCT,
IWDW16(16-28).
Springer DOI 1703
BibRef

Zhou, J.L.[Jian-Li], Liang, C.[Chao], Chen, J.[Jun],
Manifold Projection for Adversarial Defense on Face Recognition,
ECCV20(XXX: 288-305).
Springer DOI 2010
BibRef

Scherhag, U.[Ulrich], Kunze, J.[Jonas], Rathgeb, C.[Christian], Busch, C.[Christoph],
Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach,
IET-Bio(9), No. 6, November 2020, pp. 278-289.
DOI Link 2010
BibRef

Massoli, F.V.[Fabio Valerio], Carrara, F.[Fabio], Amato, G.[Giuseppe], Falchi, F.[Fabrizio],
Detection of Face Recognition Adversarial Attacks,
CVIU(202), 2021, pp. 103103.
Elsevier DOI 2012
Deep Learning, Face Recognition, Adversarial attacks, Adversarial detection, Adversarial biometrics BibRef

Guo, Z.Q.[Zhi-Qing], Yang, G.B.[Gao-Bo], Chen, J.Y.[Ji-You], Sun, X.M.[Xing-Ming],
Fake face detection via adaptive manipulation traces extraction network,
CVIU(204), 2021, pp. 103170.
Elsevier DOI 2102
Face image manipulation, Passive image forensics, Manipulation traces extraction BibRef

Fatemifar, S.[Soroush], Arashloo, S.R.[Shervin Rahimzadeh], Awais, M.[Muhammad], Kittler, J.V.[Josef V.],
Client-specific anomaly detection for face presentation attack detection,
PR(112), 2021, pp. 107696.
Elsevier DOI 2102
Anomaly detection, Biometrics, Client-specific information, Deep convolutional neural networks, Face spoofing detection BibRef

Nguyen, S.M.[Son Minh], Tran, L.D.[Linh Duy], Arai, M.[Masayuki],
Attended-auxiliary Supervision Representation for Face Anti-spoofing,
ACCV20(I:436-452).
Springer DOI 2103
BibRef

Guo, W.[Wei], Tondi, B.[Benedetta], Barni, M.[Mauro],
A Master Key backdoor for universal impersonation attack against DNN-based face verification,
PRL(144), 2021, pp. 61-67.
Elsevier DOI 2103
Backdoor attacks to CNN, Face verification, Biometric security, Presentation attacks, Adversarial machine learning BibRef

Jia, S.[Shan], Hu, C.B.[Chuan-Bo], Li, X.[Xin], Xu, Z.Q.[Zheng-Quan],
Face spoofing detection under super-realistic 3D wax face attacks,
PRL(145), 2021, pp. 103-109.
Elsevier DOI 2104
Face anti-spoofing, 3D face presentation attack, Wax figure face database, Residual Attention Network BibRef

Chen, B., Yang, W., Wang, S.,
Generalized Face Antispoofing by Learning to Fuse Features From High- and Low-Frequency Domains,
MultMedMag(28), No. 1, January 2021, pp. 56-64.
IEEE DOI 2104
Feature extraction, Streaming media, Face recognition, Frequency-domain analysis, Training data, Testing, low frequency BibRef

Quan, R., Wu, Y., Yu, X., Yang, Y.,
Progressive Transfer Learning for Face Anti-Spoofing,
IP(30), 2021, pp. 3946-3955.
IEEE DOI 2104
Face recognition, Training, Reliability, Data models, Testing, Transfer learning, Training data, Face anti spoofing, transfer learning BibRef

Jia, Y.P.[Yun-Pei], Zhang, J.[Jie], Shan, S.G.[Shi-Guang], Chen, X.L.[Xi-Lin],
Unified unsupervised and semi-supervised domain adaptation network for cross-scenario face anti-spoofing,
PR(115), 2021, pp. 107888.
Elsevier DOI 2104
Face anti-spoofing, Face presentation attack detection, Domain adaptation, Deep learning BibRef

Wang, Y.W.[Yong-Wei], Ding, X.[Xin], Yang, Y.X.[Yi-Xin], Ding, L.[Li], Ward, R.[Rabab], Wang, Z.J.[Z. Jane],
Perception matters: Exploring imperceptible and transferable anti-forensics for GAN-generated fake face imagery detection,
PRL(146), 2021, pp. 15-22.
Elsevier DOI 2105
Fake face imagery anti-forensics, Imperceptible attacks, Transferable attacks, Improved adversarial attack BibRef

Zhu, X.[Xun], Li, S.[Sheng], Zhang, X.P.[Xin-Peng], Li, H.L.[Hao-Liang], Kot, A.C.[Alex C.],
Detection of Spoofing Medium Contours for Face Anti-Spoofing,
CirSysVideo(31), No. 5, 2021, pp. 2039-2045.
IEEE DOI 2105
BibRef

Li, Z.S.[Zhi-Shan], Yuan, J.Y.[Jia-Yan], Jia, B.Z.[Bao-Zhi], He, Y.F.[Yi-Fan], Xie, L.[Lei],
An Effective Face Anti-Spoofing Method via Stereo Matching,
SPLetters(28), 2021, pp. 847-851.
IEEE DOI 2106
Face recognition, Faces, Training, Signal processing algorithms, Convolution, Task analysis, Real-time systems, Face anti-spoofing, lightweight BibRef

Bisogni, C.[Carmen], Cascone, L.[Lucia], Dugelay, J.L.[Jean-Luc], Pero, C.[Chiara],
Adversarial attacks through architectures and spectra in face recognition,
PRL(147), 2021, pp. 55-62.
Elsevier DOI 2106
Adversarial Attack, Deep Neural Networks, White-Box Attack, Black-Box Attack, Near Infrared Images, Thermal Images BibRef

Ngô, L.M.[Lê Minh], Wang, W.[Wei], Mandira, B.[Burak], Karaoglu, S.[Sezer], Bouma, H.[Henri], Dibeklioglu, H.[Hamdi], Gevers, T.[Theo],
Identity Unbiased Deception Detection by 2D-to-3D Face Reconstruction,
WACV21(145-154)
IEEE DOI 2106
Video sequences, Pipelines, Feature extraction, Real-time systems, Magnetic heads, Reliability, Convolutional neural networks BibRef

Liu, A.[Ajian], Li, X.[Xuan], Wan, J.[Jun], Liang, Y.Y.[Yan-Yan], Escalera, S.[Sergio], Escalante, H.J.[Hugo Jair], Madadi, M.[Meysam], Jin, Y.[Yi], Wu, Z.Y.[Zhuo-Yuan], Yu, X.G.[Xiao-Gang], Tan, Z.C.[Zi-Chang], Yuan, Q.[Qi], Yang, R.K.[Rui-Kun], Zhou, B.J.[Ben-Jia], Guo, G.D.[Guo-Dong], Li, S.Z.[Stan Z.],
Cross-ethnicity face anti-spoofing recognition challenge: A review,
IET-Bio(10), No. 1, 2021, pp. 24-43.
DOI Link 2106
BibRef
Earlier: A1, A13, A3, A5, A15, A16, Only:
CASIA-SURF CeFA: A Benchmark for Multi-modal Cross-Ethnicity Face Anti-spoofing,
WACV21(1178-1186)
IEEE DOI 2106
Protocols, Face recognition, Current measurement, Computational modeling BibRef

Hofbauer, H.[Heinz], Debiasi, L.[Luca], Kränkl, S.[Susanne], Uhl, A.[Andreas],
Exploring presentation attack vulnerability and usability of face recognition systems,
IET-Bio(10), No. 2, 2021, pp. 219-232.
DOI Link 2106
BibRef

Yu, Z.T.[Zi-Tong], Wan, J.[Jun], Qin, Y.X.[Yun-Xiao], Li, X.B.[Xiao-Bai], Li, S.Z.[Stan Z.], Zhao, G.Y.[Guo-Ying],
NAS-FAS: Static-Dynamic Central Difference Network Search for Face Anti-Spoofing,
PAMI(43), No. 9, September 2021, pp. 3005-3023.
IEEE DOI 2108
Task analysis, Face recognition, Convolution, Testing, Computer architecture, Protocols, Search problems, CASIA-SURF 3DMask BibRef

Yu, Z.T.[Zi-Tong], Li, X.B.[Xiao-Bai], Niu, X.S.[Xue-Song], Shi, J.G.[Jin-Gang], Zhao, G.Y.[Guo-Ying],
Face Anti-spoofing with Human Material Perception,
ECCV20(VII:557-575).
Springer DOI 2011
BibRef

Bonomi, M.[Mattia], Pasquini, C.[Cecilia], Boato, G.[Giulia],
Dynamic texture analysis for detecting fake faces in video sequences,
JVCIR(79), 2021, pp. 103239.
Elsevier DOI 2109
Manipulated videos, Deepfakes, Video forensics, Local Derivative Patterns BibRef

González-Soler, L.J.[Lázaro J.], Gomez-Barrero, M.[Marta], Busch, C.[Christoph],
On the generalisation capabilities of Fisher vector-based face presentation attack detection,
IET-Bio(10), No. 5, 2021, pp. 480-496.
DOI Link 2109
BibRef

Jia, S.[Shan], Li, X.[Xin], Hu, C.B.[Chuan-Bo], Guo, G.D.[Guo-Dong], Xu, Z.Q.[Zheng-Quan],
3D Face Anti-Spoofing With Factorized Bilinear Coding,
CirSysVideo(31), No. 10, October 2021, pp. 4031-4045.
IEEE DOI 2110
Face recognition, Databases, Faces, Videos, Feature extraction, face anti-spoofing BibRef

Arashloo, S.R.[Shervin Rahimzadeh],
Unseen Face Presentation Attack Detection Using Sparse Multiple Kernel Fisher Null-Space,
CirSysVideo(31), No. 10, October 2021, pp. 4084-4095.
IEEE DOI 2110
Faces, Kernel, Face recognition, Training, Anomaly detection, Task analysis, Support vector machines, sparse regularisation BibRef

Fang, M.L.[Mei-Ling], Damer, N.[Naser], Kirchbuchner, F.[Florian], Kuijper, A.[Arjan],
Real masks and spoof faces: On the masked face presentation attack detection,
PR(123), 2022, pp. 108398.
Elsevier DOI 2112
Face presentation attack detection, COVID-19, Masked face, Face recognition, Biometric security BibRef

Wang, C.X.[Cai-Xun], Zhou, J.[Jie],
An adaptive index smoothing loss for face anti-spoofing,
PRL(153), 2022, pp. 168-175.
Elsevier DOI 2201
Face anti-spoofing, Cross-entropy, Index smoothing BibRef

Baaqeel, H.[Hind], Olatunji, S.O.[Sunday Olusanya],
Spoofing detection on adaptive authentication System-A survey,
IET-Bio(11), No. 2, 2022, pp. 87-96.
DOI Link 2202
adaptive authentication, biometrics, security and privacy, user authentication BibRef

Liu, M.X.[Ming-Xin], Mu, J.[Jiong], Yu, Z.T.[Zi-Tong], Ruan, K.[Kun], Shu, B.[Baiyi], Yang, J.[Jie],
Adversarial learning and decomposition-based domain generalization for face anti-spoofing,
PRL(155), 2022, pp. 171-177.
Elsevier DOI 2203
Deep learning, Face anti-spoofing, Domain generalization, Low-rank decomposition BibRef

Wang, Z.[Zhuo], Wang, Z.Z.[Ze-Zheng], Yu, Z.T.[Zi-Tong], Deng, W.H.[Wei-Hong], Li, J.H.[Jia-Hong], Gao, T.T.[Ting-Ting], Wang, Z.Y.[Zhong-Yuan],
Domain Generalization via Shuffled Style Assembly for Face Anti-Spoofing,
CVPR22(4113-4123)
IEEE DOI 2210
Industries, Codes, Face recognition, Gesture recognition, Benchmark testing, Feature extraction, Face and gestures, retrieval BibRef

Chang, H.H.[Herng-Hua], Yeh, C.H.[Chun-Hsiao],
Face anti-spoofing detection based on multi-scale image quality assessment,
IVC(121), 2022, pp. 104428.
Elsevier DOI 2205
BibRef
Earlier: A2, A1:
Face Liveness Detection Based on Perceptual Image Quality Assessment Features with Multi-scale Analysis,
WACV18(49-56)
IEEE DOI 1806
BibRef
Earlier: A2, A1:
Face liveness detection with feature discrimination between sharpness and blurriness,
MVA17(398-401)
DOI Link 1708
Face recognition, Image quality assessment, Face presentation attack detection, Local face trait, Top gradient similarity. feature extraction, fingerprint identification, image classification, image texture, BIQE, Replay-Attack, Videos. Face, Nose, Organizations, Security. BibRef

