A review of state-of-the-art in Face Presentation Attack Detection: From early development to advanced deep learning and multi-modal fusion methods

Face Recognition is considered one of the most common biometric solutions these days and is widely used across a range of devices for various security purposes. The performance of FR systems has improved by orders of magnitude over the past decade. This is mainly due to the latest developments in co...

Full description

Saved in:
Bibliographic Details
Published inInformation fusion Vol. 75; pp. 55 - 69
Main Authors Abdullakutty, Faseela, Elyan, Eyad, Johnston, Pamela
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.11.2021
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Face Recognition is considered one of the most common biometric solutions these days and is widely used across a range of devices for various security purposes. The performance of FR systems has improved by orders of magnitude over the past decade. This is mainly due to the latest developments in computer vision and deep convolutional neural networks, and the availability of large training datasets. At the same time, these systems have been subject to various types of attacks. Presentation attacks are common, simple, and easy to implement. These simply involve presenting a video, photo, or mask to the camera or digital sensor and have proven capable of fooling FR systems and providing access to unauthorised users. Presentation attack detection is increasingly attracting more attention in the research community. A wide range of methods has already been developed to address this challenge. Deep learning-based methods in particular have shown very promising results. However, existing literature suggests that even with state-of-the-art methods, performance drops significantly in cross-dataset evaluation. We present a thorough, comprehensive, and technical review of existing literature on this timely and challenging problem. We first introduce and discuss the presentation attack problem and cover related and recent work in this area. In-depth technical details of existing presentation attack detection methods are then presented and critically discussed and evaluated, followed by a comprehensive discussion and evaluation of existing public datasets and commonly used evaluation metrics. Our review shows clearly that despite the recent and significant advances in this area of research, detecting unseen attacks is still considered a key problem. Machine learning methods tend to perform well, but only when test data comes from the same distribution as the training data (i.e. same dataset). New research directions are discussed in detail, including ways to improve the generalisation of machine learning methods, and move towards creating more stable presentation attack detection techniques that generalise across a wide range of unseen samples. •Face Presentation Attacks pose a serious challenge to Face Recognition (FR).•A critical review of various types of presentation attacks on FR.•An extensive and critical evaluation of presentation attack detection methods.•A detailed discussion on challenges, limitations, and public datasets in this area.•Research gaps and future directions towards more stable detection methods.
AbstractList Face Recognition is considered one of the most common biometric solutions these days and is widely used across a range of devices for various security purposes. The performance of FR systems has improved by orders of magnitude over the past decade. This is mainly due to the latest developments in computer vision and deep convolutional neural networks, and the availability of large training datasets. At the same time, these systems have been subject to various types of attacks. Presentation attacks are common, simple, and easy to implement. These simply involve presenting a video, photo, or mask to the camera or digital sensor and have proven capable of fooling FR systems and providing access to unauthorised users. Presentation attack detection is increasingly attracting more attention in the research community. A wide range of methods has already been developed to address this challenge. Deep learning-based methods in particular have shown very promising results. However, existing literature suggests that even with state-of-the-art methods, performance drops significantly in cross-dataset evaluation. We present a thorough, comprehensive, and technical review of existing literature on this timely and challenging problem. We first introduce and discuss the presentation attack problem and cover related and recent work in this area. In-depth technical details of existing presentation attack detection methods are then presented and critically discussed and evaluated, followed by a comprehensive discussion and evaluation of existing public datasets and commonly used evaluation metrics. Our review shows clearly that despite the recent and significant advances in this area of research, detecting unseen attacks is still considered a key problem. Machine learning methods tend to perform well, but only when test data comes from the same distribution as the training data (i.e. same dataset). New research directions are discussed in detail, including ways to improve the generalisation of machine learning methods, and move towards creating more stable presentation attack detection techniques that generalise across a wide range of unseen samples. •Face Presentation Attacks pose a serious challenge to Face Recognition (FR).•A critical review of various types of presentation attacks on FR.•An extensive and critical evaluation of presentation attack detection methods.•A detailed discussion on challenges, limitations, and public datasets in this area.•Research gaps and future directions towards more stable detection methods.
Author Abdullakutty, Faseela
Johnston, Pamela
Elyan, Eyad
Author_xml – sequence: 1
  givenname: Faseela
  orcidid: 0000-0002-3084-0604
  surname: Abdullakutty
  fullname: Abdullakutty, Faseela
