How far did we get in face spoofing detection?

نویسندگان

  • Luiz Souza
  • Mauricio Pamplona Segundo
  • Luciano Oliveira
  • João Papa
چکیده

The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks. In this paper, an extensive analysis on face spoofing detection works published in the last decade is presented. The analyzed works are categorized by their fundamental parts, i.e., descriptors and classifiers. This structured survey also brings the temporal evolution of the face spoofing detection field, as well as a comparative analysis of the works considering the most important public data sets in the field. The methodology followed in this work is particularly relevant to observe trends in the existing approaches, to discuss still opened issues, and to propose new perspectives for the future of face spoofing detection.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multimedia Security Spoofing of Digital Image Forensics -3d Face Mask

Biometrics systems have significantly improved person identification and authentication, playing an important role in personal, national, and global security. However, these systems might be deceived (or “spoofed”).The recent advances in spoofing detection, current solutions often rely on S domain knowledge, specific biometric reading systems, and attack types. We assume a very limited knowledg...

متن کامل

On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-Spoofing

While face recognition systems got a significant boost in terms of recognition performance in recent years, they are known to be vulnerable to presentation attacks. Up to date, most of the research in the field of face anti-spoofing or presentation attack detection was considered as a two-class classification task: features of bona-fide samples versus features coming from spoofing attempts. The...

متن کامل

Face Spoofing Attacks Detection in Biometric System

Biometric system have evolved very well in last few years and in this digital era secure automatic solution for face spoofing is needed. Combining existing anti-spoofing approaches to come up with more robust mechanism is needed for preventing system from various spoofing types. In this paper, detecting face from image and extracting data from it and then optimizing that information with datase...

متن کامل

Face-Spoofing 2D-Detection Based on Moiré-Pattern Analysis

Biometric systems based on face recognition have been shown unreliable under the presence of face-spoofing images. Hence, automatic solutions for spoofing detection became necessary. In this paper, face-spoofing detection is proposed by searching for Moiré patterns due to the overlap of the digital grids. The conditions under which these patterns arise are first described, and their detection i...

متن کامل

Spoofing Detection Methods in Wireless LAN (WLAN) - A Study with pros and cons

Spoofing makes the task of identification and tracking back of the perpetrator / initiator in Cyber Crimes very difficult, e.g. the attacks by way of changing its network identifiers in WLANs. In such a scenario, spoof detection methods have gain wide attention. One way to prevent from spoofing is to authenticate the frames. However, in 802.11 WLANs, authentication and encryption for management...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1710.09868  شماره 

صفحات  -

تاریخ انتشار 2017