Abstract The vulnerabilities of face-based biometric systems to presentation attacks have been finally recognized but yet we lack generalized software-based face presentation attack detection (PAD) methods performing robustly in practical mobile authentication scenarios. This is mainly due to the fact that the existing public face PAD datasets are beginning to cover a variety of attack scenarios and acquisition conditions but their standard evaluation protocols do not encourage researchers to assess the generalization capabilities of their methods across these variations. In this present work, we introduce a new public face PAD database, OULU-NPU, aiming at evaluating the generalization of PAD methods in more realistic mobile authenticatio...
With face-recognition (FR) increasingly replacing fingerprint sensors for user-authentication on mob...
Abstract Face presentation attack detection has received increasing attention ever since the vulner...
Biometric identification has already been applied to society today, as today’s mobile phones use fin...
Abstract In recent years, software-based face presentation attack detection (PAD) methods have seen...
Even though the field of Face Presentation Attack Detection (PAD) has been around for quite a long t...
Abstract Face recognition technology is now mature enough to reach commercial products, such as smar...
The undeniable convenience of face-recognition (FR) based biometrics has made it an attractive tool ...
With the widespread use of biometric authentication comes the exploitation of presentation attacks, ...
Even though the field of Face Presentation Attack Detection (PAD) has been around for quite a long t...
The vulnerability of biometric recognition to presentation attacks (PAs) has been widely recognized ...
Face recognition is one of the most socially accepted forms of biometric recognition. The recent ava...
Facial recognition systems have considerably evolved in recent years and have been deployed in a num...
Presentation attack detection (PAD) is a challenging task for biometric identity verification system...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
Face recognition is a mainstream biometric authentication method. However, vulnerability to presenta...
With face-recognition (FR) increasingly replacing fingerprint sensors for user-authentication on mob...
Abstract Face presentation attack detection has received increasing attention ever since the vulner...
Biometric identification has already been applied to society today, as today’s mobile phones use fin...
Abstract In recent years, software-based face presentation attack detection (PAD) methods have seen...
Even though the field of Face Presentation Attack Detection (PAD) has been around for quite a long t...
Abstract Face recognition technology is now mature enough to reach commercial products, such as smar...
The undeniable convenience of face-recognition (FR) based biometrics has made it an attractive tool ...
With the widespread use of biometric authentication comes the exploitation of presentation attacks, ...
Even though the field of Face Presentation Attack Detection (PAD) has been around for quite a long t...
The vulnerability of biometric recognition to presentation attacks (PAs) has been widely recognized ...
Face recognition is one of the most socially accepted forms of biometric recognition. The recent ava...
Facial recognition systems have considerably evolved in recent years and have been deployed in a num...
Presentation attack detection (PAD) is a challenging task for biometric identity verification system...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
Face recognition is a mainstream biometric authentication method. However, vulnerability to presenta...
With face-recognition (FR) increasingly replacing fingerprint sensors for user-authentication on mob...
Abstract Face presentation attack detection has received increasing attention ever since the vulner...
Biometric identification has already been applied to society today, as today’s mobile phones use fin...