  email: f.abdullakutty@rgu.ac.uk
– sequence: 2
  givenname: Eyad
  orcidid: 0000-0002-8342-9026
  surname: Elyan
  fullname: Elyan, Eyad
  email: e.elyan@rgu.ac.uk
– sequence: 3
  givenname: Pamela
  orcidid: 0000-0002-6199-8471
  surname: Johnston
  fullname: Johnston, Pamela
  email: p.johnston2@rgu.ac.uk
BookMark eNqFkMFO3DAQhq0KpALlDTj4BRzsJE6yHJBWC9tWQmoP5WxN7HHxNrFXtncrnoMXxtH21EN7mtHM__-a-S7JmQ8eCbkRvBJcdLe7ynlrD6mqeS0q3lZcyA_kQgx9zbqGy7PSy65jtWzkR3KZ0o5z0fNGXJC3NY14dPibBktThowsWJZfkEHM1Hm6BY30e8SEvmxd8HSdM-hf9AEz6mVwR7cxzBQhTq_U4BGnsJ-LmuZAwRzBazRljns6FY13_icFb-h8mLJjczAw0XL7kjxjfgkmfSLnFqaE13_qFXnePv7YfGFP3z5_3ayfmG54lxmsOFhom2FEacdewqi1WDVDrWVj0A6tGA2segM1cjsiH2yPoIH3bT2CHOvmirSnXB1DShGt2kc3Q3xVgqsFrNqpE1i1gFW8VQVssd39ZdPuhCZHcNP_zPcnM5bHCveokna4IHKx4FQmuH8HvAPvvZ1f
CitedBy_id crossref_primary_10_1016_j_cose_2023_103586
crossref_primary_10_3390_electronics12102199
crossref_primary_10_1007_s00530_023_01070_5
crossref_primary_10_1016_j_inffus_2022_10_033
crossref_primary_10_3390_s22145196
crossref_primary_10_3233_IDT_220197
crossref_primary_10_1016_j_inffus_2022_12_020
crossref_primary_10_1109_ACCESS_2023_3298443
crossref_primary_10_1016_j_inffus_2023_01_022
crossref_primary_10_1016_j_cose_2022_103026
crossref_primary_10_1016_j_engappai_2023_107788
crossref_primary_10_1016_j_inffus_2023_102192
crossref_primary_10_1016_j_engappai_2023_107569
crossref_primary_10_3390_bdcc7010037
crossref_primary_10_1007_s12559_022_10037_z
crossref_primary_10_1016_j_engappai_2023_106759
crossref_primary_10_1016_j_eswa_2022_116786
crossref_primary_10_1007_s44163_023_00077_1
crossref_primary_10_1109_TDSC_2024_3445570
crossref_primary_10_1007_s00371_024_03567_0
crossref_primary_10_1155_2022_3961910
crossref_primary_10_1109_ACCESS_2023_3261247
Cites_doi 10.1109/TIFS.2020.3002390
10.1007/s11760-016-1014-2
10.1109/TIFS.2019.2916652
10.1109/TIFS.2016.2578288
10.1016/j.patrec.2019.08.008
10.1145/3301282
10.1088/1742-6596/1229/1/012044
10.1145/2976749.2978392
10.1109/CVPR42600.2020.00671
10.1109/TIFS.2014.2349158
10.1109/TBIOM.2019.2946175
10.1016/j.jvcir.2019.102660
10.1016/j.compeleceng.2018.09.005
10.3390/s19214733
10.1007/978-3-030-01261-8_18
10.1016/j.patcog.2019.107032
10.1109/TIFS.2010.2054083
10.1109/TIFS.2017.2676720
10.1109/CVPRW.2017.40
10.1109/CVPRW.2018.00096
10.1145/3386252
10.1049/iet-bmt.2017.0079
10.1109/CVPR.2019.00362
10.1109/TIFS.2015.2406533
10.1109/TIFS.2019.2934867
10.1016/j.inffus.2020.04.001
10.1109/CVPR.2018.00048
10.1016/j.future.2010.11.024
10.1016/j.inffus.2020.08.021
10.1109/TIFS.2015.2400395
10.1109/CVPR.2019.01026
10.1109/CVPR.2019.00481
10.1155/2016/9682453
10.1007/s11277-018-5661-1
10.1109/CVPRW.2018.00008
10.1016/j.patcog.2017.08.003
10.1145/3190618
10.1049/iet-bmt.2014.0075
10.1117/1.JEI.28.4.043001
10.1109/TIFS.2019.2922241
10.1109/ACCESS.2014.2381273
10.1016/j.imavis.2019.11.004
10.3390/sym9120305
10.1109/ACCESS.2019.2957273
10.1049/iet-bmt.2018.5235
10.1109/CVPR42600.2020.00851
10.1109/CVPRW50498.2020.00333
10.1109/TNNLS.2018.2790388
10.1145/3234150
10.1145/3317611
10.1371/journal.pone.0099212
10.1109/ICB45273.2019.8987254
10.1016/j.inffus.2016.05.003
10.1109/TIFS.2015.2403306
10.1109/CVPRW.2018.00010
10.1109/ACCESS.2017.2729161
10.1016/j.jvcir.2019.102746
10.1109/TIFS.2018.2801312
10.3390/electronics9040661
10.1109/TBIOM.2019.2903860
10.1109/CVPR42600.2020.00534
10.1109/CVPRW.2016.193
10.1109/CVPRW50498.2020.00415
10.1109/CVPR.2017.554
10.1016/j.eswa.2019.113002
10.1016/j.inffus.2018.12.003
10.1145/3345336.3345345
10.1109/CVPRW.2019.00201
10.1016/j.cognition.2018.09.002
10.1016/j.eswa.2018.05.004
10.1016/j.neucom.2019.11.117
10.1016/j.neucom.2019.11.016
10.1016/j.eswa.2019.113114
10.1109/ICCVW.2019.00062
10.1016/j.engappai.2018.04.013
10.1145/3038924
10.1109/TIP.2015.2395951
10.1109/CVPRW.2014.22
10.1109/TBIOM.2019.2939421
ContentType Journal Article
Copyright 2021 Elsevier B.V.
Copyright_xml – notice: 2021 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.inffus.2021.04.015
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
EISSN 1872-6305
EndPage 69
ExternalDocumentID 10_1016_j_inffus_2021_04_015
S1566253521000919
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
29I
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EJD
EO8
EO9
EP2
EP3
F0J
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
UHS
ZMT
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
ID FETCH-LOGICAL-c306t-a90afa438be5fb75abcc19382c53def841bda97da2e0fbe08f7eaca0742ba5b23
IEDL.DBID .~1
ISSN 1566-2535
IngestDate Thu Apr 24 23:01:48 EDT 2025
Tue Jul 01 04:14:39 EDT 2025
Mon Apr 15 04:49:33 EDT 2024
IsPeerReviewed true
IsScholarly true
Keywords Deep learning
Presentation attacks
Generalisation
Face Recognition
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c306t-a90afa438be5fb75abcc19382c53def841bda97da2e0fbe08f7eaca0742ba5b23
ORCID 0000-0002-3084-0604
0000-0002-8342-9026
0000-0002-6199-8471
PageCount 15
ParticipantIDs crossref_primary_10_1016_j_inffus_2021_04_015
crossref_citationtrail_10_1016_j_inffus_2021_04_015
elsevier_sciencedirect_doi_10_1016_j_inffus_2021_04_015
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate November 2021
2021-11-00
PublicationDateYYYYMMDD 2021-11-01
PublicationDate_xml – month: 11
  year: 2021
  text: November 2021
PublicationDecade 2020
PublicationTitle Information fusion
PublicationYear 2021
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Xiong, AbdAlmageed (b162) 2018
Costa-Pazo, Bhattacharjee, Vazquez-Fernandez, Marcel (b138) 2016
Wang, Yao, Kwok, Ni (b105) 2020; 53
Kotwal, Mostaani, Marcel (b147) 2020; 2
Wen, Han, Jain (b16) 2015; 10
D.-L. Nguyen, S.S. Arora, Y. Wu, H. Yang, Adversarial light projection attacks on face recognition systems: A feasibility study, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2020, pp. 814–815.
kalihal Asst, Kaur (b34) 2019
Y. Liu, A. Jourabloo, X. Liu, Learning deep models for face anti-spoofing: Binary or auxiliary supervision, in: In Proceeding of IEEE Computer Vision and Pattern Recognition, Salt Lake City, UT, 2018.