Muhammad, U.[Usman], Yu, Z.T.[Zi-Tong], Komulainen, J.[Jukka],
Self-supervised 2D face presentation attack detection via temporal sequence sampling,
PRL(156), 2022, pp. 15-22.
Elsevier DOI 2205
Face recognition, Presentation attack detection, Spoofing, Liveness detection, Self-supervised learning, Motion compensation BibRef

Muhammad, U.[Usman], Oussalah, M.[Mourad],
Self-Supervised Face Presentation Attack Detection with Dynamic Grayscale Snippets,
FG23(1-6)
IEEE DOI 2303
Representation learning, Face recognition, Video sequences, Dynamics, Supervised learning, Self-supervised learning, Gray-scale BibRef

Peng, F.[Fei], Meng, S.H.[Shao-Hua], Long, M.[Min],
Presentation attack detection based on two-stream vision transformers with self-attention fusion,
JVCIR(85), 2022, pp. 103518.
Elsevier DOI 2205
Presentation attack detection, Multi-scale retinex with color restoration, Feature fusion BibRef

Fatemifar, S.[Soroush], Asadi, S.[Shahrokh], Awais, M.[Muhammad], Akbari, A.[Ali], Kittler, J.V.[Josef V.],
Face spoofing detection ensemble via multistage optimisation and pruning,
PRL(158), 2022, pp. 1-8.
Elsevier DOI 2205
Face spoofing detection, Anomaly detection, Client-specific information, Ensemble pruning BibRef

Wu, H.T.[Hang-Tong], Zeng, D.[Dan], Hu, Y.[Yibo], Shi, H.L.[Hai-Lin], Mei, T.[Tao],
Dual Spoof Disentanglement Generation for Face Anti-Spoofing With Depth Uncertainty Learning,
CirSysVideo(32), No. 7, July 2022, pp. 4626-4638.
IEEE DOI 2207
Faces, Training, Face recognition, Uncertainty, Feature extraction, Generators, Soft sensors, Face anti-spoofing, depth uncertainty learning BibRef

Peng, F.[Fei], Qin, L.[Le], Long, M.[Min],
Face morphing attack detection and attacker identification based on a watchlist,
SP:IC(107), 2022, pp. 116748.
Elsevier DOI 2208
Automated border control, Face verification, Morphing attacks, Morphing attack detection, Watchlist BibRef

Qin, Y.X.[Yun-Xiao], Yu, Z.T.[Zi-Tong], Yan, L.B.[Long-Bin], Wang, Z.Z.[Ze-Zheng], Zhao, C.X.[Chen-Xu], Lei, Z.[Zhen],
Meta-Teacher For Face Anti-Spoofing,
PAMI(44), No. 10, October 2022, pp. 6311-6326.
IEEE DOI 2209
Detectors, Face recognition, Training, Faces, Feature extraction, Training data, Optimization, Face anti-spoofing, meta-teacher, deep-learning BibRef

Wu, Y.Q.[Yi-Qiang], Tao, D.P.[Da-Peng], Luo, Y.[Yong], Cheng, J.[Jun], Li, X.L.[Xue-Long],
Covered Style Mining via Generative Adversarial Networks for Face Anti-spoofing,
PR(132), 2022, pp. 108957.
Elsevier DOI 2209
Face anti-spoofing, Generative adversarial networks, Deep learning BibRef

Raja, K.[Kiran], Gupta, G.[Gourav], Venkatesh, S.[Sushma], Ramachandra, R.[Raghavendra], Busch, C.[Christoph],
Towards generalized morphing attack detection by learning residuals,
IVC(126), 2022, pp. 104535.
Elsevier DOI 2209
Morphing attacks, Morphing attack detection, Face recognition, Vulnerability of biometric systems BibRef

Fu, B.Y.[Bi-Ying], Damer, N.[Naser],
Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality,
IET-Bio(11), No. 5, 2022, pp. 359-382.
DOI Link 2210
BibRef

Mudgalgundurao, R.[Raghavendra], Schuch, P.[Patrick], Raja, K.[Kiran], Ramachandra, R.[Raghavendra], Damer, N.[Naser],
Pixel-wise supervision for presentation attack detection on identity document cards,
IET-Bio(11), No. 5, 2022, pp. 383-395.
DOI Link 2210
BibRef

Kantarci, A.[Alperen], Dertli, H.[Hasan], Ekenel, H.K.[Hazim Kemal],
Deep patch-wise supervision for presentation attack detection,
IET-Bio(11), No. 5, 2022, pp. 396-406.
DOI Link 2210
convolutional neural networks, face antispoofing, presentation attack detection, real-world dataset BibRef

Rezgui, Z.[Zohra], Bassit, A.[Amina], Veldhuis, R.[Raymond],
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation,
IET-Bio(11), No. 5, 2022, pp. 407-419.
DOI Link 2210
adversarial attacks, face recognition, gender classification, privacy protection BibRef

Zheng, X.[Xin], Fan, Y.B.[Yan-Bo], Wu, B.Y.[Bao-Yuan], Zhang, Y.[Yong], Wang, J.[Jue], Pan, S.R.[Shi-Rui],
Robust Physical-World Attacks on Face Recognition,
PR(133), 2023, pp. 109009.
Elsevier DOI 2210
Physical-world adversarial attack, Face recognition, Environmental variations, Curriculum learning BibRef

Zhang, W.T.[Wen-Tian], Liu, H.Z.[Hao-Zhe], Liu, F.[Feng], Ramachandra, R.[Raghavendra], Busch, C.[Christoph],
Effective Presentation Attack Detection Driven by Face Related Task,
ECCV22(V:408-423).
Springer DOI 2211
BibRef

Marcialis, G.L.[Gian Luca], Liu, X.M.[Xiao-Ming], Didaci, L.[Luca],
Biometric presentation attacks: Handcrafted features versus deep learning approaches,
PRL(163), 2022, pp. 55-56.
Elsevier DOI 2212
BibRef

Huang, R.[Rui], Wang, X.[Xin],
Face anti-spoofing using feature distilling and global attention learning,
PR(135), 2023, pp. 109147.
Elsevier DOI 2212
Face anti-spoofing, Anti-interference, Multi-level distillation, Global spatial attention learning, Pixel-wise supervision BibRef

Pei, M.T.[Ming-Tao], Yan, B.[Bin], Hao, H.L.[Hui-Ling], Zhao, M.[Meng],
Person-Specific Face Spoofing Detection Based on a Siamese Network,
PR(135), 2023, pp. 109148.
Elsevier DOI 2212
Face spoofing detection, Identity information, Siamese network BibRef

Wang, C.X.[Cai-Xun], Yu, B.Y.[Bing-Yao], Zhou, J.[Jie],
A Learnable Gradient operator for face presentation attack detection,
PR(135), 2023, pp. 109146.
Elsevier DOI 2212
Face presentation attack detection, Learnable gradient operator, Depth-supervised network BibRef

Li, Z.[Zhi], Li, H.L.[Hao-Liang], Luo, X.[Xin], Hu, Y.J.[Yong-Jian], Lam, K.Y.[Kwok-Yan], Kot, A.C.[Alex C.],
Asymmetric Modality Translation for Face Presentation Attack Detection,
MultMed(25), 2023, pp. 62-76.
IEEE DOI 2301
Faces, Lighting, Face recognition, Transforms, Training, Cameras, Task analysis, Face presentation attack detection, illumination normalization BibRef

Li, H., Wang, S., Kot, A.C.,
Face spoofing detection with image quality regression,
IPTA16(1-6)
IEEE DOI 1703
biometrics (access control) BibRef

Liu, Y.J.[Yao-Jie], Liu, X.M.[Xiao-Ming],
Spoof Trace Disentanglement for Generic Face Anti-Spoofing,
PAMI(45), No. 3, March 2023, pp. 3813-3830.
IEEE DOI 2302
Face recognition, Task analysis, Faces, Feature extraction, Deep learning, Data models, Deep learning, face anti-spoofing, weak supervision BibRef

Liu, Y.J.[Yao-Jie], Stehouwer, J.[Joel], Liu, X.M.[Xiao-Ming],
On Disentangling Spoof Trace for Generic Face Anti-spoofing,
ECCV20(XVIII:406-422).
Springer DOI 2012
BibRef

Zhang, H.T.[Hai-Tao], Chen, B.[Beijing], Wang, J.W.[Jin-Wei], Zhao, G.Y.[Guo-Ying],
A Local Perturbation Generation Method for GAN-Generated Face Anti-Forensics,
CirSysVideo(33), No. 2, February 2023, pp. 661-676.
IEEE DOI 2302
Faces, Detectors, Perturbation methods, Forensics, Visualization, Face recognition, Generative adversarial networks, double mask BibRef

da Silva, V.L.[Vitor Luiz], Lérida, J.L.[Josep Luis], Sarret, M.[Marta], Valls, M.[Magda], Giné, F.[Francesc],
Residual spatiotemporal convolutional networks for face anti-spoofing,
JVCIR(91), 2023, pp. 103744.
Elsevier DOI 2303
Face anti-spoofing, Residual networks, Channel-separated networks, Spoofing detection, Biometrics BibRef

Yu, Z.T.[Zi-Tong], Qin, Y.[Yunxiao], Li, X.B.[Xiao-Bai], Zhao, C.X.[Chen-Xu], Lei, Z.[Zhen], Zhao, G.Y.[Guo-Ying],
Deep Learning for Face Anti-Spoofing: A Survey,
PAMI(45), No. 5, May 2023, pp. 5609-5631.
IEEE DOI 2304
Face recognition, Deep learning, Cameras, Task analysis, Sensors, Protocols, Face anti-spoofing, domain generalization BibRef

Wu, B.[Bin], Su, L.C.[Li-Chao], Chen, D.[Dan], Cheng, Y.L.[Yong-Li],
FPC-Net: Learning to detect face forgery by adaptive feature fusion of patch correlation with CG-Loss,
IET-CV(17), No. 3, 2023, pp. 330-340.
DOI Link 2305
adaptive feature fusion, facial forgery detection BibRef

Liu, Y.[Yongluo], Wu, L.F.[Li-Fang], Li, Z.[Zun], Wang, Z.[Zhuming],
Dual-stream correlation exploration for face anti-Spoofing,
PRL(170), 2023, pp. 17-23.
Elsevier DOI 2306
Face anti-spoofing, Metric correlation learning, Liveness and content feature learning BibRef

Zhu, X.Y.[Xiang-Yu], Fei, H.Y.[Hong-Yan], Zhang, B.[Bin], Zhang, T.S.[Tian-Shuo], Zhang, X.Y.[Xiao-Yu], Li, S.Z.[Stan Z.], Lei, Z.[Zhen],
Face Forgery Detection by 3D Decomposition and Composition Search,
PAMI(45), No. 7, July 2023, pp. 8342-8357.
IEEE DOI 2306
Faces, Forgery, Face recognition, Feature extraction, Lighting, Composition search, differentiable search, fake face, 3D face model BibRef

Zhu, X.Y.[Xiang-Yu], Wang, H.[Hao], Fei, H.Y.[Hong-Yan], Lei, Z.[Zhen], Li, S.Z.[Stan Z.],
Face Forgery Detection by 3D Decomposition,
CVPR21(2928-2938)
IEEE DOI 2111
Geometry, Shape, Face recognition, Lighting, Production BibRef

Chen, S.J.[Sheng-Jie], Wu, G.[Gang], Yang, Y.[Yujiu], Guo, Z.H.[Zhen-Hua],
A simple and effective patch-Based method for frame-level face anti-spoofing,
PRL(171), 2023, pp. 1-7.
Elsevier DOI 2306
Face anti-spoofing, Liveness detection, Image-level, Attention mechanism, Patch sampling BibRef

Jiang, F.L.[Fang-Ling], Li, Q.[Qi], Liu, P.C.[Peng-Cheng], Zhou, X.D.[Xiang-Dong], Sun, Z.A.[Zhen-An],
Adversarial Learning Domain-Invariant Conditional Features for Robust Face Anti-spoofing,
IJCV(131), No. 7, July 2023, pp. 1680-1703.
Springer DOI 2307
BibRef

Zhang, D.H.[Dong-Heng], Meng, J.[Jia], Zhang, J.[Jian], Deng, X.Z.[Xin-Zhe], Ding, S.H.[Shou-Hong], Zhou, M.[Man], Wang, Q.[Qian], Li, Q.[Qi], Chen, Y.[Yan],
SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices,
CirSysVideo(33), No. 8, August 2023, pp. 4401-4414.
IEEE DOI 2308
Ultrasonic imaging, Lips, Faces, Hardware, Mobile handsets, Face recognition, Authentication, Liveness detection, information fusion BibRef

