International audienceIn this paper, initially, the impact of mask spoofing on face recognition is analyzed. For this purpose, one baseline technique is selected for both 2D and 3D face recognition. Next, novel countermeasures, which are based on the analysis of different shape, texture and reflectance characteristics of real faces and mask faces, are proposed to detect mask spoofing. In this paper, countermeasures are developed using both 2D data (texture images) and 3D data (3D scans) available in the mask database. The results show that each of the proposed countermeasures is successful in detecting mask spoofing, and the fusion of these countermeasures further improves the results compared to using a single countermeasure. Since there i...
International audienceSecuring face recognition systems against spoofing attacks have been recognise...
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric commun...
Face spoofing detection has received great research interest recently due to the rapidly increasing ...
Abstract—Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitim...
The problem of detecting face spoofing attacks (presen-tation attacks) has recently gained a well-de...
Vulnerability to spoofing attacks is a serious drawback for many biometric sys-tems. Among all biome...
Vulnerability to spoofing attacks is a serious drawback for many biometric sys-tems. Among all biome...
Abstract Face biometric systems are vulnerable to spoofing attacks. Such attacks can be performed i...
Face Recognition Systems are used widely in all areas as a medium of authentication, the ease of imp...
Vulnerability to spoofing attacks is a serious drawback for many biometric systems. Among all biomet...
Human recognition has become an important topic as the need and investments for security application...
Abstract--- User authentication is an important step to protect information, and face biometrics pla...
La Reconnaissance automatique des personnes est devenue un sujet de plus en plus important avec l'au...
Nowadays face recognition systems are facing a new problem after having won the challenge of reliabi...
Spoofing identities using photographs is one of the most common techniques to attack 2-D face recogn...
International audienceSecuring face recognition systems against spoofing attacks have been recognise...
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric commun...
Face spoofing detection has received great research interest recently due to the rapidly increasing ...
Abstract—Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitim...
The problem of detecting face spoofing attacks (presen-tation attacks) has recently gained a well-de...
Vulnerability to spoofing attacks is a serious drawback for many biometric sys-tems. Among all biome...
Vulnerability to spoofing attacks is a serious drawback for many biometric sys-tems. Among all biome...
Abstract Face biometric systems are vulnerable to spoofing attacks. Such attacks can be performed i...
Face Recognition Systems are used widely in all areas as a medium of authentication, the ease of imp...
Vulnerability to spoofing attacks is a serious drawback for many biometric systems. Among all biomet...
Human recognition has become an important topic as the need and investments for security application...
Abstract--- User authentication is an important step to protect information, and face biometrics pla...
La Reconnaissance automatique des personnes est devenue un sujet de plus en plus important avec l'au...
Nowadays face recognition systems are facing a new problem after having won the challenge of reliabi...
Spoofing identities using photographs is one of the most common techniques to attack 2-D face recogn...
International audienceSecuring face recognition systems against spoofing attacks have been recognise...
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric commun...
Face spoofing detection has received great research interest recently due to the rapidly increasing ...