The vulnerability of biometric recognition to presentation attacks (PAs) has been widely recognized and has attracted increasing attention as it enables attackers to impersonate authentic users. Presentation attack detection (PAD), aiming at automatically catching PAs, is an essential technology to secure biometric systems from PAs such as printed photos and replayed videos. Despite the considerable exploration and remarkable progress in PAD performance, two major issues still constitute a gap in technology. The first is the lack of proper understanding of the fairness of such algorithms over human-related attributes, and the second is the low performance generalizability over variabilities such as unknown attack types and capture environme...
Biometric authentication has been a vital method of human identification across a wide range of appl...
The increased need for unattended authentication in multiple scenarios has motivated a wide deploym...
Facial recognition systems have considerably evolved in recent years and have been deployed in a num...
The vulnerability of biometric recognition to presentation attacks (PAs) has been widely recognized ...
The undeniable convenience of face-recognition (FR) based biometrics has made it an attractive tool ...
The extremely high recognition accuracy achieved by modern, convolutional neural network (CNN) based...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
Abstract The vulnerabilities of face-based biometric systems to presentation attacks have been fina...
Face recognition is a mainstream biometric authentication method. However, vulnerability to presenta...
Face Recognition is considered one of the most common biometric solutions these days and is widely u...
Abstract Face recognition technology is now mature enough to reach commercial products, such as smar...
Face recognition is one of the most socially accepted forms of biometric recognition. The recent ava...
The robustness and generalization ability of Presentation Attack Detection (PAD) methods is critical...
Abstract Biometric recognition and presentation attack detection (PAD) methods strongly rely on deep...
Non-referential face image quality assessment methods have gained popularity as a pre-filtering step...
Biometric authentication has been a vital method of human identification across a wide range of appl...
The increased need for unattended authentication in multiple scenarios has motivated a wide deploym...
Facial recognition systems have considerably evolved in recent years and have been deployed in a num...
The vulnerability of biometric recognition to presentation attacks (PAs) has been widely recognized ...
The undeniable convenience of face-recognition (FR) based biometrics has made it an attractive tool ...
The extremely high recognition accuracy achieved by modern, convolutional neural network (CNN) based...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
Abstract The vulnerabilities of face-based biometric systems to presentation attacks have been fina...
Face recognition is a mainstream biometric authentication method. However, vulnerability to presenta...
Face Recognition is considered one of the most common biometric solutions these days and is widely u...
Abstract Face recognition technology is now mature enough to reach commercial products, such as smar...
Face recognition is one of the most socially accepted forms of biometric recognition. The recent ava...
The robustness and generalization ability of Presentation Attack Detection (PAD) methods is critical...
Abstract Biometric recognition and presentation attack detection (PAD) methods strongly rely on deep...
Non-referential face image quality assessment methods have gained popularity as a pre-filtering step...
Biometric authentication has been a vital method of human identification across a wide range of appl...
The increased need for unattended authentication in multiple scenarios has motivated a wide deploym...
Facial recognition systems have considerably evolved in recent years and have been deployed in a num...