George, Mostaani, Geissenbuhler, Nikisins, Anjos, Marcel (b119) 2020; 15
Määttä, Hadid, Pietikäinen (b23) 2011
D. Pérez-Cabo, D. Jiménez-Cabello, A. Costa-Pazo, R.J. López-Sastre, Deep anomaly detection for generalized face anti-spoofing, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019.
Yu, Li, Niu, Shi, Zhao (b114) 2020
Li, Komulainen, Zhao, Yuen, Pietikäinen (b63) 2016
Fan, Shi, Wang, Yi (b122) 2019
Ramachandra, Busch (b5) 2017; 50
Chen, Hu, Lei, Chen, Robertson, Li (b120) 2019; 15
J. Hernandez-Ortega, J. Fierrez, A. Morales, P. Tome, Time analysis of pulse-based face anti-spoofing in visible and NIR, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 544–552.
Rattani, Derakhshani (b21) 2018; 72
Chingovska, Anjos, Marcel (b24) 2012
Chingovska, Dos Anjos, Marcel (b158) 2014; 9
Nikisins, Mohammadi, Anjos, Marcel (b97) 2018
Manjani, Tariyal, Vatsa, Singh, Majumdar (b143) 2017; 12
Bok, Suh, Lee (b150) 2020; 9
Komulainen, Hadid, Pietikäinen (b66) 2013
Pan, Sun, Wu, Lao (b160) 2007
Jia, Guo, Xu, Wang (b36) 2020; 93
Jiang, Liu, Zhou (b118) 2019; 128
G. Wang, H. Han, S. Shan, X. Chen, Improving cross-database face presentation attack detection via adversarial domain adaptation, in: International Conference on Biometrics, ICB, 2019.
Chen, Dantcheva, Swearingen, Ross (b141) 2017
Boulkenafet, Komulainen, Li, Feng, Hadid (b142) 2017
Mahmud, Kaiser, Hussain, Vassanelli (b73) 2018; 29
Raghavendra, Raja, Venkatesh, Cheikh, Busch (b140) 2017
Nguyen, Delahaies, Retraint, Morain-Nicolier (b157) 2019; 7
Killioğlu, Taşkiran, Kahraman (b61) 2017
Abudarham, Shkiller, Yovel (b3) 2019; 182
Kähm, Damer (b26) 2012
Baweja, Oza, Perera, Patel (b104) 2020
Hernandez-Ortega, Fierrez, Morales, Galbally (b10) 2019
Singh, Singh, Vatsa, Ratha, Chellappa (b144) 2019; 1
Liu, Tan, Wan, Escalera, Guo, Li (b152) 2021
Feng, Hong, Yue, Chen, Wang, Han, Liu, Ding (b103) 2020
Ramachandra, Venkatesh, Raja, Bhattacharjee, Wasnik, Marcel, Busch (b54) 2019
Singh, Arora (b60) 2018; 100
Ieracitano, Adeel, Morabito, Hussain (b74) 2020; 387
Soltanpour, Boufama, Wu (b7) 2017; 72
Anjos, Chingovska, Marcel (b128) 2014
Marcel, Nixon, Li (b15) 2014
Alotaibi, Mahmood (b57) 2017; 11
Yang, Zhao, Wang, Lv (b43) 2020; 406
Lucena, Junior, Moia, Souza, Valle, Lotufo (b80) 2017
T. Kim, Y. Kim, I. Kim, D. Kim, BASN: Enriching feature representation using bipartite auxiliary supervisions for face anti-spoofing, in: Proceedings of the IEEE International Conference on Computer Vision Workshops, 2019, pp. 0–0.
Zhou, Gao, Chen, Li, Li, Yang, Zhao (b87) 2019
Kisku, Rakshit (b2) 2017; 5
G. Wang, H. Han, S. Shan, X. Chen, Cross-domain face presentation attack detection via multi-domain disentangled representation learning, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 6678–6687.
Zhang, Liu, Wan, Liang, Guo, Escalera, Escalante, Li (b148) 2020
Zhang, Yao, Zhang, Tai, Ding, Li, Huang, Song, Ma (b94) 2020
Li, Li, Cao, Wang, Huang, Kot (b145) 2018; 13
Hong, Hwang, Yoo, Yoon (b127) 2019; 52
Z. Zhou, D. Tang, X. Wang, W. Han, X. Liu, K. Zhang, Invisible mask: Practical attacks on face recognition with infrared, arXiv e-prints, 2018, arXiv–1803.
Arashloo, Kittler (b96) 2018
Zhang, Yan, Liu, Lei, Yi, Li (b129) 2012
Galbally, Alonso-Fernandez, Fierrez, Ortega-Garcia (b159) 2012; 28
A. Agarwal, D. Yadav, N. Kohli, R. Singh, M. Vatsa, A. Noore, Face presentation attack with latex masks in multispectral videos, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017, pp. 81–89.
Z. Yu, C. Zhao, Z. Wang, Y. Qin, Z. Su, X. Li, F. Zhou, G. Zhao, Searching central difference convolutional networks for face anti-spoofing, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 5295–5305.
