Crafting A Panoptic Face Presentation Attack Detector
Citations
109 citations
Cites methods from "Crafting A Panoptic Face Presentati..."
...Other methods have been developed that use the available CNN architectures with customized components and were trained on spoofing databases [40, 41, 15, 42, 43]....
[...]
77 citations
Cites methods from "Crafting A Panoptic Face Presentati..."
...[27] trained an Alexnet model with a combination of cross-entropy and focal losses....
[...]
53 citations
Cites background from "Crafting A Panoptic Face Presentati..."
...Given the vulnerabilities, it is our belief that future research should focus primarily on developing (i) robust PAD algorithms and (ii) universal detectors (Mehta et al. 2019) capable of handling multiple attacks....
[...]
36 citations
Cites methods from "Crafting A Panoptic Face Presentati..."
...Existing methods tried to explore the difference between the real face skin and 3D fake face materials based on the reflectance properties using multispectral imaging [7], [8], texture analysis [9], [10], deep features [11], [12], or liveness cues [13], [14]....
[...]
10 citations
References
170 citations
"Crafting A Panoptic Face Presentati..." refers methods in this paper
...In this paper, we employ the cosine annealing cyclic function [26]....
[...]
170 citations
"Crafting A Panoptic Face Presentati..." refers methods in this paper
...Majority of the existing anti-spoof methods involve extraction of discriminating features to analyze the face texture, such as Haralick texture features, local binary pattern (LBP), partial least square (PLS), and difference of Gaussian (DoG) [1, 2, 3, 20, 30]....
[...]
165 citations
153 citations
"Crafting A Panoptic Face Presentati..." refers background in this paper
...Dynamic anti-spoofing techniques mostly target blinking [13, 18], motion magnification [6], or liveness detection [8, 28], given a sequence of frames....
[...]
145 citations
"Crafting A Panoptic Face Presentati..." refers background in this paper
...On the other hand, existing state-of-the-art algorithms [17, 24] yield EER of 14....
[...]
...1% in terms of EER from the bestperforming algorithm [17]....
[...]
...[17], is a first-of-its-kind silicone mask attack database containing 130 real and mask attack videos obtained from the web....
[...]