Abstract Face presentation attack detection has received increasing attention ever since the vulnerabilities to spoofing have been widely recognized. The state of the art in software-based face anti-spoofing has been assessed in three international competitions organized in conjunction with major biometrics conferences in 2011, 2013, and 2017, each introducing new challenges to the research community. In this chapter, we present the design and results of the three competitions. The particular focus is on the latest competition, where the aim was to evaluate the generalization abilities of the proposed algorithms under some real-world variations faced in mobile scenarios, including previously unseen acquisition conditions, presentation atta...
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering...
Presentation attacks are weak points of facial biometrical authentication systems. Although several ...
Abstract The vulnerabilities of face-based biometric systems to presentation attacks have been fina...
Abstract In recent years, software-based face presentation attack detection (PAD) methods have seen...
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric commun...
As the rapid development of face recognition technologies, face presentation attack detection (face ...
Abstract Face recognition technology is now mature enough to reach commercial products, such as smar...
The undeniable convenience of face-recognition (FR) based biometrics has made it an attractive tool ...
Face Recognition is considered one of the most common biometric solutions these days and is widely u...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
Facial recognition systems are among the most widely deployed in biometric applications. However, su...
Even though the field of Face Presentation Attack Detection (PAD) has been around for quite a long t...
Even though the field of Face Presentation Attack Detection (PAD) has been around for quite a long t...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, ...
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering...
Presentation attacks are weak points of facial biometrical authentication systems. Although several ...
Abstract The vulnerabilities of face-based biometric systems to presentation attacks have been fina...
Abstract In recent years, software-based face presentation attack detection (PAD) methods have seen...
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric commun...
As the rapid development of face recognition technologies, face presentation attack detection (face ...
Abstract Face recognition technology is now mature enough to reach commercial products, such as smar...
The undeniable convenience of face-recognition (FR) based biometrics has made it an attractive tool ...
Face Recognition is considered one of the most common biometric solutions these days and is widely u...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
Facial recognition systems are among the most widely deployed in biometric applications. However, su...
Even though the field of Face Presentation Attack Detection (PAD) has been around for quite a long t...
Even though the field of Face Presentation Attack Detection (PAD) has been around for quite a long t...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, ...
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering...
Presentation attacks are weak points of facial biometrical authentication systems. Although several ...
Abstract The vulnerabilities of face-based biometric systems to presentation attacks have been fina...