Face recognition systems have been improved rapidly in recent decades. However, their wide deployment has been hindered by their vulnerability to spoofing attacks. In this paper, we present a challenge and response method to detect attack in face recognition systems by recording the gaze of a user in response to a moving stimulus. The proposed system extracts eye centres in the captured frames and computes features from these landmarks to ascertain whether the gaze aligns with the challenge trajectory in order to detect spoofing attacks. The system is tested using a new database simulating mobile device use with 70 subjects attempting three types of spoof attacks (projected photo, looking through a 2D mask or wearing a 3D mask). Evaluations...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
With the rise in the use of biometric authentication on mobile devices, it is important to address t...
Abstract: Spoofing attacks on biometric systems are one of the major impediments to their use for se...
Facial recognition systems are among the most widely deployed in biometric applications. However, su...
Biometric authentication is vulnerable to presentation (spoofing) attacks. It is important to addres...
Biometric systems can be subverted using presentation attack artefacts. This work presents a way to ...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
Spoofing attacks on biometric systems are one of the major impediments to their use for secure unatt...
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric commun...
A common technique to by-pass 2-D face recognition systems is to use photographs of spoofed identiti...
This paper is concerned with biometric spoofing detection using the dynamics of natural facial movem...
Spoofing attacks in face recognition systems are easy because faces are always exposed. Various remo...
Widespread deployment of biometric systems supporting consumer transactions is starting to occur. Sm...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
With the rise in the use of biometric authentication on mobile devices, it is important to address t...
Abstract: Spoofing attacks on biometric systems are one of the major impediments to their use for se...
Facial recognition systems are among the most widely deployed in biometric applications. However, su...
Biometric authentication is vulnerable to presentation (spoofing) attacks. It is important to addres...
Biometric systems can be subverted using presentation attack artefacts. This work presents a way to ...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
Spoofing attacks on biometric systems are one of the major impediments to their use for secure unatt...
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric commun...
A common technique to by-pass 2-D face recognition systems is to use photographs of spoofed identiti...
This paper is concerned with biometric spoofing detection using the dynamics of natural facial movem...
Spoofing attacks in face recognition systems are easy because faces are always exposed. Various remo...
Widespread deployment of biometric systems supporting consumer transactions is starting to occur. Sm...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering...
Eye tracking devices have recently become increasingly popular as an interface between people and co...