Zhu, S.[Shiwei], Xiang, S.J.[Shi-Jun],
Multiscale residual gradient attention for face anti-spoofing,
JVCIR(95), 2023, pp. 103886.
Elsevier DOI 2309
Face anti-spoofing, Residual gradient convolution, Adjacent depth loss, Local depth auxiliary supervision BibRef

Chen, J.W.[Jia-Wei], Yang, X.[Xiao], Yin, H.[Heng], Ma, M.Z.[Ming-Zhi], Chen, B.[Bihui], Peng, J.T.[Jian-Teng], Guo, Y.D.[Yan-Dong], Yin, Z.X.[Zhao-Xia], Su, H.[Hang],
AdvFAS: A robust face anti-spoofing framework against adversarial examples,
CVIU(235), 2023, pp. 103779.
Elsevier DOI 2310
Face anti-spoofing, Adversarial attack, Deep neural networks, Coupled relationship BibRef

Hu, C.[Cong], Li, Y.B.[Yuan-Bo], Feng, Z.H.[Zhen-Hua], Wu, X.J.[Xiao-Jun],
Attention-guided evolutionary attack with elastic-net regularization on face recognition,
PR(143), 2023, pp. 109760.
Elsevier DOI 2310
Face recognition, Convolutional neural networks, Adversarial examples, Evolutionary attack, Attention mechanisms BibRef


Li, Q.[Qian], Hu, Y.X.[Yu-Xiao], Liu, Y.[Ye], Zhang, D.X.[Dong-Xiao], Jin, X.[Xin], Chen, Y.T.[Yun-Tian],
Discrete Point-Wise Attack is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition,
CVPR23(20575-20584)
IEEE DOI 2309
BibRef

Li, Y.J.[Yan-Jie], Li, Y.[Yiquan], Dai, X.L.[Xue-Long], Guo, S.T.[Song-Tao], Xiao, B.[Bin],
Physical-World Optical Adversarial Attacks on 3D Face Recognition,
CVPR23(24699-24708)
IEEE DOI 2309
BibRef

Li, Z.X.[Ze-Xin], Yin, B.[Bangjie], Yao, T.P.[Tai-Ping], Guo, J.F.[Jun-Feng], Ding, S.H.[Shou-Hong], Chen, S.[Simin], Liu, C.[Cong],
Sibling-Attack: Rethinking Transferable Adversarial Attacks against Face Recognition,
CVPR23(24626-24637)
IEEE DOI 2309
BibRef

Shamshad, F.[Fahad], Srivatsan, K.[Koushik], Nandakumar, K.[Karthik],
Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces,
CVPR23(16469-16478)
IEEE DOI 2309
BibRef

Mundra, S.[Shivansh], Porcile, G.J.A.[Gonzalo J. Aniano], Marvaniya, S.[Smit], Verbus, J.R.[James R.], Farid, H.[Hany],
Exposing GAN-Generated Profile Photos from Compact Embeddings,
WMF23(884-892)
IEEE DOI 2309
BibRef

Yu, Z.T.[Zi-Tong], Liu, A.[Ajian], Zhao, C.X.[Chen-Xu], Cheng, K.H.M.[Kevin H. M.], Cheng, X.[Xu], Zhao, G.Y.[Guo-Ying],
Flexible-Modal Face Anti-Spoofing: A Benchmark,
ChaLearnFAS23(6346-6351)
IEEE DOI 2309
BibRef

Liu, Y.L.[Yong-Luo], Xu, Y.W.[Yao-Wen], Zou, Z.F.[Zhao-Fan], Wang, Z.M.[Zhu-Ming], Zhang, B.[Bowen], Wu, L.F.[Li-Fang], Guo, Z.Z.[Zhi-Zhi], He, Z.X.[Zhi-Xiang],
Adversarial Domain Generalization for Surveillance Face Anti-Spoofing,
ChaLearnFAS23(6352-6360)
IEEE DOI 2309
BibRef

Wang, K.[Keyao], Huang, M.[Mouxiao], Zhang, G.S.[Guo-Sheng], Yue, H.X.[Hai-Xiao], Zhang, G.[Gang], Qiao, Y.[Yu],
Dynamic Feature Queue for Surveillance Face Anti-spoofing via Progressive Training,
ChaLearnFAS23(6372-6379)
IEEE DOI 2309
BibRef

Wang, D.[Dong], Guo, J.[Jia], Shao, Q.Q.[Qi-Qi], He, H.[Haochi], Chen, Z.[Zhian], Xiao, C.[Chuanbao], Liu, A.[Ajian], Escalera, S.[Sergio], Escalante, H.J.[Hugo Jair], Lei, Z.[Zhen], Wan, J.[Jun], Deng, J.K.[Jian-Kang],
Wild Face Anti-Spoofing Challenge 2023: Benchmark and Results,
ChaLearnFAS23(6380-6391)
IEEE DOI 2309
BibRef

Martínez-Díaz, Y.[Yoanna], Méndez-Vázquez, H.[Heydi], Luevano, L.S.[Luis S.], Gonzalez-Mendoza, M.[Miguel],
Exploring the Effectiveness of Lightweight Architectures for Face Anti-Spoofing,
ChaLearnFAS23(6392-6402)
IEEE DOI 2309
BibRef

Zeng, D.H.[Ding-Heng], Gao, L.[Liang], Fang, H.[Hao], Xiang, G.H.[Guo-Hui], Feng, Y.[Yue], Lu, Q.[Quan],
Bandpass Filter Based Dual-stream Network for Face Anti-spoofing,
ChaLearnFAS23(6403-6410)
IEEE DOI 2309
BibRef

Chang, C.J.[Chih-Jung], Lee, Y.C.[Yaw-Chern], Yao, S.H.[Shih-Hsuan], Chen, M.H.[Min-Hung], Wang, C.Y.[Chien-Yi], Lai, S.H.[Shang-Hong], Chen, T.P.C.[Trista Pei-Chun],
A Closer Look at Geometric Temporal Dynamics for Face Anti-Spoofing,
Biometrics23(1081-1091)
IEEE DOI 2309
BibRef

Fang, M.L.[Mei-Ling], Huber, M.[Marco], Damer, N.[Naser],
SynthASpoof: Developing Face Presentation Attack Detection Based on Privacy-friendly Synthetic Data,
Biometrics23(1061-1070)
IEEE DOI 2309
BibRef

Yang, S.L.[Song-Lin], Wang, W.[Wei], Xu, C.Y.[Chen-Ye], He, Z.[Ziwen], Peng, B.[Bo], Dong, J.[Jing],
Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing Models,
Biometrics23(1001-1010)
IEEE DOI 2309
BibRef

Liu, A.[Ajian], Tan, Z.C.[Zi-Chang], Liang, Y.Y.[Yan-Yan], Wan, J.[Jun],
Attack-Agnostic Deep Face Anti-Spoofing,
ChaLearnFAS23(6336-6345)
IEEE DOI 2309
BibRef

Bai, W.M.[Wei-Ming], Liu, Y.F.[Yu-Fan], Zhang, Z.P.[Zhi-Peng], Li, B.[Bing], Hu, W.M.[Wei-Ming],
AUNet: Learning Relations Between Action Units for Face Forgery Detection,
CVPR23(24709-24719)
IEEE DOI 2309
BibRef

Sun, Y.[Yiyou], Liu, Y.[Yaojie], Liu, X.M.[Xiao-Ming], Li, Y.X.[Yi-Xuan], Chu, W.S.[Wen-Sheng],
Rethinking Domain Generalization for Face Anti-spoofing: Separability and Alignment,
CVPR23(24563-24574)
IEEE DOI 2309
BibRef

Zhou, Q.Y.[Qian-Yu], Zhang, K.Y.[Ke-Yue], Yao, T.P.[Tai-Ping], Lu, X.Q.[Xue-Quan], Yi, R.[Ran], Ding, S.H.[Shou-Hong], Ma, L.Z.[Li-Zhuang],
Instance-Aware Domain Generalization for Face Anti-Spoofing,
CVPR23(20453-20463)
IEEE DOI 2309
BibRef

Shi, L.[Liang], Zhang, J.[Jie], Liang, C.Y.[Chen-Yue], Shan, S.G.[Shi-Guang],
Unknown Aware Feature Learning for Face Forgery Detection,
FG21(1-5)
IEEE DOI 2303
Representation learning, Face recognition, Predictive models, Benchmark testing, Forgery BibRef

Deb, D.[Debayan], Liu, X.M.[Xiao-Ming], Jain, A.K.[Anil K.],
FaceGuard: A Self-Supervised Defense Against Adversarial Face Images,
FG23(1-8)
IEEE DOI 2303
Training, Codes, Purification, Face recognition, Perturbation methods, Gesture recognition BibRef

Chuang, C.C.[Chu-Chun], Wang, C.Y.[Chien-Yi], Lai, S.H.[Shang-Hong],
Generalized Face Anti-Spoofing via Multi-Task Learning and One-Side Meta Triplet Loss,
FG23(1-8)
IEEE DOI 2303
Training, Face recognition, Estimation, Gesture recognition, Multitasking, Task analysis BibRef

Panwar, A.[Ankush], Singh, P.[Pratyush], Saha, S.[Suman], Paudel, D.P.[Danda Pani], Van Gool, L.J.[Luc J.],
Unsupervised Compound Domain Adaptation for Face Anti-Spoofing,
FG21(1-8)
IEEE DOI 2303
Training, Performance evaluation, Adaptation models, Face recognition, Lighting, Gesture recognition BibRef

Thakral, K.[Kartik], Mittal, S.[Surbhi], Vatsa, M.[Mayank], Singh, R.[Richa],
PhygitalNet: Unified Face Presentation Attack Detection via One-Class Isolation Learning,
FG23(1-6)
IEEE DOI 2303
Training, Face recognition, Biological system modeling, Gesture recognition, Performance gain, Classification algorithms, Faces BibRef

Shmelkin, R.[Ron], Friedlander, T.[Tomer], Wolf, L.[Lior],
Generating Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution,
FG21(01-08)
IEEE DOI 2303
Dictionaries, Face recognition, Sociology, Neural networks, Gesture recognition, Evolutionary computation BibRef

Vepakomma, P.[Praneeth], Singh, A.[Abhishek], Zhang, E.[Emily], Gupta, O.[Otkrist], Raskar, R.[Ramesh],
NoPeek-Infer: Preventing face reconstruction attacks in distributed inference after on-premise training,
FG21(1-8)
IEEE DOI 2303
Training, Privacy, Correlation, Computational modeling, Distributed databases, Machine learning, Predictive models BibRef

Shao, R.[Rui], Zhang, B.[Bochao], Yuen, P.C.[Pong C.], Patel, V.M.[Vishal M.],
Federated Test-Time Adaptive Face Presentation Attack Detection with Dual-Phase Privacy Preservation,
FG21(1-8)
IEEE DOI 2303
Training, Adaptation models, Data privacy, Data centers, Face recognition, Soft sensors, Predictive models BibRef

Hamblin, J.[Jennifer], Nikhal, K.[Kshitij], Riggan, B.S.[Benjamin S.],
Understanding Cross Domain Presentation Attack Detection for Visible Face Recognition,
FG21(1-8)
IEEE DOI 2303
Training, Costs, Protocols, Shape, Face recognition, Transforms, Sensor systems BibRef

Mirzaalian, H.[Hengameh], Hussein, M.E.[Mohamed E.], Spinoulas, L.[Leonidas], May, J.[Jonathan], Abd-Almageed, W.[Wael],
Explaining Face Presentation Attack Detection Using Natural Language,
FG21(1-8)
IEEE DOI 2303
Training, Face recognition, Biological system modeling, Natural languages, Semantics, Neural networks, Predictive models BibRef

Deb, D.[Debayan], Liu, X.M.[Xiao-Ming], Jain, A.K.[Anil K.],
Unified Detection of Digital and Physical Face Attacks,
FG23(1-8)
IEEE DOI 2303
Codes, Face recognition, Gesture recognition, Detectors, Multitasking, Faces BibRef

Wang, H.[Hanrui], Wang, S.[Shuo], Jin, Z.[Zhe], Wang, Y.[Yandan], Chen, C.[Cunjian], Tistarelli, M.[Massimo],
Similarity-based Gray-box Adversarial Attack Against Deep Face Recognition,
FG21(1-8)
IEEE DOI 2303
Resistance, Data privacy, Databases, Face recognition, Authentication, Gesture recognition BibRef

