Crafting A Panoptic Face Presentation Attack Detector
Citations
109 citations
Cites methods from "Crafting A Panoptic Face Presentati..."
...Other methods have been developed that use the available CNN architectures with customized components and were trained on spoofing databases [40, 41, 15, 42, 43]....
[...]
77 citations
Cites methods from "Crafting A Panoptic Face Presentati..."
...[27] trained an Alexnet model with a combination of cross-entropy and focal losses....
[...]
53 citations
Cites background from "Crafting A Panoptic Face Presentati..."
...Given the vulnerabilities, it is our belief that future research should focus primarily on developing (i) robust PAD algorithms and (ii) universal detectors (Mehta et al. 2019) capable of handling multiple attacks....
[...]
36 citations
Cites methods from "Crafting A Panoptic Face Presentati..."
...Existing methods tried to explore the difference between the real face skin and 3D fake face materials based on the reflectance properties using multispectral imaging [7], [8], texture analysis [9], [10], deep features [11], [12], or liveness cues [13], [14]....
[...]
10 citations
References
73,978 citations
37,861 citations
"Crafting A Panoptic Face Presentati..." refers methods in this paper
...In the proposed architecture, the FC layer is replaced by a two-class SVM classifier [9] to classify the input image as real or spoof....
[...]
13,037 citations
12,161 citations
10,592 citations
"Crafting A Panoptic Face Presentati..." refers methods in this paper
...Images are cropped using the Viola-Jones face detection algorithm [29] and resized to 224 × 224 pixels....
[...]