Spoofing Face Recognition With 3D Masks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spoofing Attacks to 2d Face Recognition Systems with 3d Masks

Vulnerability to spoofing attacks is a serious drawback for many biometric systems. Among all biometric traits, face is the one that is exposed to the most serious threat, since it is exceptionally easy to access. The limited work on fraud detection capabilities for face mainly shapes around 2D attacks forged by displaying printed photos or replaying recorded videos on mobile devices. A signifi...

متن کامل

Face Recognition Systems under Spoofing Attack

Face recognition system is one of the most successful application of computer vision, which has been deployed largely in recent years. In last decade, several algorithms for face recognition have been proposed in the literature. To increase reliability of face recognition systems, the systems must be able to differentiate between real genuine faces and fake faces (spoofed faces). In this paper,...

متن کامل

Mask spoofing in face recognition and countermeasures

In this paper, initially, the impact of mask spoofing on face recognition is analyzed. For this purpose, one baseline technique is selected for both 2D and 3D face recognition. Next, novel countermeasures, which are based on the analysis of different shape, texture and reflectance characteristics of real faces and mask faces, are proposed to detect mask spoofing. In this paper, countermeasures ...

متن کامل

3D Face Recognition using Patch Geodesic Derivative Pattern

In this paper, a novel Patch Geodesic Derivative Pattern (PGDP) describing the texture map of a face through its shape data is proposed. Geodesic adjusted textures are encoded into derivative patterns for similarity measurement between two 3D images with different pose and expression variations. An extensive experimental investigation is conducted using the publicly available Bosphorus and BU-3...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2014

ISSN: 1556-6013,1556-6021

DOI: 10.1109/tifs.2014.2322255