With the rise in the use of biometric authentication on mobile devices, it is important to address the security vulnerability of spoofing attacks where an attacker using an artefact representing the biometric features of a genuine user attempts to subvert the system. In this paper, techniques for presentation attack detection are presented using gaze information with a focus on their applicability for use on mobile devices. Novel features that rely on directing the gaze of the user and establishing its behaviour are explored for detecting spoofing attempts. The attack scenarios considered in this work include the use of projected photos, 2D and 3D masks. The proposed features and the systems based on them were extensively evaluated using da...
The undeniable convenience of face-recognition (FR) based biometrics has made it an attractive tool ...
Widespread deployment of biometric systems supporting consumer transactions is starting to occur. Sm...
With the widespread use of biometric authentication comes the exploitation of presentation attacks, ...
Face recognition systems have been improved rapidly in recent decades. However, their wide deploymen...
Facial recognition systems are among the most widely deployed in biometric applications. However, su...
Biometric authentication is vulnerable to presentation (spoofing) attacks. It is important to addres...
Biometric systems can be subverted using presentation attack artefacts. This work presents a way to ...
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering...
Abstract: Spoofing attacks on biometric systems are one of the major impediments to their use for se...
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric commun...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
ABSTRACT In recent decades, we have witnessed the evolution of biometric technology from the first p...
Abstract—Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitim...
Spoofing attacks in face recognition systems are easy because faces are always exposed. Various remo...
In recent decades, the evolution of biometric technology from the first revolutionary works in faces...
The undeniable convenience of face-recognition (FR) based biometrics has made it an attractive tool ...
Widespread deployment of biometric systems supporting consumer transactions is starting to occur. Sm...
With the widespread use of biometric authentication comes the exploitation of presentation attacks, ...
Face recognition systems have been improved rapidly in recent decades. However, their wide deploymen...
Facial recognition systems are among the most widely deployed in biometric applications. However, su...
Biometric authentication is vulnerable to presentation (spoofing) attacks. It is important to addres...
Biometric systems can be subverted using presentation attack artefacts. This work presents a way to ...
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering...
Abstract: Spoofing attacks on biometric systems are one of the major impediments to their use for se...
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric commun...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
ABSTRACT In recent decades, we have witnessed the evolution of biometric technology from the first p...
Abstract—Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitim...
Spoofing attacks in face recognition systems are easy because faces are always exposed. Various remo...
In recent decades, the evolution of biometric technology from the first revolutionary works in faces...
The undeniable convenience of face-recognition (FR) based biometrics has made it an attractive tool ...
Widespread deployment of biometric systems supporting consumer transactions is starting to occur. Sm...
With the widespread use of biometric authentication comes the exploitation of presentation attacks, ...