Al-Refai, R.[Rouqaiah], Nandakumar, K.[Karthik],
A Unified Model for Face Matching and Presentation Attack Detection using an Ensemble of Vision Transformer Features,
BioAttack23(662-671)
IEEE DOI 2302
Deep learning, Face recognition, Conferences, Neural networks, Feature extraction, Transformers, Multitasking BibRef

Liao, C.H.[Chen-Hao], Chen, W.C.[Wen-Cheng], Liu, H.T.[Hsuan-Tung], Yeh, Y.R.[Yi-Ren], Hu, M.C.[Min-Chun], Chen, C.S.[Chu-Song],
Domain Invariant Vision Transformer Learning for Face Anti-spoofing,
WACV23(6087-6096)
IEEE DOI 2302
Protocols, Computational modeling, Aggregates, Transformers, Feature extraction, Data models, Algorithms: Biometrics, face BibRef

Zhu, Y.Z.[Yi-Zhe], Gao, J.L.[Jia-Lin], Liu, Q.[Qiong], Zhou, X.[Xi],
Attention-guided Fine-grained Feature Learning For Robust Face Forgery Detection,
ICPR22(1222-1228)
IEEE DOI 2212
Representation learning, Face recognition, Frequency-domain analysis, Perturbation methods, Semantics, Streaming media BibRef

Liu, A.[Ajian], Wan, J.[Jun], Jiang, N.[Ning], Wang, H.B.[Hong-Bin], Liang, Y.Y.[Yan-Yan],
Disentangling Facial Pose and Appearance Information for Face Anti-spoofing,
ICPR22(4537-4543)
IEEE DOI 2212
Codes, Face recognition, Instruments, Switches, Interference, Benchmark testing, Control systems BibRef

Zhang, S.[Sheng], Gao, Z.B.[Zhi-Bin], Lin, Y.H.[Yun-Hao], Lu, Y.H.[Yu-Hang], Huang, L.[Lianfen],
Dynamic Attention based Domain Generalization for Face Anti-Spoofing,
ICPR22(3413-3421)
IEEE DOI 2212
Convolution, Face recognition, Lighting, Gaussian distribution, Cameras, Frequency division multiplexing, Task analysis BibRef

Sun, C.Y.[Chun-Yu], Chen, S.L.[Song-Lu], Li, X.J.[Xin-Jie], Chen, F.[Feng], Yin, X.C.[Xu-Cheng],
DANet: Dynamic Attention to Spoof Patterns for Face Anti-Spoofing,
ICPR22(1929-1936)
IEEE DOI 2212
Face recognition, Lighting, Feature extraction, Cameras, Robustness, Security BibRef

Hasan, M.[Md], Roy, K.[Koushik], Rupty, L.[Labiba], Hossain, M.S.[Md. Sourave], Sengupta, S.[Shirshajit], Taus, S.N.[Shehzad Noor], Mohammed, N.[Nabeel],
MHASAN: Multi-Head Angular Self Attention Network for Spoof Detection,
ICPR22(154-160)
IEEE DOI 2212
Measurement, Protocols, Error analysis, Face recognition, Pipelines, Neural networks, Authentication BibRef

Belli, D.[Davide], Das, D.[Debasmit], Major, B.[Bence], Porikli, F.M.[Fatih M.],
Online Adaptive Personalization for Face Anti-Spoofing,
ICIP22(351-355)
IEEE DOI 2211
Training, Adaptation models, Costs, Error analysis, Face recognition, Biological system modeling, Face anti-spoofing, personalization, unsupervised adaptation BibRef

Huang, H.P.[Hsin-Ping], Sun, D.Q.[De-Qing], Liu, Y.[Yaojie], Chu, W.S.[Wen-Sheng], Xiao, T.[Taihong], Yuan, J.[Jinwei], Adam, H.[Hartwig], Yang, M.H.[Ming-Hsuan],
Adaptive Transformers for Robust Few-shot Cross-domain Face Anti-spoofing,
ECCV22(XIII:37-54).
Springer DOI 2211
BibRef

Liu, Y.C.[Yu-Chen], Chen, Y.[Yabo], Dai, W.R.[Wen-Rui], Gou, M.R.[Meng-Ran], Huang, C.T.[Chun-Ting], Xiong, H.K.[Hong-Kai],
Source-Free Domain Adaptation with Contrastive Domain Alignment and Self-supervised Exploration for Face Anti-spoofing,
ECCV22(XII:511-528).
Springer DOI 2211
BibRef

Zhou, Q.Y.[Qian-Yu], Zhang, K.Y.[Ke-Yue], Yao, T.P.[Tai-Ping], Yi, R.[Ran], Sheng, K.[Kekai], Ding, S.H.[Shou-Hong], Ma, L.Z.[Li-Zhuang],
Generative Domain Adaptation for Face Anti-Spoofing,
ECCV22(V:335-356).
Springer DOI 2211
BibRef

Rathgeb, C., Nichols, R., Ibsen, M., Drozdowski, P., Busch, C.,
Crowd-Powered Face Manipulation Detection: Fusing Human Examiner Decisions,
ICIP22(181-185)
IEEE DOI 2211
Image analysis, Forensics, Reliability, Task analysis, Faces, Image forensics, manipulation detection, information fusion, human examiners BibRef

Zhuang, W.[Wanyi], Chu, Q.[Qi], Tan, Z.T.[Zhen-Tao], Liu, Q.K.[Qian-Kun], Yuan, H.J.[Hao-Jie], Miao, C.T.[Chang-Tao], Luo, Z.X.[Zi-Xiang], Yu, N.H.[Neng-Hai],
UIA-ViT: Unsupervised Inconsistency-Aware Method Based on Vision Transformer for Face Forgery Detection,
ECCV22(V:391-407).
Springer DOI 2211
BibRef

Sun, K.[Ke], Liu, H.[Hong], Yao, T.P.[Tai-Ping], Sun, X.S.[Xiao-Shuai], Chen, S.[Shen], Ding, S.H.[Shou-Hong], Ji, R.R.[Rong-Rong],
An Information Theoretic Approach for Attention-Driven Face Forgery Detection,
ECCV22(XIV:111-127).
Springer DOI 2211
BibRef

Liang, J.H.[Jia-Hao], Shi, H.F.[Hua-Feng], Deng, W.H.[Wei-Hong],
Exploring Disentangled Content Information for Face Forgery Detection,
ECCV22(XIV:128-145).
Springer DOI 2211
BibRef

Song, L.[Luchuan], Fang, Z.[Zheng], Li, X.D.[Xiao-Dan], Dong, X.Y.[Xiao-Yi], Jin, Z.C.[Zhen-Chao], Chen, Y.F.[Yue-Feng], Lyu, S.W.[Si-Wei],
Adaptive Face Forgery Detection in Cross Domain,
ECCV22(XXXIV:467-484).
Springer DOI 2211
BibRef

Ming, Z.H.[Zu-Heng], Yu, Z.T.[Zi-Tong], Al-Ghadi, M.[Musab], Visani, M.[Muriel], Luqman, M.M.[Muhammad Muzzamil], Burie, J.C.[Jean-Christophe],
Vitranspad: Video Transformer Using Convolution And Self-Attention For Face Presentation Attack Detection,
ICIP22(4248-4252)
IEEE DOI 2211
Convolution, Biometrics (access control), Computational modeling, Neural networks, Transformers, Task analysis, face presentation attack detection BibRef

Ni, Y.S.[Yun-Sheng], Meng, D.[Depu], Yu, C.Q.[Chang-Qian], Quan, C.B.[Cheng-Bin], Ren, D.C.[Dong-Chun], Zhao, Y.J.[You-Jian],
CORE: Consistent Representation Learning for Face Forgery Detection,
WMF22(12-21)
IEEE DOI 2210
Representation learning, Codes, Face recognition, Market research, Forgery BibRef

Wang, C.Y.[Chien-Yi], Lu, Y.D.[Yu-Ding], Yang, S.T.[Shang-Ta], Lai, S.H.[Shang-Hong],
PatchNet: A Simple Face Anti-Spoofing Framework via Fine-Grained Patch Recognition,
CVPR22(20249-20258)
IEEE DOI 2210
Image recognition, Face recognition, Image capture, Benchmark testing, Biometrics, Face and gestures BibRef

Cao, J.[Junyi], Ma, C.[Chao], Yao, T.P.[Tai-Ping], Chen, S.[Shen], Ding, S.H.[Shou-Hong], Yang, X.K.[Xiao-Kang],
End-to-End Reconstruction-Classification Learning for Face Forgery Detection,
CVPR22(4103-4112)
IEEE DOI 2210
Training, Visualization, Face recognition, Benchmark testing, Forgery, Cognition, Robustness, Face and gestures, Biometrics BibRef

Jia, S.[Shuai], Ma, C.[Chao], Yao, T.P.[Tai-Ping], Yin, B.[Bangjie], Ding, S.H.[Shou-Hong], Yang, X.K.[Xiao-Kang],
Exploring Frequency Adversarial Attacks for Face Forgery Detection,
CVPR22(4093-4102)
IEEE DOI 2210
Visualization, Face recognition, Frequency-domain analysis, Perturbation methods, Computational modeling, Detectors, Face and gestures BibRef

Fei, J.W.[Jian-Wei], Dai, Y.S.[Yun-Shu], Yu, P.P.[Pei-Peng], Shen, T.R.[Tian-Run], Xia, Z.H.[Zhi-Hua], Weng, J.[Jian],
Learning Second Order Local Anomaly for General Face Forgery Detection,
CVPR22(20238-20248)
IEEE DOI 2210
Representation learning, Adaptation models, Annotations, Face recognition, Forgery, Filtering theory, Biometrics, Representation learning BibRef

Guetta, N., Shabtai, A., Singh, I., Momiyama, S., Elovici, Y.,
Dodging Attack Using Carefully Crafted Natural Makeup,
Ben-Gurion Universityof the Negev, 14 Sep 2021
WWW Link. BibRef 2109

Mayer, J.[Jillian],
MakeUp Tutorial: How To Hide From Cameras,
YouTubeMay 30, 2013,
WWW Link. BibRef 1305

Cauli, N.[Nino], Ortis, A.[Alessandro], Battiato, S.[Sebastiano],
Fooling a Face Recognition System with a Marker-Free Label-Consistent Backdoor Attack,
CIAP22(II:176-185).
Springer DOI 2205
BibRef

Padnevych, R.[Ruslan], Carmo, D.[David], Semedo, D.[David], Magalhães, J.[João],
Temporal Convolutional Networks for Robust Face Liveness Detection,
IbPRIA22(255-267).
Springer DOI 2205
BibRef

Rostami, M.[Mohammad], Spinoulas, L.[Leonidas], Hussein, M.[Mohamed], Mathai, J.[Joe], Abd-Almageed, W.[Wael],
Detection and Continual Learning of Novel Face Presentation Attacks,
ICCV21(14831-14840)
IEEE DOI 2203
Training, Deep learning, Pollution, Neural networks, Training data, Benchmark testing, Machine learning architectures and formulations BibRef

Byun, J.[Junyoung], Go, H.[Hyojun], Kim, C.[Changick],
Geometrically Adaptive Dictionary Attack on Face Recognition,
WACV22(3809-3818)
IEEE DOI 2202
Limiting, Dictionaries, Perturbation methods, Face recognition, Semantics, Search problems, Adversarial Attack and Defense Methods Deep Learning BibRef

Singh, I.[Inderjeet], Araki, T.[Toshinori], Kakizaki, K.[Kazuya],
Powerful Physical Adversarial Examples Against Practical Face Recognition Systems,
BioAttack22(301-310)
IEEE DOI 2202
Face recognition, Conferences, Machine learning, Performance gain, Complexity theory, Risk management BibRef

Neto, P.C.[Pedro C.], Sequeira, A.F.[Ana F.], Cardoso, J.S.[Jaime S.],
Myope Models: Are face presentation attack detection models short-sighted?,
Explain-Bio22(390-399)
IEEE DOI 2202
Training, Analytical models, Error analysis, Crops, Predictive models, Visual systems, Inspection BibRef

Fang, M.L.[Mei-Ling], Damer, N.[Naser], Kirchbuchner, F.[Florian], Kuijper, A.[Arjan],
Learnable Multi-level Frequency Decomposition and Hierarchical Attention Mechanism for Generalized Face Presentation Attack Detection,
WACV22(1131-1140)
IEEE DOI 2202
Training, Fuses, Frequency-domain analysis, Face recognition, Semantics, Neural networks, Streaming media, Biometrics Biometrics -> Face Processing BibRef