Nagpal, Dubey (b79) 2019
Munir, Khan (b22) 2019; 65
Kotwal, Mostaani, Marcel (b39) 2019; 2
I. Stylios, S. Kokolakis, O. Thanou, S. Chatzis, Behavioral biometrics & continuous user authentication on mobile devices: A survey, Inf. Fusion, 66, 76–99.
Singh, Vatsa, Bhatt, Bharadwaj, Noore, Nooreyezdan (b13) 2010; 5
Kaur, Mann (b20) 2017; 164
Atoum, Liu, Jourabloo, Liu (b109) 2017
Yılmaz, Turhal, Nabiyev (b56) 2020; 5
Xiao, Tang, Guo, Yang, Zhu, Lei, Li (b146) 2019
Rehman, Po, Liu (b117) 2020; 142
Chingovska, Erdogmus, Anjos, Marcel (b6) 2016
George, Mostaani, Geissenbuhler, Nikisins, Anjos, Marcel (b51) 2019; 15
Sharif, Bhagavatula, Bauer, Reiter (b45) 2019; 22
Fatemifar, Arashloo, Awais, Kittler (b98) 2019
Dhamecha, Singh, Vatsa, Kumar (b154) 2014; 9
Ghaffar, Mohd (b29) 2017; 9
L. Abduh, I. Ivrissimtzis, Use of in-the-wild images for anomaly detection in face anti-spoofing, arXiv, 2020, arXiv–2006.
Jia, Li, Hu, Xu (b151) 2019
Souza, Oliveira, Pamplona, Papa (b14) 2018; 72
B. Lin, X. Li, Z. Yu, G. Zhao, Face liveness detection by rPPG features and contextual patch-based CNN, in: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications, 2019, pp. 61–68.
Mohammadi, Bhattacharjee, Marcel (b88) 2020
Y. Liu, A. Jourabloo, X. Liu, Learning deep models for face anti-spoofing: Binary or auxiliary supervision, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 389–398.
Wu, Pan, Zhang (b32) 2019
Liu, Stehouwer, Jourabloo, Atoum, Liu (b116) 2019
Y. Jia, J. Zhang, S. Shan, X. Chen, Single-side domain generalization for face anti-spoofing, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 8484–8493.
Fatemifar, Awais, Arashloo, Kittler (b99) 2019
Sundararajan, Woodard (b25) 2018; 51
Lumini, Nanni (b8) 2017; 33
D. Deb, X. Liu, A.K. Jain, FaceGuard: A self-supervised defense against adversarial face images, arXiv e-prints, 2020, arXiv–2011.
Goodfellow, Pouget-Abadie, Mirza, Xu, Warde-Farley, Ozair, Courville, Bengio (b85) 2014
Yosinski, Clune, Bengio, Lipson (b78) 2014
Dhamecha, Nigam, Singh, Vatsa (b38) 2013
Mohammadi, Bhattacharjee, Marcel (b30) 2017; 7
Raheem, Ahmad, Adnan (b31) 2019; 9
Z. Yu, Y. Qin, X. Li, Z. Wang, C. Zhao, Z. Lei, G. Zhao, Multi-modal face anti-spoofing based on central difference networks, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2020, pp. 650–651.
Gogate, Dashtipour, Adeel, Hussain (b71) 2020; 63
Bhattacharjee, Mohammadi, Anjos, Marcel (b33) 2019
Pouyanfar, Sadiq, Yan, Tian, Tao, Reyes, Shyu, Chen, Iyengar (b75) 2018; 51
Raghavendra, Raja, Busch (b134) 2015; 24
Saha, Xu, Kanakis, Georgoulis, Chen, Paudel, Van Gool (b90) 2020
Erdogmus, Marcel (b136) 2013
J. Yang, P. Ren, D. Zhang, D. Chen, F. Wen, H. Li, G. Hua, Neural aggregation network for video face recognition, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2017, pp. 4362–4371.
X. Yang, W. Luo, L. Bao, Y. Gao, D. Gong, S. Zheng, Z. Li, W. Liu, Face anti-spoofing: Model matters, so does data, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 3507–3516.
Kumar, Singh, Kumar (b19) 2017
V. Kushwaha, M. Singh, R. Singh, M. Vatsa, N. Ratha, R. Chellappa, Disguised faces in the wild, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 1–9.
Liu, Song, Zhang, Zhao, Yang, Hou (b125) 2019; 19
Nikisins, George, Marcel (b82) 2019
Yang, Lei, Liao, Li (b67) 2013
Peng, Qin, Long (b163) 2020; 66
Bhattacharjee, Marcel (b131) 2017
Rathgeb, Drozdowski, Busch (b12) 2020
Dargan, Kumar (b9) 2020; 143
Galbally, Marcel, Fierrez (b27) 2014; 2
Peixoto, Michelassi, Rocha (b69) 2011
N. Kohli, D. Yadav, A. Noore, Face verification with disguise variations via deep disguise recognizer, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 17–24.
Arora, Tiwari, Gupta (b59) 2019
Rehman, Po, Liu (b76) 2018; 108
M. Sharif, S. Bhagavatula, L. Bauer, M.K. Reiter, Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition, in: Proceedings of the 2016 ACM Sigsac Conference on Computer and Communications Security, 2016, pp. 1528–1540.
R. Shao, X. Lan, J. Li, P.C. Yuen, Multi-adversarial discriminative deep domain generalization for face presentation attack detection, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 10023–10031.
Chen, Dantcheva, Ross (b132) 2013
A. Jourabloo, Y. Liu, X. Liu, Face de-spoofing: Anti-spoofing via noise modeling, in: Proceedings of the European Conference on Computer Vision, ECCV, 2018, pp. 290–306.
