This dataset was used to perform the experiments reported in the IJCB2023 paper "Can personalised hygienic masks be used to attack face recognition systems?". The dataset consists of face videos captured using the ‘selfie’ cameras of five different smartphones : Apple iPhone 12, Apple iPhone 6s, Xiaomi Redmi 6 Pro, Xiaomi Redmi 9A and Samsung Galaxy S9. The dataset contains : Bona-fide face videos: 1400 videos of bona-fide (real, non-attack) faces. In total, there are 70 identities (data subjects). Each video is 10 seconds long, where for the first 5 seconds the data subject was required to stay still and look at the camera, then for the last 5 seconds the subject was asked to turn their head from one side to the other (such that profil...
Description The eXtended Custom Silicone Mask Attack Dataset (XCSMAD) consists of 535 short video r...
Abstract The threat of 3D masks to face recognition systems is increasingly serious and has been wi...
With the widespread use of biometric authentication comes the exploitation of presentation attacks, ...
This dataset consists of face & silicon masks images from 8 different subjects captured with 3 diffe...
Replay-Mobile is a dataset for face recognition and presentation attack detection (anti-spoofing). T...
The Custom Silicone Mask Attack Dataset (CSMAD) contains presentation attacks made of six custom-mad...
This paper presents an experiment designed to test the resilience of several user verification syste...
Face Mask detection using machine intelligence is one of the hot topic during the COVID-19 period. V...
This paper presents an experiment designed to test the resilience of several user verification syste...
Abstract The vulnerabilities of face-based biometric systems to presentation attacks have been fina...
Face recognition has become essential in our daily lives as a convenient and contactless method of...
Face recognition is an important application of pattern recognition and image analysis in biometric ...
Face recognition is an essential technology in our daily lives as a contactless and convenient met...
Description The in-Vehicle Face Presentation Attack Detection (VFPAD) dataset consists of 4046 bona...
============= Introduction The RECOD Mobile Presentation-Attack Dataset (RECOD-MPAD) is intended fo...
Description The eXtended Custom Silicone Mask Attack Dataset (XCSMAD) consists of 535 short video r...
Abstract The threat of 3D masks to face recognition systems is increasingly serious and has been wi...
With the widespread use of biometric authentication comes the exploitation of presentation attacks, ...
This dataset consists of face & silicon masks images from 8 different subjects captured with 3 diffe...
Replay-Mobile is a dataset for face recognition and presentation attack detection (anti-spoofing). T...
The Custom Silicone Mask Attack Dataset (CSMAD) contains presentation attacks made of six custom-mad...
This paper presents an experiment designed to test the resilience of several user verification syste...
Face Mask detection using machine intelligence is one of the hot topic during the COVID-19 period. V...
This paper presents an experiment designed to test the resilience of several user verification syste...
Abstract The vulnerabilities of face-based biometric systems to presentation attacks have been fina...
Face recognition has become essential in our daily lives as a convenient and contactless method of...
Face recognition is an important application of pattern recognition and image analysis in biometric ...
Face recognition is an essential technology in our daily lives as a contactless and convenient met...
Description The in-Vehicle Face Presentation Attack Detection (VFPAD) dataset consists of 4046 bona...
============= Introduction The RECOD Mobile Presentation-Attack Dataset (RECOD-MPAD) is intended fo...
Description The eXtended Custom Silicone Mask Attack Dataset (XCSMAD) consists of 535 short video r...
Abstract The threat of 3D masks to face recognition systems is increasingly serious and has been wi...
With the widespread use of biometric authentication comes the exploitation of presentation attacks, ...