Aghdaie, P.[Poorya], Chaudhary, B.[Baaria], Soleymani, S.[Sobhan], Dawson, J.[Jeremy], Nasrabadi, N.M.[Nasser M.],
Morph Detection Enhanced by Structured Group Sparsity,
BioAttack22(311-320)
IEEE DOI 2202
Training, Visualization, Wavelet domain, Face recognition, Neural networks, Detectors, Feature extraction BibRef

Ghafourian, M.[Mahdi], Fierrez, J.[Julian], Vera-Rodriguez, R.[Ruben], Serna, I.[Ignacio], Morales, A.[Aythami],
OTB-morph: One-Time Biometrics via Morphing applied to Face Templates,
BioAttack22(321-329)
IEEE DOI 2202
Visualization, Face recognition, Conferences, Aging, Servers, Cryptography BibRef

Ramachandra, R.[Raghavendra], Raja, K.[Kiran], Busch, C.[Christoph],
Algorithmic Fairness in Face Morphing Attack Detection,
Perform-Bio22(410-418)
IEEE DOI 2202
Measurement, Ethics, Protocols, Law, Face recognition, Conferences, Training data BibRef

Belli, D.[Davide], Das, D.[Debasmit], Major, B.[Bence], Porikli, F.M.[Fatih M.],
A Personalized Benchmark for Face Anti-spoofing,
BioAttack22(338-348)
IEEE DOI 2202
Image recognition, Face recognition, Conferences, Authentication, Benchmark testing, Data models BibRef

Jeong, Y.[Yonghyun], Kim, D.[Doyeon], Lee, J.[Jaehyeon], Hong, M.[Minki], Hwang, S.[Solbi], Choi, J.W.[Jong-Won],
mToFNet: Object Anti-Spoofing with Mobile Time-of-Flight Data,
WACV22(2997-3006)
IEEE DOI 2202
Training, Geometry, Ethics, Object detection, Media, Lead, Security/Surveillance BibRef

Wang, Y.C.[Yu-Chun], Wang, C.Y.[Chien-Yi], Lai, S.H.[Shang-Hong],
Disentangled Representation with Dual-stage Feature Learning for Face Anti-spoofing,
WACV22(1234-1243)
IEEE DOI 2202
Training, Representation learning, Protocols, Face recognition, Training data, Computer architecture, Biometrics -> Face Processing Biometrics BibRef

Fatemifar, S.[Soroush], Awais, M.[Muhammad], Akbari, A.[Ali], Kittler, J.V.[Josef V.],
Particle Swarm and Pattern Search Optimisation of An Ensemble of Face Anomaly Detectors,
ICIP21(3622-3626)
IEEE DOI 2201
Databases, Optimization methods, Detectors, Learning (artificial intelligence), Feature extraction, Deep Learning BibRef

Luo, Z.B.[Zheng-Bo], Kamata, S.I.[Sei-Ichiro], Sun, Z.T.[Zi-Tang],
Transformer and Node-Compressed DNN Based Dual-Path System for Manipulated Face Detection,
ICIP21(3882-3886)
IEEE DOI 2201
Learning systems, Deep learning, Visualization, Image processing, Pipelines, Neural networks, Ordinary differential equations, face manipulation BibRef

Kaichi, T.[Tomoya], Ozasa, Y.[Yuko],
A Hyperspectral Approach for Unsupervised Spoof Detection With Intra-Sample Distribution,
ICIP21(839-843)
IEEE DOI 2201
Training, Deep learning, Feature extraction, Hyperspectral imaging, Unsupervised spoof detection, hyperspectral image, single-pixel classification BibRef

Hossain, M.S.[M. Sourave], Rupty, L.[Labiba], Roy, K.[Koushik], Hasan, M., Sengupta, S.[Shirshajit], Mohammed, N.[Nabeel],
A-DeepPixBis: Attentional Angular Margin for Face Anti-Spoofing,
DICTA20(1-8)
IEEE DOI 2201
Training, Protocols, Face recognition, Digital images, Neural networks, Entropy, Task analysis BibRef

Yao, C.L.[Cheng-Lin], Wang, S.[Shihe], Zhang, J.[Jialu], He, W.T.[Wen-Tao], Du, H.[Heshan], Ren, J.F.[Jian-Feng], Bai, R.[Ruibin], Liu, J.[Jiang],
rPPG-Based Spoofing Detection for Face Mask Attack using Efficientnet on Weighted Spatial-Temporal Representation,
ICIP21(3872-3876)
IEEE DOI 2201
Image processing, Resists, Photoplethysmography, Distortion, Spatial databases, Noise measurement, Face spoofing detection, spatial-temporal representation BibRef

Damer, N.[Naser], Raja, K.[Kiran], Süßmilch, M.[Marius], Venkatesh, S.[Sushma], Boutros, F.[Fadi], Fang, M.L.[Mei-Ling], Kirchbuchner, F.[Florian], Ramachandra, R.[Raghavendra], Kuijper, A.[Arjan],
ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation,
ISVC21(I:251-264).
Springer DOI 2112
BibRef

Damer, N.[Naser], Spiller, N.[Noémie], Fang, M.L.[Mei-Ling], Boutros, F.[Fadi], Kirchbuchner, F.[Florian], Kuijper, A.[Arjan],
PW-MAD: Pixel-Wise Supervision for Generalized Face Morphing Attack Detection,
ISVC21(I:291-304).
Springer DOI 2112
BibRef

Xu, X.[Xiang], Xiong, Y.J.[Yuan-Jun], Xia, W.[Wei],
On Improving Temporal Consistency for Online Face Liveness Detection System,
ChaLearnFAS21(824-833)
IEEE DOI 2112
Training, Adaptation models, Uncertainty, Face recognition, Computational modeling, Conferences BibRef

Fang, H.[Hao], Liu, A.[Ajian], Wan, J.[Jun], Escalera, S.[Sergio], Escalante, H.J.[Hugo Jair], Lei, Z.[Zhen],
Surveillance Face Presentation Attack Detection Challenge,
ChaLearnFAS23(6361-6371)
IEEE DOI 2309
BibRef

Liu, A.[Ajian], Zhao, C.X.[Chen-Xu], Yu, Z.T.[Zi-Tong], Su, A.Y.[An-Yang], Liu, X.[Xing], Kong, Z.J.[Zi-Jian], Wan, J.[Jun], Escalera, S.[Sergio], Escalante, H.J.[Hugo Jair], Lei, Z.[Zhen], Guo, G.D.[Guo-Dong],
3D High-Fidelity Mask Face Presentation Attack Detection Challenge,
ChaLearnFAS21(814-823)
IEEE DOI 2112
Measurement, Protocols, Face recognition, Companies BibRef

Chen, S.[Shen], Yao, T.P.[Tai-Ping], Zhang, K.Y.[Ke-Yue], Chen, Y.[Yang], Sun, K.[Ke], Ding, S.H.[Shou-Hong], Li, J.L.[Ji-Lin], Huang, F.Y.[Fei-Yue], Ji, R.R.[Rong-Rong],
A Dual-stream Framework for 3D Mask Face Presentation Attack Detection,
ChaLearnFAS21(834-841)
IEEE DOI 2112
Degradation, Smoothing methods, Convolution, Face recognition, Conferences BibRef

Huang, S.[Samuel], Cheng, W.H.[Wen-Huang], Cheng, R.[Robert],
Single Patch Based 3D High-Fidelity Mask Face Anti-Spoofing,
ChaLearnFAS21(842-845)
IEEE DOI 2112
Solid modeling, Protocols, Error analysis, Face recognition, Conferences BibRef

Grinchuk, O.[Oleg], Parkin, A.[Aleksandr], Glazistova, E.[Evgenija],
3D mask presentation attack detection via high resolution face parts,
ChaLearnFAS21(846-853)
IEEE DOI 2112
Training, Deep learning, Data mining, Faces BibRef

Wang, Z.M.[Zhu-Ming], Xu, Y.W.[Yao-Wen], Wu, L.F.[Li-Fang], Han, H.[Hu], Ma, Y.K.[Yu-Kun], Ma, G.Z.[Guo-Zhang],
Multi-Perspective Features Learning for Face Anti-Spoofing,
HTCV21(4099-4105)
IEEE DOI 2112
Training, Protocols, Face recognition, Design methodology, Neural networks BibRef

Gao, G.[Gege], Huang, H.B.[Huai-Bo], Fu, C.Y.[Chao-You], Li, Z.Y.[Zhao-Yang], He, R.[Ran],
Information Bottleneck Disentanglement for Identity Swapping,
CVPR21(3403-3412)
IEEE DOI 2111
Face recognition, Buildings, Detectors, Benchmark testing, Feature extraction, Forgery BibRef

Luo, Y.C.[Yu-Chen], Zhang, Y.[Yong], Yan, J.C.[Jun-Chi], Liu, W.[Wei],
Generalizing Face Forgery Detection with High-frequency Features,
CVPR21(16312-16321)
IEEE DOI 2111
Training, Correlation, Image color analysis, Databases, Face recognition, Detectors, Feature extraction BibRef

George, A.[Anjith], Marcel, S.[Sébastien],
Cross Modal Focal Loss for RGBD Face Anti-Spoofing,
CVPR21(7878-7887)
IEEE DOI 2111
Face recognition, Computational modeling, Computer architecture, Robustness BibRef

Li, J.M.[Jia-Ming], Xie, H.T.[Hong-Tao], Li, J.H.[Jia-Hong], Wang, Z.Y.[Zhong-Yuan], Zhang, Y.D.[Yong-Dong],
Frequency-aware Discriminative Feature Learning Supervised by Single-Center Loss for Face Forgery Detection,
CVPR21(6454-6463)
IEEE DOI 2111
Measurement, Face recognition, Frequency-domain analysis, Filter banks, Boosting, Forgery BibRef

Zhou, T.F.[Tian-Fei], Wang, W.G.[Wen-Guan], Liang, Z.Y.[Zhi-Yuan], Shen, J.B.[Jian-Bing],
Face Forensics in the Wild,
CVPR21(5774-5784)
IEEE DOI 2111
Location awareness, Costs, Face recognition, Forensics, Benchmark testing, Forgery, Classification algorithms BibRef

He, Y.N.[Yi-Nan], Gan, B.[Bei], Chen, S.[Siyu], Zhou, Y.C.[Yi-Chun], Yin, G.J.[Guo-Jun], Song, L.C.[Lu-Chuan], Sheng, L.[Lu], Shao, J.[Jing], Liu, Z.[Ziwei],
ForgeryNet: A Versatile Benchmark for Comprehensive Forgery Analysis,
CVPR21(4358-4367)
IEEE DOI 2111
Location awareness, Image segmentation, Technological innovation, Annotations, Face recognition, Perturbation methods, Benchmark testing BibRef

Liu, H.G.[Hong-Gu], Li, X.D.[Xiao-Dan], Zhou, W.[Wenbo], Chen, Y.F.[Yue-Feng], He, Y.[Yuan], Xue, H.[Hui], Zhang, W.M.[Wei-Ming], Yu, N.H.[Neng-Hai],
Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain,
CVPR21(772-781)
IEEE DOI 2111
Face recognition, Frequency-domain analysis, Semantics, Forgery, Robustness, Security BibRef

Wang, C.R.[Cheng-Rui], Deng, W.H.[Wei-Hong],
Representative Forgery Mining for Fake Face Detection,
CVPR21(14918-14927)
IEEE DOI 2111
Codes, Face recognition, Refining, Training data, Data visualization, Detectors, Forgery BibRef

Wenger, E.[Emily], Passananti, J.[Josephine], Bhagoji, A.N.[Arjun Nitin], Yao, Y.[Yuanshun], Zheng, H.T.[Hai-Tao], Zhao, B.Y.[Ben Y.],
Backdoor Attacks Against Deep Learning Systems in the Physical World,
CVPR21(6202-6211)
IEEE DOI 2111
Deep learning, Face recognition, Robustness, Task analysis, Facial features BibRef

Chaudhary, B.[Baaria], Aghdaie, P.[Poorya], Soleymani, S.[Sobhan], Dawson, J.[Jeremy], Nasrabadi, N.M.[Nasser M.],
Differential Morph Face Detection using Discriminative Wavelet Sub-bands,
Biometrics21(1425-1434)
IEEE DOI 2109
Training, Wavelet domain, Protocols, Face recognition, Frequency-domain analysis, Neural networks, Entropy BibRef

Sabel, J.[Johan], Johansson, F.[Fredrik],
On the Robustness and Generalizability of Face Synthesis Detection Methods,
WMF21(962-971)
IEEE DOI 2109
Training, Learning systems, Perturbation methods, Face recognition, Robustness BibRef

