Crafting A Panoptic Face Presentation Attack Detector
Citations
109 citations
Cites methods from "Crafting A Panoptic Face Presentati..."
...Other methods have been developed that use the available CNN architectures with customized components and were trained on spoofing databases [40, 41, 15, 42, 43]....
[...]
77 citations
Cites methods from "Crafting A Panoptic Face Presentati..."
...[27] trained an Alexnet model with a combination of cross-entropy and focal losses....
[...]
53 citations
Cites background from "Crafting A Panoptic Face Presentati..."
...Given the vulnerabilities, it is our belief that future research should focus primarily on developing (i) robust PAD algorithms and (ii) universal detectors (Mehta et al. 2019) capable of handling multiple attacks....
[...]
36 citations
Cites methods from "Crafting A Panoptic Face Presentati..."
...Existing methods tried to explore the difference between the real face skin and 3D fake face materials based on the reflectance properties using multispectral imaging [7], [8], texture analysis [9], [10], deep features [11], [12], or liveness cues [13], [14]....
[...]
10 citations
References
106 citations
"Crafting A Panoptic Face Presentati..." refers methods in this paper
...If we compare with existing state-of-the-art algorithms [1] [7] on CASIA-FASD, the best reported results are 2....
[...]
...Majority of the existing anti-spoof methods involve extraction of discriminating features to analyze the face texture, such as Haralick texture features, local binary pattern (LBP), partial least square (PLS), and difference of Gaussian (DoG) [1, 2, 3, 20, 30]....
[...]
104 citations
"Crafting A Panoptic Face Presentati..." refers methods in this paper
...Majority of the existing anti-spoof methods involve extraction of discriminating features to analyze the face texture, such as Haralick texture features, local binary pattern (LBP), partial least square (PLS), and difference of Gaussian (DoG) [1, 2, 3, 20, 30]....
[...]
98 citations
90 citations
"Crafting A Panoptic Face Presentati..." refers background in this paper
...On the other hand, existing state-of-the-art algorithms [17, 24] yield EER of 14....
[...]
89 citations
"Crafting A Panoptic Face Presentati..." refers background in this paper
...[22] performed an elaborate study, which accumulates responses of three experiments: human matching of two faces, human matching of two faces along with an option of fraudulent (morphed) image, and testing on an automated face recognition device....
[...]