Mobile QR Code QR CODE

REFERENCES

1 
Määttä J., Hadid A., Pietikäinen M., Oct. 2011, Face spoofing detection from single images using micro-texture analysis, in Proc. IEEE Int. Joint Conf. Biometrics (IJCB), pp. 1-7DOI
2 
Han H., Klare B. F., Bonnen K., Jain A. K., Jan. 2013, Matching composite sketches to face photos: a component-based approach, IEEE Trans. Inf. Forensics Security, Vol. 8, No. 1, pp. 191-204DOI
3 
Boulkenafet Z., Komulainen J., Hadid A., Aug. 2016, Face spoofing detection using colour texture analysis, IEEE Trans. Inf. Forensics Security, Vol. 11, No. 8, pp. 1818-1830DOI
4 
Patel K., Han H., Jain A. K., Oct. 2016, Secure face unlock: spoof detection on smartphones, IEEE Trans. Inf. Forensics Security, Vol. 11, No. 10, pp. 2268-2283DOI
5 
Atoum Y., Liu Y., Jourabloo A., Liu X., Oct. 2017, Face anti-spoofing using patch and depth-based CNNs, in Proc. IEEE Int. Joint Conf. Biometrics (IJCB), pp. 319-328DOI
6 
Yu Z., Zhao C., Wang Z., Qin Y., Su Z., Li X., Zhou F., Zhao G., Jun. 2020, Searching central difference convolutional networks for face anti-spoofing, in Proc. IEEE Int. Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 5295-5305URL
7 
Liu Y., Jourabloo A., Liu X., Jun. 2018, Learning deep models for face anti-spoofing: Binary or auxiliary supervision, in Proc. IEEE Int. Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 389-398URL
8 
Lin B., Li X., Yu Z., Zhao G., May 2019, Face liveness detection by rPPG features and contextual patch-based CNN, in Proc. ICBEA, pp. 61-68DOI
9 
Liu Y., Stehouwer J., Jourabloo A., Liu X., Jun. 2019, Deep tree learning for zero-shot face anti-spoofing, in Proc. IEEE Int. Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 4675-4684URL
10 
Li H., Li W., Cao H., Wang S., Huang F., Kot A. C., Jul. 2018, Unsupervised domain adaptation for face anti-spoofing, IEEE Trans. Inf. Forensics Security, Vol. 13, No. 7, pp. 1794-1809DOI
11 
Jia Y., Zhang J., Shan S., Chen X., Jun. 2020, Single-side domain generalization for face anti-spoofing, in Proc. IEEE Int. Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 8481-8490URL
12 
Xiong F., AbdAlmageed W., Oct 2018, Unknown presentation attack detection with face RGB images, in Proc. IEEE Int. Conf. Biometrics: Theory Appl. Syst. (BTAS), pp. 1-9DOI
13 
Li J., Wang Y., Tan T., Jain A. K., Aug. 2004, Live face detection based on the analysis of Fourier spectra, in Proc. SPIE, Biometric Technol. Human Identificat, pp. 296-303DOI
14 
Zhang Z., Yan J., Liu S., Lei Z., Yi D., Li S. Z., Mar./Apr. 2012, A face antispoofing database with diverse attacks, in Proc. IAPR Int. Conf. Biometrics (ICB), pp. 26-31DOI
15 
Tan X., Li Y., Liu J., Jiang L., Sep. 2010, Face liveness detection from a single image with sparse low rank bilinear discriminative model, in Proc. Eur. Conf. Comput. Vis. (ECCV), pp. 504-517DOI
16 
Peixoto B., Michelassi C., Rocha A., Sep. 2011, Face liveness detection under bad illumination conditions, in Proc. IEEE Int. Conf. Image Process. (ICIP), pp. 3557-3560DOI
17 
Galbally J., Marcel S., Aug. 2014, Face anti-spoofing based on general image quality assessment, in Proc. IAPR Int. Conf. Pattern Recognit. (ICPR), pp. 1173-1178DOI
18 
Galbally J., Marcel S., Fierrez J., Feb. 2014, Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition, IEEE Trans. Image Process., Vol. 23, No. 2, pp. 710-724DOI
19 
Wen D., Han H., Jain A. K., Apr. 2015, Face spoof detection with image distortion analysis, IEEE Trans. Inf. Forensics Security, Vol. 10, No. 4, pp. 746-761DOI
20 
Chingovska I., Anjos A., Marcel S., Sep. 2012, On the effectiveness of local binary patterns in face anti-spoofing, in Proc. IEEE Int. Conf. Biometrics Special Interest Group (BioSIG), pp. 1-7URL
21 
de Freitas Pereira T., Anjos A., De Martino J. M., Marcel S., Nov. 2012, LBP-TOP based countermeasure against face spoofing attacks, in Proc. Int. Workshop Comput. Vis. Local Binary Pattern Variants (ACCV), pp. 121-132DOI
22 
Yang J., Lei Z., Liao S., Li S. Z., Jun. 2013, Face liveness detection with component dependent descriptor, in Proc. IEEE Int. Conf. Biometrics (ICB), pp. 1-6DOI