Schwarcz, S.[Steven], Chellappa, R.[Rama],
Finding Facial Forgery Artifacts with Parts-Based Detectors,
WMF21(933-942)
IEEE DOI 2109
Deep learning, Social networking (online), Face recognition, Neural networks, Detectors BibRef

Mallat, K.[Khawla], Dugelay, J.L.[Jean-Luc],
Indirect synthetic attack on thermal face biometric systems via visible-to-thermal spectrum conversion,
Biometrics21(1435-1443)
IEEE DOI 2109
Error analysis, Social networking (online), Face recognition, Communication channels, Thermal sensors BibRef

Soleymani, S.[Sobhan], Dabouei, A.[Ali], Taherkhani, F.[Fariborz], Dawson, J.[Jeremy], Nasrabadi, N.M.[Nasser M.],
Mutual Information Maximization on Disentangled Representations for Differential Morph Detection,
WACV21(1730-1740)
IEEE DOI 2106
Faces, Mutual information BibRef

Liu, Z.[Zhao], Feng, Z.[Zunlei], Zou, Z.[Zeyu], Zhang, R.[Rong], Song, M.L.[Ming-Li], Shen, J.P.[Jian-Ping],
Disentangled Representation based Face Anti-Spoofing,
ICPR21(2017-2024)
IEEE DOI 2105
Face recognition, Task analysis, Image reconstruction BibRef

Sanghvi, N.[Nilay], Singh, S.K.[Sushant Kumar], Agarwal, A.[Akshay], Vatsa, M.[Mayank], Singh, R.[Richa],
MixNet for Generalized Face Presentation Attack Detection,
ICPR21(5511-5518)
IEEE DOI 2105
Databases, Face recognition, Distance measurement, Reliability, Convolutional neural networks, Detection algorithms BibRef

Komkov, S.[Stepan], Petiushko, A.[Aleksandr],
AdvHat: Real-World Adversarial Attack on ArcFace Face ID System,
ICPR21(819-826)
IEEE DOI 2105
Image color analysis, Face recognition, Printers BibRef

Shi, L.[Lei], Zhou, Z.[Zhuo], Guo, Z.H.[Zhen-Hua],
Face Anti-Spoofing Using Spatial Pyramid Pooling,
ICPR21(2126-2133)
IEEE DOI 2105
Fuses, Databases, Face recognition, Complex networks, Face Anti-Spoofing, Presentation Attack, Multi-scale Information BibRef

Ji, Q.B.[Qiao-Bin], Xu, S.G.[Shu-Gong], Chen, X.D.[Xu-Dong], Zhang, S.Q.[Shun-Qing], Cao, S.[Shan],
A Cross Domain Multi-modal Dataset for Robust Face Anti-spoofing,
ICPR21(4309-4316)
IEEE DOI 2105
Training, Protocols, Face recognition, Data visualization, Cameras, Robustness, Hardware BibRef

Zhou, J.W.[Jun-Wei], Shu, K.[Ke], Liu, P.[Peng], Xiang, J.W.[Jian-Wen], Xiong, S.W.[Sheng-Wu],
Face Anti-Spoofing Based on Dynamic Color Texture Analysis Using Local Directional Number Pattern,
ICPR21(4221-4228)
IEEE DOI 2105
Support vector machines, Databases, Image color analysis, Face recognition, Lighting, Probabilistic logic, Feature extraction BibRef

Dou, Y.Q.[Yong-Qiang], Yang, H.C.[Hao-Cheng], Yang, M.L.[Mao-Lin], Xu, Y.Y.[Yan-Yan], Ke, D.F.[Deng-Feng],
Dynamically Mitigating Data Discrepancy with Balanced Focal Loss for Replay Attack Detection,
ICPR21(4115-4122)
IEEE DOI 2105
Training, Learning systems, Deep learning, Bridges, Time-frequency analysis, Neural networks, Detectors, Anti-spoofing, Modified GD-gram BibRef

Han, J.[Jian], Gevers, T.[Theo],
MMD Based Discriminative Learning for Face Forgery Detection,
ACCV20(V:121-136).
Springer DOI 2103
BibRef

Zhang, Y.G.[Yu-Ge], Zhao, M.[Min], Yan, L.B.[Long-Bin], Gao, T.D.[Tian-De], Chen, J.[Jie],
CNN-Based Anomaly Detection for Face Presentation Attack Detection with Multi-Channel Images,
VCIP20(189-192)
IEEE DOI 2102
Face recognition, Feature extraction, Faces, Anomaly detection, Training, Task analysis, Neural networks, multi-channel CNN BibRef

Chen, S., Li, W., Yang, H., Huang, D., Wang, Y.,
3D Face Mask Anti-spoofing via Deep Fusion of Dynamic Texture and Shape Clues,
FG20(314-321)
IEEE DOI 2102
Faces, Videos, Feature extraction, Shape, Face recognition, deep fusion BibRef

Kotwal, K., Marcel, S.,
CNN Patch Pooling for Detecting 3D Mask Presentation Attacks in NIR,
ICIP20(1336-1340)
IEEE DOI 2011
Biometrics, Face Presentation Attack Detection, 3D Mask Attacks, Patch Pooling Layer BibRef

Tarasiou, M., Zafeiriou, S.P.,
Extracting Deep Local Features to Detect Manipulated Images of Human Faces,
ICIP20(1821-1825)
IEEE DOI 2011
Faces, Feature extraction, Training, Forgery, Task analysis, Videos, Image segmentation BibRef

Huang, R., Fang, F., Nguyen, H.H., Yamagishi, J., Echizen, I.,
Security of Facial Forensics Models Against Adversarial Attacks,
ICIP20(2236-2240)
IEEE DOI 2011
Perturbation methods, Image segmentation, Neurons, Linear programming, Security, Forensics, Forgery, forgery forensics, over-firing BibRef

Weitzner, D., Mendlovic, D., Giryes, R.,
Face Authentication From Grayscale Coded Light Field,
ICIP20(2611-2615)
IEEE DOI 2011
Anti-spoofing, biometrics, coded light field, depth sensing, facial recognition BibRef

Fatemifar, S., Awais, M., Akbari, A., Kittler, J.V.[Josef V.],
A Stacking Ensemble for Anomaly Based Client-Specific Face Spoofing Detection,
ICIP20(1371-1375)
IEEE DOI 2011
Spoofing Detection, Anomaly detection, Ensemble Pruning, CNNs, Fusion of Anomaly Classifiers BibRef

Zhang, K.Y.[Ke-Yue], Yao, T.P.[Tai-Ping], Zhang, J.[Jian], Tai, Y.[Ying], Ding, S.H.[Shou-Hong], Li, J.L.[Ji-Lin], Huang, F.Y.[Fei-Yue], Song, H.C.[Hai-Chuan], Ma, L.Z.[Li-Zhuang],
Face Anti-spoofing via Disentangled Representation Learning,
ECCV20(XIX:641-657).
Springer DOI 2011
BibRef

Li, L., Bao, J., Yang, H., Chen, D., Wen, F.,
Advancing High Fidelity Identity Swapping for Forgery Detection,
CVPR20(5073-5082)
IEEE DOI 2008
Face, Lighting, Image resolution, Adaptive systems, Shape, Generators, Training BibRef

Wang, S., Wang, O., Zhang, R., Owens, A., Efros, A.A.,
CNN-Generated Images Are Surprisingly Easy to Spot… for Now,
CVPR20(8692-8701)
IEEE DOI 2008
Training, Image generation, Face, Image resolution, Detectors, Generators BibRef

Hulzebosch, N., Ibrahimi, S., Worring, M.,
Detecting CNN-Generated Facial Images in Real-World Scenarios,
WMF20(2729-2738)
IEEE DOI 2008
Training, Image color analysis, Data models, Visualization, Forgery, Image resolution BibRef

Jiang, L., Li, R., Wu, W., Qian, C., Loy, C.C.,
DeeperForensics-1.0: A Large-Scale Dataset for Real-World Face Forgery Detection,
CVPR20(2886-2895)
IEEE DOI 2008
Videos, Face, Forgery, Benchmark testing, Perturbation methods, Data collection, Lighting BibRef

Liu, Z., Qi, X., Torr, P.H.S.,
Global Texture Enhancement for Fake Face Detection in the Wild,
CVPR20(8057-8066)
IEEE DOI 2008
Face, Skin, Face detection, Robustness, Image color analysis, Training BibRef

Wang, Z.D.[Zhen-Dong], Bao, J.M.[Jian-Min], Zhou, W.G.[Wen-Gang], Wang, W.L.[Wei-Lun], Li, H.Q.[Hou-Qiang],
AltFreezing for More General Video Face Forgery Detection,
CVPR23(4129-4138)
IEEE DOI 2309
BibRef

Zheng, Y.L.[Ying-Lin], Bao, J.M.[Jian-Min], Chen, D.[Dong], Zeng, M.[Ming], Wen, F.[Fang],
Exploring Temporal Coherence for More General Video Face Forgery Detection,
ICCV21(15024-15034)
IEEE DOI 2203
Convolution, Coherence, Transformers, Feature extraction, Forgery, Robustness, Kernel, Video analysis and understanding BibRef

Li, L.Z.[Ling-Zhi], Bao, J.M.[Jian-Min], Zhang, T.[Ting], Yang, H.[Hao], Chen, D.[Dong], Wen, F.[Fang], Guo, B.N.[Bai-Ning],
Face X-Ray for More General Face Forgery Detection,
CVPR20(5000-5009)
IEEE DOI 2008
Face, Forgery, X-ray imaging, Image color analysis, Detectors, Forensics, Focusing BibRef

Wang, G., Han, H., Shan, S., Chen, X.,
Cross-Domain Face Presentation Attack Detection via Multi-Domain Disentangled Representation Learning,
CVPR20(6677-6686)
IEEE DOI 2008
Face, Robustness, Testing, Task analysis, Training, Machine learning BibRef

Nguyen, D., Arora, S.S., Wu, Y., Yang, H.,
Adversarial Light Projection Attacks on Face Recognition Systems: A Feasibility Study,
Biometrics20(3548-3556)
IEEE DOI 2008
Face recognition, Cameras, Face, Calibration, Real-time systems, Target recognition BibRef

Dang, H., Liu, F., Stehouwer, J., Liu, X., Jain, A.K.,
On the Detection of Digital Face Manipulation,
CVPR20(5780-5789)
IEEE DOI 2008
Face, Forgery, Videos, Machine learning, Cameras BibRef

Saha, S., Xu, W., Kanakis, M., Georgoulis, S., Chen, Y., Paudel, D.P.[Danda Pani], Van Gool, L.J.[Luc J.],
Domain Agnostic Feature Learning for Image and Video Based Face Anti-spoofing,
Biometrics20(3490-3499)
IEEE DOI 2008
Face, Lighting, Authentication, Feature extraction, Cameras, Visualization BibRef

Yang, Q., Zhu, X., Fwu, J., Ye, Y., You, G., Zhu, Y.,
PipeNet: Selective Modal Pipeline of Fusion Network for Multi-Modal Face Anti-Spoofing,
WMF20(2739-2747)
IEEE DOI 2008
Face, Pipelines, Task analysis, Protocols, Switched mode power supplies, Streaming media BibRef

Jia, Y., Zhang, J., Shan, S., Chen, X.,
Single-Side Domain Generalization for Face Anti-Spoofing,
CVPR20(8481-8490)
IEEE DOI 2008
Face, Feature extraction, Generators, Training, Aggregates, Databases, Face recognition BibRef

Stehouwer, J., Jourabloo, A., Liu, Y., Liu, X.,
Noise Modeling, Synthesis and Classification for Generic Object Anti-Spoofing,
CVPR20(7292-7301)
IEEE DOI 2008
Sensors, Image sensors, Generators, Prototypes, Face, Task analysis, Training BibRef

Wang, Z., Yu, Z., Zhao, C., Zhu, X., Qin, Y., Zhou, Q., Zhou, F., Lei, Z.,
Deep Spatial Gradient and Temporal Depth Learning for Face Anti-Spoofing,
CVPR20(5041-5050)
IEEE DOI 2008
Face, Feature extraction, Task analysis, Face recognition, Logic gates, Estimation BibRef

Yu, Z.T.[Zi-Tong], Zhao, C.X.[Chen-Xu], Wang, Z.Z.[Ze-Zheng], Qin, Y.X.[Yun-Xiao], Su, Z.[Zhuo], Li, X.B.[Xiao-Bai], Zhou, F.[Feng], Zhao, G.Y.[Guo-Ying],
Searching Central Difference Convolutional Networks for Face Anti-Spoofing,
CVPR20(5294-5304)
IEEE DOI 2008
Convolutional codes, Face, Task analysis, Feature extraction, Convolution, Robustness, Videos BibRef