Jiang, Liu, Shao, Zhou (b124) 2020
Patel, Han, Jain (b18) 2016; 11
Bhattacharjee, Mohammadi, Marcel (b55) 2018
Chen, Wen, Xie, Wen, Sheng, Tang (b77) 2019; 8
Tu, Zhang, Xie, Luo, Zhang, Ma (b70) 2019; 28
Jia, Guo, Xu (b35) 2020; 98
Boulkenafet, Komulainen, Hadid (b68) 2016; 24
Singh, Agarwal, Singh, Nagpal, Vatsa (b40) 2020; vol. 34
Singh, Singh, Ross (b48) 2019; 52
Ramachandra, Stokkenes, Mohammadi, Venkatesh, Raja, Wasnik, Poiret, Marcel, Busch (b53) 2019
Zhang, Tondi, Barni (b41) 2020; 197
Wang, Zhao, Qin, Zhou, Qi, Wan, Lei (b111) 2018
Information technology- biometric presentation attack detection- part 3: Testing and Reporting, International Organization for Standardization, ISO/IEC DIS 30107-3:2017 (2017).
George, Marcel (b110) 2019
Kotwal, Bhattacharjee, Marcel (b121) 2019;
Pouyanfar (10.1016/j.inffus.2021.04.015_b75) 2018; 51
Yosinski (10.1016/j.inffus.2021.04.015_b78) 2014
Sundararajan (10.1016/j.inffus.2021.04.015_b25) 2018; 51
Saha (10.1016/j.inffus.2021.04.015_b90) 2020
Boulkenafet (10.1016/j.inffus.2021.04.015_b142) 2017
10.1016/j.inffus.2021.04.015_b133
10.1016/j.inffus.2021.04.015_b126
Ramachandra (10.1016/j.inffus.2021.04.015_b5) 2017; 50
Yu (10.1016/j.inffus.2021.04.015_b114) 2020
Costa-Pazo (10.1016/j.inffus.2021.04.015_b138) 2016
Fatemifar (10.1016/j.inffus.2021.04.015_b98) 2019
Dargan (10.1016/j.inffus.2021.04.015_b9) 2020; 143
Ramachandra (10.1016/j.inffus.2021.04.015_b53) 2019
Wen (10.1016/j.inffus.2021.04.015_b16) 2015; 10
Kotwal (10.1016/j.inffus.2021.04.015_b39) 2019; 2
Munir (10.1016/j.inffus.2021.04.015_b22) 2019; 65
10.1016/j.inffus.2021.04.015_b44
Tu (10.1016/j.inffus.2021.04.015_b70) 2019; 28
10.1016/j.inffus.2021.04.015_b42
Singh (10.1016/j.inffus.2021.04.015_b144) 2019; 1
10.1016/j.inffus.2021.04.015_b47
10.1016/j.inffus.2021.04.015_b46
Souza (10.1016/j.inffus.2021.04.015_b14) 2018; 72
Peng (10.1016/j.inffus.2021.04.015_b163) 2020; 66
10.1016/j.inffus.2021.04.015_b137
Wang (10.1016/j.inffus.2021.04.015_b111) 2018
Erdogmus (10.1016/j.inffus.2021.04.015_b136) 2013
10.1016/j.inffus.2021.04.015_b4
Raghavendra (10.1016/j.inffus.2021.04.015_b134) 2015; 24
Wang (10.1016/j.inffus.2021.04.015_b64) 2017; 9
Sharif (10.1016/j.inffus.2021.04.015_b45) 2019; 22
Qin (10.1016/j.inffus.2021.04.015_b106) 2020
Pan (10.1016/j.inffus.2021.04.015_b160) 2007
Chen (10.1016/j.inffus.2021.04.015_b77) 2019; 8
Nguyen (10.1016/j.inffus.2021.04.015_b157) 2019; 7
Singh (10.1016/j.inffus.2021.04.015_b60) 2018; 100
Costa-Pazo (10.1016/j.inffus.2021.04.015_b89) 2019
Jia (10.1016/j.inffus.2021.04.015_b36) 2020; 93
10.1016/j.inffus.2021.04.015_b37
Jiang (10.1016/j.inffus.2021.04.015_b118) 2019; 128
Määttä (10.1016/j.inffus.2021.04.015_b23) 2011
Steiner (10.1016/j.inffus.2021.04.015_b139) 2016; 2016
Tirunagari (10.1016/j.inffus.2021.04.015_b58) 2015; 10
10.1016/j.inffus.2021.04.015_b112
Liu (10.1016/j.inffus.2021.04.015_b152) 2021
Hasan (10.1016/j.inffus.2021.04.015_b50) 2019; 1229
Liu (10.1016/j.inffus.2021.04.015_b125) 2019; 19
Chingovska (10.1016/j.inffus.2021.04.015_b24) 2012
Tolosana (10.1016/j.inffus.2021.04.015_b49) 2019; 15
Baweja (10.1016/j.inffus.2021.04.015_b104) 2020
10.1016/j.inffus.2021.04.015_b108
Kisku (10.1016/j.inffus.2021.04.015_b2) 2017; 5
Zhou (10.1016/j.inffus.2021.04.015_b87) 2019
10.1016/j.inffus.2021.04.015_b107
Zhang (10.1016/j.inffus.2021.04.015_b153) 2020
Goodfellow (10.1016/j.inffus.2021.04.015_b85) 2014
Chen (10.1016/j.inffus.2021.04.015_b132) 2013
Gogate (10.1016/j.inffus.2021.04.015_b71) 2020; 63
Zhang (10.1016/j.inffus.2021.04.015_b94) 2020
Chingovska (10.1016/j.inffus.2021.04.015_b158) 2014; 9
Ieracitano (10.1016/j.inffus.2021.04.015_b74) 2020; 387
George (10.1016/j.inffus.2021.04.015_b110) 2019
Zhang (10.1016/j.inffus.2021.04.015_b148) 2020
Rattani (10.1016/j.inffus.2021.04.015_b21) 2018; 72
Ramachandra (10.1016/j.inffus.2021.04.015_b54) 2019
Nikisins (10.1016/j.inffus.2021.04.015_b97) 2018
Li (10.1016/j.inffus.2021.04.015_b145) 2018; 13
10.1016/j.inffus.2021.04.015_b28
Zhang (10.1016/j.inffus.2021.04.015_b41) 2020; 197
Singh (10.1016/j.inffus.2021.04.015_b48) 2019; 52
Bok (10.1016/j.inffus.2021.04.015_b150) 2020; 9
10.1016/j.inffus.2021.04.015_b115
10.1016/j.inffus.2021.04.015_b113
Adeel (10.1016/j.inffus.2021.04.015_b72) 2019
George (10.1016/j.inffus.2021.04.015_b51) 2019; 15
kalihal Asst (10.1016/j.inffus.2021.04.015_b34) 2019
Arashloo (10.1016/j.inffus.2021.04.015_b96) 2018
