How far did we get in face spoofing detection?
نویسندگان
چکیده
The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks. In this paper, an extensive analysis on face spoofing detection works published in the last decade is presented. The analyzed works are categorized by their fundamental parts, i.e., descriptors and classifiers. This structured survey also brings the temporal evolution of the face spoofing detection field, as well as a comparative analysis of the works considering the most important public data sets in the field. The methodology followed in this work is particularly relevant to observe trends in the existing approaches, to discuss still opened issues, and to propose new perspectives for the future of face spoofing detection.
منابع مشابه
Multimedia Security Spoofing of Digital Image Forensics -3d Face Mask
Biometrics systems have significantly improved person identification and authentication, playing an important role in personal, national, and global security. However, these systems might be deceived (or “spoofed”).The recent advances in spoofing detection, current solutions often rely on S domain knowledge, specific biometric reading systems, and attack types. We assume a very limited knowledg...
متن کاملOn Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-Spoofing
While face recognition systems got a significant boost in terms of recognition performance in recent years, they are known to be vulnerable to presentation attacks. Up to date, most of the research in the field of face anti-spoofing or presentation attack detection was considered as a two-class classification task: features of bona-fide samples versus features coming from spoofing attempts. The...
متن کاملFace Spoofing Attacks Detection in Biometric System
Biometric system have evolved very well in last few years and in this digital era secure automatic solution for face spoofing is needed. Combining existing anti-spoofing approaches to come up with more robust mechanism is needed for preventing system from various spoofing types. In this paper, detecting face from image and extracting data from it and then optimizing that information with datase...
متن کاملFace-Spoofing 2D-Detection Based on Moiré-Pattern Analysis
Biometric systems based on face recognition have been shown unreliable under the presence of face-spoofing images. Hence, automatic solutions for spoofing detection became necessary. In this paper, face-spoofing detection is proposed by searching for Moiré patterns due to the overlap of the digital grids. The conditions under which these patterns arise are first described, and their detection i...
متن کاملSpoofing Detection Methods in Wireless LAN (WLAN) - A Study with pros and cons
Spoofing makes the task of identification and tracking back of the perpetrator / initiator in Cyber Crimes very difficult, e.g. the attacks by way of changing its network identifiers in WLANs. In such a scenario, spoof detection methods have gain wide attention. One way to prevent from spoofing is to authenticate the frames. However, in 802.11 WLANs, authentication and encryption for management...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1710.09868 شماره
صفحات -
تاریخ انتشار 2017