Yu, Z.T.[Zi-Tong], Qin, Y.X.[Yun-Xiao], Li, X.B.[Xiao-Bai], Wang, Z.Z.[Ze-Zheng], Zhao, C.X.[Chen-Xu], Lei, Z.[Zhen], Zhao, G.Y.[Guo-Ying],
Multi-Modal Face Anti-Spoofing Based on Central Difference Networks,
WMF20(2766-2774)
IEEE DOI 2008
Face, Convolution, Protocols, Feature extraction, Robustness, Task analysis, Videos BibRef

Zhang, S.F.[Shi-Feng], Wang, X.B.[Xiao-Bo], Liu, A.[Ajian], Zhao, C.X.[Chen-Xu], Wan, J.[Jun], Escalera, S.[Sergio], Shi, H.L.[Hai-Lin], Wang, Z.[Zezheng], Li, S.Z.[Stan Z.],
A Dataset and Benchmark for Large-Scale Multi-Modal Face Anti-Spoofing,
CVPR19(919-928).
IEEE DOI 2002
BibRef

Liu, S., Lan, X., Yuen, P.C.,
Temporal Similarity Analysis of Remote Photoplethysmography for Fast 3D Mask Face Presentation Attack Detection,
WACV20(2597-2605)
IEEE DOI 2006
Face, Heart beat, Cameras, Lighting, Skin, Time-domain analysis BibRef

Venkatesh, S., Ramachandra, R., Raja, K., Spreeuwers, L.J., Veldhuis, R.N.J., Busch, C.,
Detecting Morphed Face Attacks Using Residual Noise from Deep Multi-scale Context Aggregation Network,
WACV20(269-278)
IEEE DOI 2006
Face, Noise reduction, Feature extraction, Machine learning, Image fusion, Wavelet transforms, Reliability BibRef

Joshi, A., Mukherjee, A., Sarkar, S., Hegde, C.,
Semantic Adversarial Attacks: Parametric Transformations That Fool Deep Classifiers,
ICCV19(4772-4782)
IEEE DOI 2004
face recognition, image classification, learning (artificial intelligence), neural nets, Neural networks BibRef

Rössler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Niessner, M.,
FaceForensics++: Learning to Detect Manipulated Facial Images,
ICCV19(1-11)
IEEE DOI 2004
data compression, face recognition, feature extraction, image coding, image enhancement, image forensics, Databases BibRef

Yu, N., Davis, L., Fritz, M.,
Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints,
ICCV19(7555-7565)
IEEE DOI 2004
image classification, neural nets, security of data, fake images, generative adversarial networks, photorealistic images, Intellectual property BibRef

Deng, J.K.[Jian-Kang], Guo, J.[Jia], Liu, T.L.[Tong-Liang], Gong, M.M.[Ming-Ming], Zafeiriou, S.P.[Stefanos P.],
Sub-center Arcface: Boosting Face Recognition by Large-scale Noisy Web Faces,
ECCV20(XI:741-757).
Springer DOI 2011
BibRef

Deng, J.K.[Jian-Kang], Zafeiriou, S.P.[Stefanos P.],
ArcFace for Disguised Face Recognition,
DFW19(485-493)
IEEE DOI 2004
face recognition, feature extraction, visual databases, intra-class compactness, inter-class discrepancy, Disguised Face Recognition BibRef

Kim, T., Kim, Y., Kim, I., Kim, D.,
BASN: Enriching Feature Representation Using Bipartite Auxiliary Supervisions for Face Anti-Spoofing,
DFW19(494-503)
IEEE DOI 2004
face recognition, feature extraction, image representation, learning (artificial intelligence), security of data, Deep Convolutional Neural Networks BibRef

Chen, W.[Weilun], Zhang, Z.X.[Zhao-Xiang], Hu, X.L.[Xiao-Lin], Wu, B.Y.[Bao-Yuan],
Boosting Decision-based Black-box Adversarial Attacks with Random Sign Flip,
ECCV20(XV:276-293).
Springer DOI 2011
BibRef

Wang, X.S.[Xiao-Sen], Zhang, Z.L.[Ze-Liang], Tong, K.H.[Kang-Heng], Gong, D.H.[Di-Hong], He, K.[Kun], Li, Z.F.[Zhi-Feng], Liu, W.[Wei],
Triangle Attack: A Query-Efficient Decision-Based Adversarial Attack,
ECCV22(V:156-174).
Springer DOI 2211
BibRef

Dong, Y.P.[Yin-Peng], Su, H.[Hang], Wu, B.Y.[Bao-Yuan], Li, Z.F.[Zhi-Feng], Liu, W.[Wei], Zhang, T.[Tong], Zhu, J.[Jun],
Efficient Decision-Based Black-Box Adversarial Attacks on Face Recognition,
CVPR19(7706-7714).
IEEE DOI 2002
BibRef

Shao, R.[Rui], Lan, X.Y.[Xiang-Yuan], Li, J.W.[Jia-Wei], Yuen, P.C.[Pong C.],
Multi-Adversarial Discriminative Deep Domain Generalization for Face Presentation Attack Detection,
CVPR19(10015-10023).
IEEE DOI 2002
BibRef

Yang, X.[Xiao], Luo, W.H.[Wen-Han], Bao, L.C.[Lin-Chao], Gao, Y.[Yuan], Gong, D.H.[Di-Hong], Zheng, S.B.[Shi-Bao], Li, Z.F.[Zhi-Feng], Liu, W.[Wei],
Face Anti-Spoofing: Model Matters, so Does Data,
CVPR19(3502-3511).
IEEE DOI 2002
BibRef

Liu, Y.[Yaojie], Stehouwer, J.[Joel], Jourabloo, A.[Amin], Liu, X.M.[Xiao-Ming],
Deep Tree Learning for Zero-Shot Face Anti-Spoofing,
CVPR19(4675-4684).
IEEE DOI 2002
BibRef

Miyata, M.[Mari], Aizawa, K.[Kiyoharu],
Estimation of Impression Associated With Portraits Using Facial Landmarks and Visual Features,
ICIP20(1421-1425)
IEEE DOI 2011
BibRef
Earlier:
Impression Estimation for Deformed Portraits With a Landmark-Based Ranking Network,
ICIP19(1950-1954)
IEEE DOI 1910
Not really spoofing, but manipulation. How to manipulate a portrait for posting. Impression estimation, Portrait manipulation, Relative attribute, Face, Impression word. Portrait, impression, deformation, learning to rank, relative attribute BibRef

Jia, S.[Shan], Hu, C.B.[Chuan-Bo], Guo, G.D.[Guo-Dong], Xu, Z.Q.[Zheng-Quan],
A Database for Face Presentation Attack Using Wax Figure Faces,
NTIAP19(39-47).
Springer DOI 1909
BibRef

Debiasi, L.[Luca], Damer, N.[Naser], Saladié, A.M.[Alexandra Moseguí], Rathgeb, C.[Christian], Scherhag, U.[Ulrich], Busch, C.[Christoph], Kirchbuchner, F.[Florian], Uhl, A.[Andreas],
On the Detection of GAN-Based Face Morphs Using Established Morph Detectors,
CIAP19(II:345-356).
Springer DOI 1909
BibRef

Natsume, R.[Ryota], Inoue, K.[Kazuki], Fukuhara, Y.[Yoshihiro], Yamamoto, S.[Shintaro], Morishima, S.[Shigeo], Kataoka, H.[Hirokatsu],
Understanding Fake Faces,
BrainDriven18(III:566-576).
Springer DOI 1905
BibRef

Damer, N.[Naser], Boller, V.[Viola], Wainakh, Y.[Yaza], Boutros, F.[Fadi], Terhörst, P.[Philipp], Braun, A.[Andreas], Kuijper, A.[Arjan],
Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts,
GCPR18(518-534).
Springer DOI 1905
BibRef

Dabouei, A., Taherkhani, F., Soleymani, S., Dawson, J., Nasrabadi, N.M.,
Boosting Deep Face Recognition via Disentangling Appearance and Geometry,
WACV20(309-318)
IEEE DOI 2006
Face, Geometry, Face recognition, Training, Task analysis, Manifolds, Loss measurement BibRef

Dabouei, A.[Ali], Soleymani, S.[Sobhan], Dawson, J.[Jeremy], Nasrabadi, N.M.[Nasser M.],
Fast Geometrically-Perturbed Adversarial Faces,
WACV19(1979-1988)
IEEE DOI 1904
face recognition, learning (artificial intelligence), security of data, Transforms BibRef

Liu, J., Kumar, A.,
Detecting Presentation Attacks from 3D Face Masks Under Multispectral Imaging,
DFW18(47-475)
IEEE DOI 1812
Face, Convolution, Biometrics (access control), Lighting, Databases, Multispectral imaging BibRef

Sharif, M., Baue, L., Reite, M.K.,
On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples,
PRIV18(1686-16868)
IEEE DOI 1812
Machine learning, Measurement, Training, Cancer, Object recognition, Face recognition BibRef

Zhang, K., Chang, Y., Hsu, W.,
Deep Disguised Faces Recognition,
DFW18(32-324)
IEEE DOI 1812
Face recognition, Training, Testing, Feature extraction, Principal component analysis, Training data, Pipelines BibRef

Kohli, N., Yadav, D., Noore, A.,
Face Verification with Disguise Variations via Deep Disguise Recognizer,
DFW18(17-177)
IEEE DOI 1812
Face, Databases, Face recognition, Training, Convolution, Image recognition BibRef

Gupta, I., Bhalla, I., Singh, R., Vatsa, M.,
Scattering Transform for Matching Surgically Altered Face Images,
ICPR18(2215-2220)
IEEE DOI 1812
Surgery, Face, Scattering, Feature extraction, Face recognition, Wavelet transforms BibRef

Ming, Z., Chazalon, J., Muzzamil Luqman, M., Visani, M., Burie, J.,
FaceLiveNet: End-to-End Networks Combining Face Verification with Interactive Facial Expression-Based Liveness Detection,
ICPR18(3507-3512)
IEEE DOI 1812
Face, Face recognition, Training, Task analysis, Authentication, Protocols, Image recognition BibRef

Sun, X., Huang, L., Liu, C.,
Multimodal Face Spoofing Detection via RGB-D Images,
ICPR18(2221-2226)
IEEE DOI 1812
Face, Image color analysis, Correlation, Color, Skin, Entropy BibRef

Luo, S., Kan, M., Wu, S.Z.[Shu-Zhe], Chen, X.L.[Xi-Lin], Shan, S.G.[Shi-Guang],
Face Anti-Spoofing with Multi-Scale Information,
ICPR18(3402-3407)
IEEE DOI 1812
Face, Feature extraction, Agriculture, Training, Convolutional neural networks, Printing BibRef

Guo, X.[Xiao], Liu, Y.J.[Yao-Jie], Jain, A.[Anil], Liu, X.M.[Xiao-Ming],
Multi-domain Learning for Updating Face Anti-spoofing Models,
ECCV22(XIII:230-249).
Springer DOI 2211
BibRef

Liu, Y.J.[Yao-Jie], Jourabloo, A.[Amin], Liu, X.M.[Xiao-Ming],
Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision,
CVPR18(389-398)
IEEE DOI 1812
Face, Databases, Face recognition, Lighting, Shape, BibRef

Jourabloo, A.[Amin], Liu, Y.[Yaojie], Liu, X.M.[Xiao-Ming],
Face De-spoofing: Anti-spoofing via Noise Modeling,
ECCV18(XIII: 297-315).
Springer DOI 1810
BibRef

Liu, S.Q.[Si-Qi], Lan, X.Y.[Xiang-Yuan], Yuen, P.C.[Pong C.],
Remote Photoplethysmography Correspondence Feature for 3D Mask Face Presentation Attack Detection,
ECCV18(XVI: 577-594).
Springer DOI 1810
BibRef

Lavrentyeva, G.[Galina], Kudashev, O.[Oleg], Melnikov, A.[Aleksandr], de Marsico, M.[Maria], Matveev, Y.[Yuri],
Interactive Photo Liveness for Presentation Attacks Detection,
ICIAR18(252-258).
Springer DOI 1807
BibRef

Paiz-Reyes, E.[Evelyn], Nunes-de-Lima, N.[Nadile], Ablanedo, J.[Jennie], Fairchild, E.[Elaine], Griffith, T.[Tami], Rodeheffer, C.[Christopher],
Is This Person Real? Avatar Stylization and Its Influence on Human Perception in a Counseling Training Environment,
VAMR18(I: 279-289).
Springer DOI 1807
BibRef