Chingovska (10.1016/j.inffus.2021.04.015_b6) 2016
10.1016/j.inffus.2021.04.015_b11
Fan (10.1016/j.inffus.2021.04.015_b122) 2019
Wang (10.1016/j.inffus.2021.04.015_b86) 2020; 16
Soltanpour (10.1016/j.inffus.2021.04.015_b7) 2017; 72
10.1016/j.inffus.2021.04.015_b17
Kotwal (10.1016/j.inffus.2021.04.015_b121) 2019; 1
Rehman (10.1016/j.inffus.2021.04.015_b76) 2018; 108
Kaur (10.1016/j.inffus.2021.04.015_b20) 2017; 164
Komulainen (10.1016/j.inffus.2021.04.015_b66) 2013
Bhattacharjee (10.1016/j.inffus.2021.04.015_b55) 2018
Jia (10.1016/j.inffus.2021.04.015_b151) 2019
Marcel (10.1016/j.inffus.2021.04.015_b15) 2014
Boulkenafet (10.1016/j.inffus.2021.04.015_b68) 2016; 24
Feng (10.1016/j.inffus.2021.04.015_b103) 2020
10.1016/j.inffus.2021.04.015_b91
Wang (10.1016/j.inffus.2021.04.015_b123) 2019
Raheem (10.1016/j.inffus.2021.04.015_b31) 2019; 9
Galbally (10.1016/j.inffus.2021.04.015_b27) 2014; 2
Mohammadi (10.1016/j.inffus.2021.04.015_b88) 2020
10.1016/j.inffus.2021.04.015_b92
10.1016/j.inffus.2021.04.015_b93
Galbally (10.1016/j.inffus.2021.04.015_b135) 2016; 5
Singh (10.1016/j.inffus.2021.04.015_b13) 2010; 5
Nagpal (10.1016/j.inffus.2021.04.015_b79) 2019
Jia (10.1016/j.inffus.2021.04.015_b35) 2020; 98
Wang (10.1016/j.inffus.2021.04.015_b105) 2020; 53
Yang (10.1016/j.inffus.2021.04.015_b43) 2020; 406
10.1016/j.inffus.2021.04.015_b100
Xiao (10.1016/j.inffus.2021.04.015_b146) 2019
10.1016/j.inffus.2021.04.015_b101
Chen (10.1016/j.inffus.2021.04.015_b120) 2019; 15
Kumar (10.1016/j.inffus.2021.04.015_b19) 2017
Dhamecha (10.1016/j.inffus.2021.04.015_b38) 2013
Anjos (10.1016/j.inffus.2021.04.015_b128) 2014
Dantcheva (10.1016/j.inffus.2021.04.015_b130) 2012
10.1016/j.inffus.2021.04.015_b84
Rathgeb (10.1016/j.inffus.2021.04.015_b12) 2020
Lumini (10.1016/j.inffus.2021.04.015_b8) 2017; 33
Bhattacharjee (10.1016/j.inffus.2021.04.015_b33) 2019
Alotaibi (10.1016/j.inffus.2021.04.015_b57) 2017; 11
Dhamecha (10.1016/j.inffus.2021.04.015_b154) 2014; 9
Yang (10.1016/j.inffus.2021.04.015_b67) 2013
10.1016/j.inffus.2021.04.015_b1
Xiong (10.1016/j.inffus.2021.04.015_b162) 2018
10.1016/j.inffus.2021.04.015_b155
10.1016/j.inffus.2021.04.015_b156
Mahmud (10.1016/j.inffus.2021.04.015_b73) 2018; 29
Killioğlu (10.1016/j.inffus.2021.04.015_b61) 2017
Kähm (10.1016/j.inffus.2021.04.015_b26) 2012
Atoum (10.1016/j.inffus.2021.04.015_b109) 2017
Rehman (10.1016/j.inffus.2021.04.015_b117) 2020; 142
Hernandez-Ortega (10.1016/j.inffus.2021.04.015_b10) 2019
Liu (10.1016/j.inffus.2021.04.015_b116) 2019
Li (10.1016/j.inffus.2021.04.015_b63) 2016
Ghaffar (10.1016/j.inffus.2021.04.015_b29) 2017; 9
Arashloo (10.1016/j.inffus.2021.04.015_b95) 2017; 5
Peixoto (10.1016/j.inffus.2021.04.015_b69) 2011
George (10.1016/j.inffus.2021.04.015_b119) 2020; 15
Arora (10.1016/j.inffus.2021.04.015_b59) 2019
Raghavendra (10.1016/j.inffus.2021.04.015_b140) 2017
Timoshenko (10.1016/j.inffus.2021.04.015_b149) 2019
10.1016/j.inffus.2021.04.015_b65
Bhattacharjee (10.1016/j.inffus.2021.04.015_b131) 2017
Zhang (10.1016/j.inffus.2021.04.015_b129) 2012
Abudarham (10.1016/j.inffus.2021.04.015_b3) 2019; 182
Lucena (10.1016/j.inffus.2021.04.015_b80) 2017
Mohammadi (10.1016/j.inffus.2021.04.015_b30) 2017; 7
Nikisins (10.1016/j.inffus.2021.04.015_b82) 2019
Yılmaz (10.1016/j.inffus.2021.04.015_b56) 2020; 5
Li (10.1016/j.inffus.2021.04.015_b102) 2020
10.1016/j.inffus.2021.04.015_b161
Fatemifar (10.1016/j.inffus.2021.04.015_b99) 2019
Patel (10.1016/j.inffus.2021.04.015_b18) 2016; 11
Galbally (10.1016/j.inffus.2021.04.015_b159) 2012; 28
Manjani (10.1016/j.inffus.2021.04.015_b143) 2017; 12
Yu (10.1016/j.inffus.2021.04.015_b83) 2020
Tan (10.1016/j.inffus.2021.04.015_b52) 2010
Singh (10.1016/j.inffus.2021.04.015_b40) 2020; vol. 34
Jiang (10.1016/j.inffus.2021.04.015_b124) 2020
Wu (10.1016/j.inffus.2021.04.015_b32) 2019
10.1016/j.inffus.2021.04.015_b62
Yang (10.1016/j.inffus.2021.04.015_b81) 2015; 10
Kotwal (10.1016/j.inffus.2021.04.015_b147) 2020; 2
Hong (10.1016/j.inffus.2021.04.015_b127) 2019; 52
Chen (10.1016/j.inffus.2021.04.015_b141) 2017
References_xml – volume: 9
  year: 2014
  ident: b154
  article-title: Recognizing disguised faces: Human and machine evaluation
  publication-title: PLoS One
– volume: 164
  start-page: 29
  year: 2017
  end-page: 33
  ident: b20
  article-title: Techniques of face spoof detection: A review
  publication-title: Int. J. Comput. Appl.
