One-class spoofing detection approaches have been an effective alternative to the two-class learners in the face presentation attack detection particularly in unseen attack scenarios. We propose an ensemble based anomaly detection approach applicable to one-class classifiers. A new score normalisation method is proposed to normalise the output of individual outlier detectors before fusion. To comply with the accuracy and diversity objectives for the component classifiers, three different strategies are utilised to build a pool of anomaly experts. To boost the performance, we also make use of the client-specific information both in the design of individual experts as well as in setting a distinct threshold for each client. We carry out exten...
Face presentation attack detection (PAD) has been extensively studied by research communities to enh...
Face recognition is a mature and trustworthy method for identifying individuals. Thanks to the avai...
Face anti-spoofing is crucial to the security of face recognition systems. Most previous methods for...
One-class spoofing detection approaches have been an effective alternative to the two-class learner...
To counteract spoofing attacks, the majority of recent approaches to face spoofing attack detection ...
The one-class anomaly detection approach has previously been found to be effective in face presentat...
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this pape...
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this pape...
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this pape...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
A novel approach is presented that bridges the gap between anomaly and misuse detection for identify...
The malicious insider threat is getting increased concern by organisations, due to the continuously ...
In a typical face recognition pipeline, the task ofthe face detector is to localize the face region....
Face spoofing detection has received great research interest recently due to the rapidly increasing ...
Face morphing attacks are verifiable to multiple identities, leading to faulty identity links. Recen...
Face presentation attack detection (PAD) has been extensively studied by research communities to enh...
Face recognition is a mature and trustworthy method for identifying individuals. Thanks to the avai...
Face anti-spoofing is crucial to the security of face recognition systems. Most previous methods for...
One-class spoofing detection approaches have been an effective alternative to the two-class learner...
To counteract spoofing attacks, the majority of recent approaches to face spoofing attack detection ...
The one-class anomaly detection approach has previously been found to be effective in face presentat...
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this pape...
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this pape...
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this pape...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
A novel approach is presented that bridges the gap between anomaly and misuse detection for identify...
The malicious insider threat is getting increased concern by organisations, due to the continuously ...
In a typical face recognition pipeline, the task ofthe face detector is to localize the face region....
Face spoofing detection has received great research interest recently due to the rapidly increasing ...
Face morphing attacks are verifiable to multiple identities, leading to faulty identity links. Recen...
Face presentation attack detection (PAD) has been extensively studied by research communities to enh...
Face recognition is a mature and trustworthy method for identifying individuals. Thanks to the avai...
Face anti-spoofing is crucial to the security of face recognition systems. Most previous methods for...