Damer, N.[Naser], Dimitrov, K.[Kristiyan],
Practical View on Face Presentation Attack Detection,
BMVC16(xx-yy).
HTML Version. 1805
BibRef

Song, X., Zhao, X., Lin, T.,
Face spoofing detection by fusing binocular depth and spatial pyramid coding micro-texture features,
ICIP17(96-100)
IEEE DOI 1803
Cameras, Encoding, Face, Feature extraction, Lighting, Robustness, Support vector machines, Face spoofing detection, template face registration BibRef

Souza, G.B.[Gustavo B.], Santos, D.F.S.[Daniel F. S.], Pires, R.G.[Rafael G.], Marana, A.N.[Aparecido N.], Papa, J.P.[João P.],
Efficient Transfer Learning for Robust Face Spoofing Detection,
CIARP17(643-651).
Springer DOI 1802
BibRef

Ali, A.[Asad], Alsufyani, N.[Nawal], Hoque, S.[Sanaul], Deravi, F.[Farzin],
Biometric Counter-Spoofing for Mobile Devices Using Gaze Information,
PReMI17(11-18).
Springer DOI 1711
BibRef

Agarwal, A., Yadav, D., Kohli, N., Singh, R., Vatsa, M., Noore, A.,
Face Presentation Attack with Latex Masks in Multispectral Videos,
PBVS17(275-283)
IEEE DOI 1709
Databases, Face, Face recognition, Probes, Videos BibRef

Zhou, P.[Peng], Han, X.T.[Xin-Tong], Morariu, V.I.[Vlad I.], Davis, L.S.[Larry S.],
Two-Stream Neural Networks for Tampered Face Detection,
MedForen17(1831-1839)
IEEE DOI 1709
Cameras, Face, Feature extraction, Lighting, Streaming media, Support vector machines, Transform coding BibRef

Raghavendra, R., Raja, K.B., Venkatesh, S., Busch, C.,
Transferable Deep-CNN Features for Detecting Digital and Print-Scanned Morphed Face Images,
MedForen17(1822-1830)
IEEE DOI 1709
Convolution, Databases, Face, Face detection, Face recognition, Feature, extraction BibRef

Peng, B., Wang, W., Dong, J., Tan, T.,
Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces,
MedForen17(1813-1821)
IEEE DOI 1709
Cameras, Distortion, Estimation, Forensics, Solid modeling, BibRef

Seibold, C.[Clemens], Samek, W.[Wojciech], Hilsmann, A.[Anna], Eisert, P.[Peter],
Detection of Face Morphing Attacks by Deep Learning,
IWDW17(107-120).
Springer DOI 1708
BibRef

Wandzik, L.[Lukasz], Garcia, R.V.[Raul Vicente], Kaeding, G.[Gerald], Chen, X.[Xi],
CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing,
IWDW17(121-135).
Springer DOI 1708
BibRef

Neubert, T.[Tom],
Face Morphing Detection: An Approach Based on Image Degradation Analysis,
IWDW17(93-106).
Springer DOI 1708
BibRef

Asim, M.[Muhammad], Ming, Z.[Zhu], Javed, M.Y.,
CNN based spatio-temporal feature extraction for face anti-spoofing,
ICIVC17(234-238)
IEEE DOI 1708
Error analysis, Face, Feature extraction, Histograms, Video sequences, Videos, CASIA, LBP-TOP, REPLAY-ATTACK, anti-spoofing, convolutional neural network (CNN), spatio-temporal BibRef

Nowara, E.M., Sabharwal, A., Veeraraghavan, A.,
PPGSecure: Biometric Presentation Attack Detection Using Photopletysmograms,
FG17(56-62)
IEEE DOI 1707
Authentication, Blood, Color, Face, Feature extraction, Physiology, Skin BibRef

Tang, Y., Chen, L.,
3D Facial Geometric Attributes Based Anti-Spoofing Approach against Mask Attacks,
FG17(589-595)
IEEE DOI 1707
Databases, Estimation, Face, Face recognition, Facial features, Shape, Three-dimensional, displays BibRef

Lucena, O.[Oeslle], Junior, A.[Amadeu], Moia, V.[Vitor], Souza, R.[Roberto], Valle, E.[Eduardo], Lotufo, R.[Roberto],
Transfer Learning Using Convolutional Neural Networks for Face Anti-spoofing,
ICIAR17(27-34).
Springer DOI 1706
BibRef

Zhang, X.[Xu], Hu, X., Ma, M., Chen, C.[Chen], Peng, S.,
Face spoofing detection based on 3D lighting environment analysis of image pair,
ICPR16(2995-3000)
IEEE DOI 1705
Cameras, Correlation, Face, Face recognition, Harmonic analysis, Lighting, Three-dimensional, displays BibRef

Li, X.B.[Xiao-Bai], Komulainen, J., Zhao, G., Yuen, P.C.[Pong-Chi], Pietikäinen, M.,
Generalized face anti-spoofing by detecting pulse from face videos,
ICPR16(4244-4249)
IEEE DOI 1705
Color, Databases, Face, Feature extraction, Skin, Videos, Face liveness, anti-spoofing, cross-database, mask, pulse BibRef

Sun, X.D.[Xu-Dong], Huang, L.[Lei], Liu, C.P.[Chang-Ping],
Context based face spoofing detection using active near-infrared images,
ICPR16(4262-4267)
IEEE DOI 1705
Cameras, Context, Face, Feature extraction, Histograms, Lighting, Media BibRef

Siddiqui, T.A., Bharadwaj, S., Dhamecha, T.I., Agarwal, A., Vatsa, M., Singh, R., Ratha, N.,
Face anti-spoofing with multifeature videolet aggregation,
ICPR16(1035-1040)
IEEE DOI 1705
Biometrics (access control), Databases, Encoding, Face, Feature extraction, Histograms, Support, vector, machines BibRef

Tian, G., Mori, T., Okuda, Y.,
Spoofing detection for embedded face recognition system using a low cost stereo camera,
ICPR16(1017-1022)
IEEE DOI 1705
Cameras, Face, Face recognition, Fitting, Nose, Surface fitting, point cloud, spoof detection, stereo vision, surface, fitting BibRef

Rudd, E.M.[Ethan M.], Günther, M., Boult, T.E.[Terrance E.],
PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses,
Biometrics16(171-178)
IEEE DOI 1612
BibRef

Liu, S.Q.[Si-Qi], Yuen, P.C.[Pong C.], Zhang, S.P.[Sheng-Ping], Zhao, G.Y.[Guo-Ying],
3D Mask Face Anti-spoofing with Remote Photoplethysmography,
ECCV16(VII: 85-100).
Springer DOI 1611
BibRef

Liu, S.Q.[Si-Qi], Yang, B., Yuen, P.C.[Pong C.], Zhao, G.Y.[Guo-Ying],
A 3D Mask Face Anti-Spoofing Database with Real World Variations,
Affect16(1551-1557)
IEEE DOI 1612
BibRef

Phan, Q.T.[Quoc-Tin], Dang-Nguyen, D.T.[Duc-Tien], Boato, G.[Giulia], de Natale, F.G.B.[Francesco G. B.],
Using LDP-TOP in Video-Based Spoofing Detection,
CIAP17(II:614-624).
Springer DOI 1711
BibRef
Earlier:
FACE spoofing detection using LDP-TOP,
ICIP16(404-408)
IEEE DOI 1610
Face BibRef

Garcia, D.C.[Diogo C.], de Queiroz, R.L.[Ricardo L.],
Evaluating the effects of image compression in Moire-pattern-based face-spoofing detection,
ICIP15(4843-4847)
IEEE DOI 1512
Biometrics; face recognition; face-spoofing detection BibRef

Melnikov, A.[Aleksandr], Akhunzyanov, R.[Rasim], Kudashev, O.[Oleg], Luckyanets, E.[Eugene],
Audiovisual Liveness Detection,
CIAP15(II:643-652).
Springer DOI 1511
BibRef

Cai, L.J.[Li-Jun], Xiong, C.S.[Chun-Shui], Huang, L.[Lei], Liu, C.P.[Chang-Ping],
A Novel Face Spoofing Detection Method Based on Gaze Estimation,
ACCV14(III: 547-561).
Springer DOI 1504
BibRef

Raghavendra, R., Busch, C.[Christoph],
Improved face recognition by combining information from multiple cameras in Automatic Border Control system,
AVSS15(1-6)
IEEE DOI 1511
BibRef
Earlier:
Novel presentation attack detection algorithm for face recognition system: Application to 3D face mask attack,
ICIP14(323-327)
IEEE DOI 1502
cameras. Databases BibRef

Liu, W.W.[Wei-Wen],
Face liveness detection using analysis of Fourier spectra based on hair,
ICWAPR14(75-80)
IEEE DOI 1402
Accuracy BibRef

Peng, J.Y.[Jun-Yan], Chan, P.P.K.[Patrick P.K.],
Face liveness detection for combating the spoofing attack in face recognition,
ICWAPR14(176-181)
IEEE DOI 1402
Accuracy BibRef

Yang, L.B.[Li-Bin],
Face liveness detection by focusing on frontal faces and image backgrounds,
ICWAPR14(93-97)
IEEE DOI 1402
BibRef

d'Souza, D.[Darryl], Yampolskiy, R.V.[Roman V.],
Natural vs. Artificial Face Classification Using Uniform Local Directional Patterns and Wavelet Uniform Local Directional Patterns,
Biometrics14(27-33)
IEEE DOI 1409
Avatars BibRef

de Freitas Pereira, T.[Tiago], Anjos, A.[André], de Martino, J.M.[José Mario], Marcel, S.[Sébastien],
LBP-TOP Based Countermeasure against Face Spoofing Attacks,
CVLBP12(I:121-132).
Springer DOI 1304
BibRef

Wang, Y.Y.[Yue-Yang], Hao, X.L.[Xiao-Li], Hou, Y.[Yali], Guo, C.Q.[Chang-Qing],
A New Multispectral Method for Face Liveness Detection,
ACPR13(922-926)
IEEE DOI 1408
face recognition BibRef

Bharadwaj, S.[Samarth], Dhamecha, T.I.[Tejas I.], Vatsa, M.[Mayank], Singh, R.[Richa],
Computationally Efficient Face Spoofing Detection with Motion Magnification,
Biometrics13(105-110)
IEEE DOI 1309
Face spoofing; biometrics; face recognition; liveness detection BibRef

Rattani, A.[Ajita], Poh, N.[Norman], Ross, A.[Arun],
Analysis of user-specific score characteristics for spoof biometric attacks,
Biometrics12(124-129).
IEEE DOI 1207
BibRef

Yan, J.J.[Jun-Jie], Zhang, Z.W.[Zhi-Wei], Lei, Z.[Zhen], Yi, D.[Dong], Li, S.Z.,
Face liveness detection by exploring multiple scenic clues,
ICARCV12(188-193).
IEEE DOI 1304

See also Face detection by structural models. BibRef

Markovski, J., Reniers, M.A.,
An integrated state- and event-based framework for verifying liveness in supervised systems,
ICARCV12(246-251).
IEEE DOI 1304
BibRef

Hu, H.[Hesuan], Su, R.[Rong],
A novel approach to liveness supervision of AMS with assembly operations using Petri nets,
ICARCV12(264-269).
IEEE DOI 1304
BibRef

Peixoto, B.[Bruno], Michelassi, C.[Carolina], Rocha, A.[Anderson],
Face liveness detection under bad illumination conditions,
ICIP11(3557-3560).
IEEE DOI 1201
BibRef

Sun, L.[Lin], Huang, W.B.[Wai-Bin], Wu, M.H.[Ming-Hui],
TIR/VIS Correlation for Liveness Detection in Face Recognition,
CAIP11(II: 114-121).
Springer DOI 1109
BibRef

Tan, X.Y.[Xiao-Yang], Li, Y.[Yi], Liu, J.[Jun], Jiang, L.[Lin],
Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model,
ECCV10(VI: 504-517).
Springer DOI 1009
BibRef

Bao, W.[Wei], Li, H.[Hong], Li, N.[Nan], Jiang, W.[Wei],
A liveness detection method for face recognition based on optical flow field,
IASP09(233-236).
IEEE DOI 0904
BibRef

Pan, G.[Gang], Sun, L.[Lin], Wu, Z.H.[Zhao-Hui], Lao, S.H.[Shi-Hong],
Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera,
ICCV07(1-8).
IEEE DOI 0710
BibRef

Chapter on Face Recognition, Detection, Tracking, Gesture Recognition, Fingerprints, Biometrics continues in
Biometrics, Cross-Modal, Multi-Modal Systems, Multibiometrics, Combined Face and Other Features, Fusion .


Last update:Oct 29, 2023 at 22:16:34