Biometric person recognition systems based on facial images are increasingly used in a wide range of applications. However, the potential for face spoofing attacks remains a significant challenge to the security of such systems and finding better means of detecting such presentation attacks has become a necessity. In this paper, we propose a new spoofing detection method, which is based on temporal changes in texture information. A novel temporal texture descriptor is proposed to characterise the pattern of change in a short video sequence named Temporal Co-occurrence Adjacent Local Binary Pattern (TCoALBP). Experimental results using the CASIA-FA, Replay Attack and MSU-MFSD datasets; the proposed method shows the effectiveness of the propo...
Face recognition systems are now being used in many applications such as border crossings, banks, an...
User authentication is an important step to protect information and in this field face biometrics is...
Face recognition systems have been widely adopted for user authentication in security systems due to...
Spatio-temporal information is valuable as a discriminative cue for presentation attack detection, w...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
User authentication is an important step to protect information, and in this context, face biometric...
User authentication is an important step to protect information, and in this context, face biometric...
User authentication is an important step to protect information, and in this context, face biometric...
Abstract—Spoofing attacks are one of the security traits that biometric recognition systems are prov...
Spoofing attacks are one of the security traits that biometric recognition systems are proven to be ...
Current face biometric systems are vulnerable to spoof-ing attacks. A spoofing attack occurs when a ...
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Fundação de Amparo à Pesquisa do ...
Abstract: Spoofing attacks are one of the security traits that biometric recognition systems are pro...
Abstract Face biometric systems are vulnerable to spoofing attacks. Such attacks can be performed i...
Facial biometric systems have recently received increased deployment in various applications such as...
Face recognition systems are now being used in many applications such as border crossings, banks, an...
User authentication is an important step to protect information and in this field face biometrics is...
Face recognition systems have been widely adopted for user authentication in security systems due to...
Spatio-temporal information is valuable as a discriminative cue for presentation attack detection, w...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
User authentication is an important step to protect information, and in this context, face biometric...
User authentication is an important step to protect information, and in this context, face biometric...
User authentication is an important step to protect information, and in this context, face biometric...
Abstract—Spoofing attacks are one of the security traits that biometric recognition systems are prov...
Spoofing attacks are one of the security traits that biometric recognition systems are proven to be ...
Current face biometric systems are vulnerable to spoof-ing attacks. A spoofing attack occurs when a ...
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Fundação de Amparo à Pesquisa do ...
Abstract: Spoofing attacks are one of the security traits that biometric recognition systems are pro...
Abstract Face biometric systems are vulnerable to spoofing attacks. Such attacks can be performed i...
Facial biometric systems have recently received increased deployment in various applications such as...
Face recognition systems are now being used in many applications such as border crossings, banks, an...
User authentication is an important step to protect information and in this field face biometrics is...
Face recognition systems have been widely adopted for user authentication in security systems due to...