– year: 2019
  ident: b34
  article-title: A review on different face spoof detection techniques in biometric systems
– year: 2019
  ident: b151
  article-title: Spoofing and anti-spoofing with wax figure faces
– volume: 15
  start-page: 42
  year: 2019
  end-page: 55
  ident: b51
  article-title: Biometric face presentation attack detection with multi-channel convolutional neural network
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 387
  start-page: 51
  year: 2020
  end-page: 62
  ident: b74
  article-title: A novel statistical analysis and autoencoder driven intelligent intrusion detection approach
  publication-title: Neurocomputing
– volume: 9
  start-page: 33
  year: 2017
  end-page: 38
  ident: b29
  article-title: Presentation attack detection for face recognition on smartphones: A comprehensive review
  publication-title: J. Telecommun. Electron. Comput. Eng.
– volume: 100
  start-page: 1677
  year: 2018
  end-page: 1687
  ident: b60
  article-title: A novel face liveness detection algorithm with multiple liveness indicators
  publication-title: Wirel. Pers. Commun.
– start-page: 70
  year: 2020
  end-page: 85
  ident: b153
  article-title: CelebA-spoof: Large-scale face anti-spoofing dataset with rich annotations
  publication-title: European Conference on Computer Vision
– reference: Information technology- biometric presentation attack detection- part 3: Testing and Reporting, International Organization for Standardization, ISO/IEC DIS 30107-3:2017 (2017).
– volume: 2
  start-page: 1530
  year: 2014
  end-page: 1552
  ident: b27
  article-title: Biometric antispoofing methods: A survey in face recognition
  publication-title: IEEE Access
– volume: 53
  start-page: 1
  year: 2020
  end-page: 34
  ident: b105
  article-title: Generalizing from a few examples: A survey on few-shot learning
  publication-title: ACM Comput. Surv.
– start-page: 1
  year: 2019
  end-page: 6
  ident: b54
  article-title: Custom silicone face masks: Vulnerability of commercial face recognition systems & presentation attack detection
  publication-title: 2019 7th International Workshop on Biometrics and Forensics, IWBF
– reference: L. Abduh, I. Ivrissimtzis, Use of in-the-wild images for anomaly detection in face anti-spoofing, arXiv, 2020, arXiv–2006.
– volume: 9
  start-page: 305
  year: 2017
  ident: b64
  article-title: Face liveness detection based on skin blood flow analysis
  publication-title: Symmetry
– volume: 51
  start-page: 1
  year: 2018
  end-page: 36
  ident: b75
  article-title: A survey on deep learning: Algorithms, techniques, and applications
  publication-title: ACM Comput. Surv.
– start-page: 1
  year: 2020
  end-page: 25
  ident: b124
  article-title: Face anti-spoofing with generated near-infrared images
  publication-title: Multimedia Tools Appl.
– volume: 9
  start-page: 661
  year: 2020
  ident: b150
  article-title: Verifying the effectiveness of new face spoofing db with capture angle and distance
  publication-title: Electronics
– volume: 108
  start-page: 159
  year: 2018
  end-page: 169
  ident: b76
  article-title: LiveNet: Improving features generalization for face liveness detection using convolution neural networks
  publication-title: Expert Syst. Appl.
– start-page: 1
  year: 2013
  end-page: 8
  ident: b66
  article-title: Context based face anti-spoofing
  publication-title: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems, BTAS
– start-page: 1
  year: 2018
  end-page: 9
  ident: b162
  article-title: Unknown presentation attack detection with face RGB images
  publication-title: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS
– volume: 10
  start-page: 762
  year: 2015
  end-page: 777
  ident: b58
  article-title: Detection of face spoofing using visual dynamics
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 5
  start-page: 83
  year: 2016
  end-page: 91
  ident: b135
  article-title: Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models
  publication-title: IET Biom.
– start-page: 3320
  year: 2014
  end-page: 3328
  ident: b78
  article-title: How transferable are features in deep neural networks?
  publication-title: Advances in Neural Information Processing Systems
– start-page: 1
  year: 2012
  end-page: 12
  ident: b26
  article-title: 2d face liveness detection: An overview
  publication-title: 2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group, BIOSIG
– year: 2020
  ident: b106
  article-title: Learning Meta Model for Zero-And Few-Shot Face Antispoofing
– volume: 63
  start-page: 273
  year: 2020
  end-page: 285
  ident: b71
  article-title: CochleaNet: A robust language-independent audio-visual model for real-time speech enhancement
  publication-title: Inf. Fusion
– year: 2020
  ident: b83
  article-title: NAS-FAS: Static-dynamic central difference network search for face anti-spoofing
  publication-title: IEEE Trans. Pattern Anal. Mach. Intell.
