The problem of detecting face spoofing attacks (presen-tation attacks) has recently gained a well-deserved popu-larity. Mainly focusing on 2D attacks forged by displaying printed photos or replaying recorded videos on mobile de-vices, a significant portion of these studies ground their ar-guments on the flatness of the spoofing material in front of the sensor. In this paper, we inspect the spoofing potential of subject-specific 3D facial masks for 2D face recognition. Additionally, we analyze Local Binary Patterns based coun-termeasures using both color and depth data, obtained by Kinect. For this purpose, we introduce the 3D Mask Attack Database (3DMAD), the first publicly available 3D spoof-ing database, recorded with a low-cost depth cam...
Abstract: Spoofing attacks are one of the security traits that biometric recognition systems are pro...
Face recognition provides many advantages compared with other available biometrics, but it is partic...
Face anti-spoofing is a crucial part of face recognition system to protect subject's privacy and lif...
Vulnerability to spoofing attacks is a serious drawback for many biometric systems. Among all biomet...
Abstract—Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitim...
Vulnerability to spoofing attacks is a serious drawback for many biometric sys-tems. Among all biome...
Vulnerability to spoofing attacks is a serious drawback for many biometric sys-tems. Among all biome...
International audienceIn this paper, initially, the impact of mask spoofing on face recognition is a...
The 3D Mask Attack Database (3DMAD) is a biometric (face) spoofing database. It contains 76500 frame...
Abstract Face biometric systems are vulnerable to spoofing attacks. Such attacks can be performed i...
Nowadays face recognition systems are facing a new problem after having won the challenge of reliabi...
Abstract Face anti-spoofing is critical to the security of face recognition systems. Depth supervis...
Spoofing identities using photographs is one of the most common techniques to attack 2-D face recogn...
The vulnerability of biometric systems to external attacks using a physical artefact in order to imp...
Abstract—Spoofing attacks are one of the security traits that biometric recognition systems are prov...
Abstract: Spoofing attacks are one of the security traits that biometric recognition systems are pro...
Face recognition provides many advantages compared with other available biometrics, but it is partic...
Face anti-spoofing is a crucial part of face recognition system to protect subject's privacy and lif...
Vulnerability to spoofing attacks is a serious drawback for many biometric systems. Among all biomet...
Abstract—Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitim...
Vulnerability to spoofing attacks is a serious drawback for many biometric sys-tems. Among all biome...
Vulnerability to spoofing attacks is a serious drawback for many biometric sys-tems. Among all biome...
International audienceIn this paper, initially, the impact of mask spoofing on face recognition is a...
The 3D Mask Attack Database (3DMAD) is a biometric (face) spoofing database. It contains 76500 frame...
Abstract Face biometric systems are vulnerable to spoofing attacks. Such attacks can be performed i...
Nowadays face recognition systems are facing a new problem after having won the challenge of reliabi...
Abstract Face anti-spoofing is critical to the security of face recognition systems. Depth supervis...
Spoofing identities using photographs is one of the most common techniques to attack 2-D face recogn...
The vulnerability of biometric systems to external attacks using a physical artefact in order to imp...
Abstract—Spoofing attacks are one of the security traits that biometric recognition systems are prov...
Abstract: Spoofing attacks are one of the security traits that biometric recognition systems are pro...
Face recognition provides many advantages compared with other available biometrics, but it is partic...
Face anti-spoofing is a crucial part of face recognition system to protect subject's privacy and lif...