Abstract Face anti-spoofing (FAS) secures face recognition from presentation attacks (PAs). Existing FAS methods usually supervise PA detectors with handcrafted binary or pixel-wise labels. However, handcrafted labels may are not the most adequate way to supervise PA detectors learning sufficient and intrinsic spoofing cues. Instead of using the handcrafted labels, we propose a novel Meta-Teacher FAS (MT-FAS) method to train a meta-teacher for supervising PA detectors more effectively. The meta-teacher is trained in a bi-level optimization manner to learn the ability to supervise the PA detectors learning rich spoofing cues. The bi-level optimization contains two key components: 1) a lower-level training in which the meta-teacher supervise...
Face recognition is a mature and trustworthy method for identifying individuals. Thanks to the avai...
Face presentation attack detection (PAD) has been extensively studied by research communities to enh...
Face anti-spoofing has drawn a lot of attention due to the high security requirements in biometric a...
Face anti-spoofing is crucial to the security of face recognition systems. Most previous methods for...
Abstract Face anti-spoofing is crucial to the security of face recognition systems. Most previous m...
Face anti-spoofing (FAS) techniques play an important role in defending face recognition systems aga...
Face presentation attacks have become an increasingly critical concern when face recognition is wide...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
Face spoofing detection has received great research interest recently due to the rapidly increasing ...
In a typical face recognition pipeline, the task ofthe face detector is to localize the face region....
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric commun...
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this pape...
Face anti-spoofing aims to prevent false authentications of face recognition systems by distinguishi...
While the performance of face recognition systems has improved significantly in the last decade, the...
Face recognition is a mature and trustworthy method for identifying individuals. Thanks to the avai...
Face presentation attack detection (PAD) has been extensively studied by research communities to enh...
Face anti-spoofing has drawn a lot of attention due to the high security requirements in biometric a...
Face anti-spoofing is crucial to the security of face recognition systems. Most previous methods for...
Abstract Face anti-spoofing is crucial to the security of face recognition systems. Most previous m...
Face anti-spoofing (FAS) techniques play an important role in defending face recognition systems aga...
Face presentation attacks have become an increasingly critical concern when face recognition is wide...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
Face spoofing detection has received great research interest recently due to the rapidly increasing ...
In a typical face recognition pipeline, the task ofthe face detector is to localize the face region....
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric commun...
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this pape...
Face anti-spoofing aims to prevent false authentications of face recognition systems by distinguishi...
While the performance of face recognition systems has improved significantly in the last decade, the...
Face recognition is a mature and trustworthy method for identifying individuals. Thanks to the avai...
Face presentation attack detection (PAD) has been extensively studied by research communities to enh...
Face anti-spoofing has drawn a lot of attention due to the high security requirements in biometric a...