Abstract Face anti-spoofing (FAS) plays a vital role in securing face recognition systems from presentation attacks. Existing multi-modal FAS methods rely on stacked vanilla convolutions, which is weak in describing detailed intrinsic information from modalities and easily being ineffective when the domain shifts (e.g., cross attack and cross ethnicity). In this paper, we extend the central difference convolutional networks (CDCN) [39] to a multimodal version, intending to capture intrinsic spoofing patterns among three modalities (RGB, depth and infrared). Meanwhile, we also give an elaborate study about singlemodal based CDCN. Our approach won the first place in "Track Multi-Modal" as well as the second place in “Track Single-Modal (RGB)...
Abstract Face anti-spoofing is critical to the security of face recognition systems. Depth supervis...
International audienceCurrently, face recognition technology is the most widely used method for veri...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
Abstract Face anti-spoofing (FAS) plays a vital role in face recognition systems. Most state-of-the...
Along with the widespread use of face recognition systems, their vulnerability has become highlighte...
Abstract Face anti-spoofing (FAS) plays a vital role in securing the face recognition systems from ...
While the performance of face recognition systems has improved significantly in the last decade, the...
Abstract Despite the significant attention given to the problem of face spoofing, we still lack gen...
In a typical face recognition pipeline, the task ofthe face detector is to localize the face region....
Abstract Face anti-spoofing (FAS) plays a vital role in securing face recognition systems. Existing...
—With the rapid development in face recognition, most of the existing systems can perform very well ...
Face anti-spoofing aims to prevent false authentications of face recognition systems by distinguishi...
Face recognition is a mainstream biometric authentication method. However, vulnerability to presenta...
The face recognition system is vulnerable to spoofing attacks by photos or videos of a valid user fa...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
Abstract Face anti-spoofing is critical to the security of face recognition systems. Depth supervis...
International audienceCurrently, face recognition technology is the most widely used method for veri...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
Abstract Face anti-spoofing (FAS) plays a vital role in face recognition systems. Most state-of-the...
Along with the widespread use of face recognition systems, their vulnerability has become highlighte...
Abstract Face anti-spoofing (FAS) plays a vital role in securing the face recognition systems from ...
While the performance of face recognition systems has improved significantly in the last decade, the...
Abstract Despite the significant attention given to the problem of face spoofing, we still lack gen...
In a typical face recognition pipeline, the task ofthe face detector is to localize the face region....
Abstract Face anti-spoofing (FAS) plays a vital role in securing face recognition systems. Existing...
—With the rapid development in face recognition, most of the existing systems can perform very well ...
Face anti-spoofing aims to prevent false authentications of face recognition systems by distinguishi...
Face recognition is a mainstream biometric authentication method. However, vulnerability to presenta...
The face recognition system is vulnerable to spoofing attacks by photos or videos of a valid user fa...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
Abstract Face anti-spoofing is critical to the security of face recognition systems. Depth supervis...
International audienceCurrently, face recognition technology is the most widely used method for veri...
Biometric face recognition technology is vital in security. With social media platforms such as Face...