23 
Chingovska I., Anjos A. R. D., Marcel S., Dec. 2014, Biometrics evaluation under spoofing attacks, IEEE Trans. Inf. Forensics Security, Vol. 9, No. 12, pp. 2264-2276DOI
24 
Kim W., Suh S., Han J-J., Aug. 2015, Face liveness detection from a single image via diffusion speed model, IEEE Trans. Image Process., Vol. 24, No. 8, pp. 2456-2465DOI
25 
Simonyan K., Zisserman A., Dec. 2015, Very deep convolutional networks for large-scale image recognition, in Proc. Int. Conf. Learn., Represent., (ICLR), pp. 1-14URL
26 
He K., Zhang X., Ren S., Sun J., Jun. 2016, Deep residual learning for image recognition, in Proc. IEEE Int. Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 770-778DOI
27 
Feng L., Po L. M., Li Y., Xu X., Yuan F., Cheung T. C. H., Cheung K.-W., Jul. 2016, Integration of image quality and motion cues for face antispoofing: A neural network approach, J. Vis. Commun. Image Represent., Vol. 38, pp. 451-460DOI
28 
Jourabloo A., Liu Y., Liu X., Sep. 2018, Face de-spoofing: anti-spoofing via noise modeling, in Proc. Eur. Conf. Comput. Vis. (ECCV), pp. 1-17DOI
29 
Feng H., Hong Z., Yue H., Chen Y., Wang K., Han J., Liu J., Ding E., 2020, Learning generalized spoof cues for face antispoofing, arXiv preprint ar Xiv:2005.03922.URL
30 
Yu Z., Li X., Niu X., Shi J., Zhao G., Aug. 2020, Face anti-spoofing with human material perception, in Proc. Eur. Conf. Comput. Vis. (ECCV), pp. 1-19URL
31 
Shao R., Lan X., Li J., Yuen P. C., Jun. 2019, Multi-adversarial discriminative deep domain generalization for face presentation attack detection, in Proc. IEEE Int. Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 10023-10031URL
32 
Lim S., Gwak Y., Kim W., Roh J-H., Cho S., Dec. 2020, One-class learning method based on live correlation loss for face anti-spoofing, IEEE Access, Vol. 8, pp. 201635-201648DOI
33 
George A., Marcel S., 2021, Learning one class representation for face presentation attack detection using multi-channel convolutional neural networks, IEEE Trans. Inf. Forensics Security, Vol. 16, No. 1, pp. 361-375DOI
34 
Ghiani L., Marcialis G., Roli F., Nov. 2012, Fingerprint liveness detection by local phase quantization, in Proc. IAPR Int. Conf. on Pattern Recognit. (ICPR), pp. 537-540URL
35 
Li L., Feng X., Boulkenafet Z., Xia Z., Li M., Hadid A., Dec. 2016, An original face anti-spoofing approach using partial convolutional neural network, in Proc. Int. Conf. Image Process. Theory, Tools Appl. (IPTA), pp. 1-6DOI
36 
Boulkenafet Z., Komulainen J., Li L., Feng X., Hadid A., May 2017, OULU-NPU: A mobile face presentation attack database with real-world variations, in Proc. IEEE Int. Conf. Autom. Face Gesture Recognit. (FG), pp. 612-618DOI
37 
Zhang S., Liu A., Wan J., Liang Y., Guo G., Escalera S., Escalante H. J., Li S. Z., Apr. 2020, CASIA-SURF: a large-scale multi-modal benchmark for face anti-spoofing, IEEE Trans. Bio. Behavior Iden. Sci., Vol. 2, No. 2, pp. 182-193DOI
38 
2016, ,ISO/IEC JTC 1/SC 37 Biometrics. information technology biometric presentation attack detection part 1: Framework., international organization for standardizationURL
39 
Zhang K., Zhang Z., Li Z., Qiao Y., Oct. 2016, Joint face detection and alignment using multitask cascaded convolutional networks, IEEE Signal Process. Lett., Vol. 23, No. 10, pp. 1499-1503DOI
40 
Hu P., Ramanan D., Jun 2017, Finding tiny faces, in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 1522-1530URL
41 
Li L., Xia Z., Hadid A., Jiang X., Zhang H., Feng X., Sep. 2019, Replayed video attack detection based on motion blur analysis, IEEE Trans. Inf. Forensics Security, Vol. 14, No. 9, pp. 2246-2261DOI
42 
Wang Z., Zhao C., Qin Y., Zhou Q., Qi G., Wan J., Lei Z., 2018, Exploiting temporal and depth information for multi-frame face anti-spoofing, arXiv preprint arXiv:1811.05118URL
43 
Yang X., Luo W., Bao L., Gao Y., Gong D., Zheng S., Li Z., Lei W., Jun. 2019, Face anti-spoofing: model matters, so does data, in Proc. IEEE Int. Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 3507-3516DOI