Face Anti-Spoofing using Speeded-Up Robust Features and Fisher Vector Encoding
نویسندگان
چکیده
منابع مشابه
SURF: Speeded Up Robust Features
We demonstrate the performance of our interest point detector/descriptor scheme SURF – Speeded Up Robust Features – in an application that finds correspondences to a reference image in realtime. The user takes a reference image with a handheld video camera and then moves the camera around the object. The system identifies interest points in every newly acquired image and matches them with the o...
متن کاملSpeeded-Up Robust Features (SURF)
This article presents a novel scaleand rotation-invariant detector and descriptor, coined SURF (Speeded-Up Robust Features). SURF approximates or even outperforms previously proposed schemes with respect to repeatability, distinctiveness, and robustness, yet can be computed and compared much faster. This is achieved by relying on integral images for image convolutions; by building on the streng...
متن کاملGPU Accelerating Speeded-Up Robust Features
Many computer vision tasks require interest point detection and description, such as real-time visual navigation. We present a GPU implementation of the recently proposed SpeededUp Robust Feature extractor [1], currently the state of the art for this task. Robust feature descriptors can give vast improvements in the quality and speed of subsequent steps, but require intensive computation up fro...
متن کاملOffline Language-free Writer Identification based on Speeded-up Robust Features
This article proposes offline language-free writer identification based on speeded-up robust features (SURF), goes through training, enrollment, and identification stages. In all stages, an isotropic Box filter is first used to segment the handwritten text image into word regions (WRs). Then, the SURF descriptors (SUDs) of word region and the corresponding scales and orientations (SOs) are extr...
متن کاملFace Spoofing Detection Using Image Distortion Features
Accurate biometric system for authentication is the need of the hour in today’s scenario. In face spoofing attack a person tries to pretend to be a valid user by using photo or video of an authorized person and gets illegitimate access. Hence it is essential to develop a robust and authentic face spoof detection system in order to protect the privacy about the person. Centre of attraction of th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Signal Processing Letters
سال: 2016
ISSN: 1070-9908,1558-2361
DOI: 10.1109/lsp.2016.2630740