Face anti-spoofing with multifeature videolet aggregation
Citations
15 citations
14 citations
Cites methods from "Face anti-spoofing with multifeatur..."
...In cross-database scenarios, we perform comparison with the following state-of-the-art approaches: 374 LBP-TOP[25] , color texture [57], visual-codebook [58], Videolet aggregation [59], domain 375 adaption [60], De-spoof [47], Auxiliary [19], deep dynamic textures [61], DDGL [45], GFA-CNN 376 [62], STASN [63]....
[...]
14 citations
Cites background from "Face anti-spoofing with multifeatur..."
...The results related to face presentation attack detection using original and tampered LBP features are summarized in Table 2....
[...]
...Since some PAD algorithms are handcrafted in nature, we also performed some of the experiments with LBP based PAD algorithms....
[...]
...The LBP image is formed by comparing the center pixel of each 3 × 3 grid of the image from its 8 neighborhood pixels....
[...]
...Texture based algorithms such as Gaussian [27], LBP [19, 23], Gabor, Histogram of Oriented Gradients (HOG), Wavelet+ Haralick [1] are the most popular and provide state-of-the-art (SOTA) detection performances across various types of databases....
[...]
...LBP-based PAD Algorithm [9, 19]: The traditional LBP histogram features are computed both from the real and spoof images....
[...]
13 citations
13 citations
Cites methods from "Face anti-spoofing with multifeatur..."
...On cross-datasets evaluations, it is customary to employ Half Total Error Rate, hter = far+frr 2 , which is half the sum of the False Rejection Rate (frr) and the False Acceptance Rate (far) [14, 23]....
[...]
References
2,653 citations
"Face anti-spoofing with multifeatur..." refers background in this paper
...Dynamic texture features such as LBP-TOP [22] are studied in this regard....
[...]
1,709 citations
"Face anti-spoofing with multifeatur..." refers background in this paper
...Biometric systems have different points of vulnerability such as sensor attacks, overriding feature extraction, tampering feature representation, corrupting matcher, tampering stored template, and overriding decision [18]....
[...]
899 citations
"Face anti-spoofing with multifeatur..." refers methods in this paper
...The orientation based optical flow vector is computed by solving the optimization problem 1 using conjugate gradient method [12]....
[...]
716 citations
"Face anti-spoofing with multifeatur..." refers background or methods in this paper
...• On MSU dataset, HOOF obtains tremendous improvement in EER (from 30.41 to 2.50...
[...]
...Similarly, at the Inter Feature Fusion stage, the correlation of 0.51, 0.62, and 0.66 is observed for CASIA, MSU, and 3DMAD datasets, respectively....
[...]
...MSU dataset contains a higher fraction of replay attack videos compared to CASIA....
[...]
...• Performance of the Proposed Approach: The proposed fusion approach (using HOOF and multi-LBP with face and scene aggregated over videolets) provides 0% EER with uncontrolled illumination and background on both MSU and 3DMAD datasets....
[...]
...Orthogonal to the LBP texture descriptors based approaches, quality assessment metrics such as specular reflection, blurring and color density are also explored for anti-spoofing [10], [20]....
[...]
707 citations
Additional excerpts
...The face anti-spoofing problem is extensively studied in literature, particularly with the introduction of Print Attack dataset [1], Replay Attack dataset [5], CASIA-FASD spoofing dataset [21], 3DMAD database [7], and MSU mobile face spoofing database [20]....
[...]