Current domain adaptation methods for face anti-spoofing leverage labeled source domain data and unlabeled target domain data to obtain a promising generalizable decision boundary. However, it is usually difficult for these methods to achieve a perfect domain-invariant liveness feature disentanglement, which may degrade the final classification performance by domain differences in illumination, face category, spoof type, etc. In this work, we tackle cross-scenario face anti-spoofing by proposing a novel domain adaptation method called cyclically disentangled feature translation network (CDFTN). Specifically, CDFTN generates pseudo-labeled samples that possess: 1) source domain-invariant liveness features and 2) target domain-specific conten...
Abstract Face anti-spoofing (FAS) plays a vital role in securing face recognition systems from pres...
Face spoofing detection has received great research interest recently due to the rapidly increasing ...
Abstract Face spoofing attacks have received significant attention because of criminals who are dev...
Face anti-spoofing aims to prevent false authentications of face recognition systems by distinguishi...
Face anti-spoofing (FAS) techniques play an important role in defending face recognition systems aga...
In this paper, we propose a novel framework leveraging the advantages of the representational abilit...
Along with the widespread use of face recognition systems, their vulnerability has become highlighte...
Face presentation attacks have become an increasingly critical concern when face recognition is wide...
—With the rapid development in face recognition, most of the existing systems can perform very well ...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
While the performance of face recognition systems has improved significantly in the last decade, the...
Face anti-spoofing has drawn a lot of attention due to the high security requirements in biometric a...
With the increasing use of voice as a biometric, it has become imperative to develop countermeasures...
The face recognition system is vulnerable to spoofing attacks by photos or videos of a valid user fa...
Face anti-spoofing is a crucial part of face recognition system to protect subject's privacy and lif...
Abstract Face anti-spoofing (FAS) plays a vital role in securing face recognition systems from pres...
Face spoofing detection has received great research interest recently due to the rapidly increasing ...
Abstract Face spoofing attacks have received significant attention because of criminals who are dev...
Face anti-spoofing aims to prevent false authentications of face recognition systems by distinguishi...
Face anti-spoofing (FAS) techniques play an important role in defending face recognition systems aga...
In this paper, we propose a novel framework leveraging the advantages of the representational abilit...
Along with the widespread use of face recognition systems, their vulnerability has become highlighte...
Face presentation attacks have become an increasingly critical concern when face recognition is wide...
—With the rapid development in face recognition, most of the existing systems can perform very well ...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
While the performance of face recognition systems has improved significantly in the last decade, the...
Face anti-spoofing has drawn a lot of attention due to the high security requirements in biometric a...
With the increasing use of voice as a biometric, it has become imperative to develop countermeasures...
The face recognition system is vulnerable to spoofing attacks by photos or videos of a valid user fa...
Face anti-spoofing is a crucial part of face recognition system to protect subject's privacy and lif...
Abstract Face anti-spoofing (FAS) plays a vital role in securing face recognition systems from pres...
Face spoofing detection has received great research interest recently due to the rapidly increasing ...
Abstract Face spoofing attacks have received significant attention because of criminals who are dev...