– start-page: 1
  year: 2017
  end-page: 7
  ident: b131
  article-title: What you can’t see can help you-extended-range imaging for 3d-mask presentation attack detection
  publication-title: 2017 International Conference of the Biometrics Special Interest Group, BIOSIG
– start-page: 391
  year: 2012
  end-page: 398
  ident: b130
  article-title: Can facial cosmetics affect the matching accuracy of face recognition systems?
  publication-title: 2012 IEEE Fifth International Conference on Biometrics: theory, Applications and Systems, BTAS
– volume: 15
  start-page: 1261
  year: 2019
  end-page: 1275
  ident: b49
  article-title: Biometric presentation attack detection: Beyond the visible spectrum
  publication-title: IEEE Trans. Inf. Forensics Secur.
– reference: V. Kushwaha, M. Singh, R. Singh, M. Vatsa, N. Ratha, R. Chellappa, Disguised faces in the wild, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 1–9.
– start-page: 192
  year: 2019
  end-page: 197
  ident: b87
  article-title: Face anti-spoofing based on multi-layer domain adaptation
  publication-title: 2019 IEEE International Conference on Multimedia & Expo Workshops, ICMEW
– reference: X. Yang, W. Luo, L. Bao, Y. Gao, D. Gong, S. Zheng, Z. Li, W. Liu, Face anti-spoofing: Model matters, so does data, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 3507–3516.
– start-page: 2672
  year: 2014
  end-page: 2680
  ident: b85
  article-title: Generative adversarial nets
  publication-title: Advances in Neural Information Processing Systems 27
– year: 2020
  ident: b103
  article-title: Learning generalized spoof cues for face anti-spoofing
– reference: D. Pérez-Cabo, D. Jiménez-Cabello, A. Costa-Pazo, R.J. López-Sastre, Deep anomaly detection for generalized face anti-spoofing, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019.
– start-page: 1
  year: 2019
  end-page: 10
  ident: b72
  article-title: Lip-reading driven deep learning approach for speech enhancement
  publication-title: IEEE Trans. Emerg. Top. Comput. Intell.
– volume: 15
  start-page: 42
  year: 2020
  end-page: 55
  ident: b119
  article-title: Biometric face presentation attack detection with multi-channel convolutional neural network
  publication-title: IEEE Trans. Inf. Forensics Secur.
– start-page: 27
  year: 2017
  end-page: 34
  ident: b80
  article-title: Transfer learning using convolutional neural networks for face anti-spoofing
  publication-title: International Conference Image Analysis and Recognition
– volume: 29
  start-page: 2063
  year: 2018
  end-page: 2079
  ident: b73
  article-title: Applications of deep learning and reinforcement learning to biological data
  publication-title: IEEE Trans. Neural Netw. Learn. Syst.
– start-page: 197
  year: 2019
  end-page: 210
  ident: b59
  article-title: Liveness and threat aware selfie face recognition
  publication-title: Selfie Biometrics
– start-page: 1
  year: 2019
  end-page: 8
  ident: b79
  article-title: A performance evaluation of convolutional neural networks for face anti spoofing
  publication-title: 2019 International Joint Conference on Neural Networks, IJCNN
– volume: 28
  year: 2019
  ident: b70
  article-title: Deep transfer across domains for face antispoofing
  publication-title: J. Electron. Imaging
– start-page: 3557
  year: 2011
  end-page: 3560
  ident: b69
  article-title: Face liveness detection under bad illumination conditions
  publication-title: 2011 18th IEEE International Conference on Image Processing
– start-page: 207
  year: 2019
  end-page: 228
  ident: b33
  article-title: Recent advances in face presentation attack detection
  publication-title: Handbook of Biometric Anti-Spoofing
– reference: R. Shao, X. Lan, J. Li, P.C. Yuen, Multi-adversarial discriminative deep domain generalization for face presentation attack detection, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 10023–10031.
– start-page: 1
  year: 2016
  end-page: 7
  ident: b138
  article-title: The replay-mobile face presentation-attack database
  publication-title: 2016 International Conference of the Biometrics Special Interest Group, BIOSIG
– volume: 9
  year: 2019
  ident: b31
  article-title: Insight on face liveness detection: A systematic literature review
  publication-title: Int. J. Electr. Comput. Eng.
– reference: G. Wang, H. Han, S. Shan, X. Chen, Improving cross-database face presentation attack detection via adversarial domain adaptation, in: International Conference on Biometrics, ICB, 2019.
– start-page: 1
  year: 2020
  end-page: 9
  ident: b104
  article-title: Anomaly detection-based unknown face presentation attack detection
  publication-title: 2020 IEEE International Joint Conference on Biometrics, IJCB
– volume: 50
  start-page: 1
  year: 2017
  end-page: 37
  ident: b5
  article-title: Presentation attack detection methods for face recognition systems: A comprehensive survey
  publication-title: ACM Comput. Surv.
– start-page: 1
  year: 2017
  end-page: 8
  ident: b141
  article-title: Spoofing faces using makeup: An investigative study
  publication-title: 2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA
– volume: 72
  start-page: 391
  year: 2017
  end-page: 406
  ident: b7
  article-title: A survey of local feature methods for 3D face recognition
  publication-title: Pattern Recognit.
– reference: A. Liu, X. Li, J. Wan, Y. Liang, S. Escalera, H.J. Escalante, M. Madadi, Y. Jin, Z. Wu, X. Yu, et al. Cross-ethnicity face anti-spoofing recognition challenge: A review, IET Biom.
– year: 2020
  ident: b12
  article-title: Detection of makeup presentation attacks based on deep face representations
– start-page: 612
  year: 2017
  end-page: 618
  ident: b142
  article-title: Oulu-npu: A mobile face presentation attack database with real-world variations
  publication-title: 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition, FG 2017
– volume: 22
  start-page: 1
  year: 2019
  end-page: 30
  ident: b45
  article-title: A general framework for adversarial examples with objectives
  publication-title: ACM Trans. Priv. Secur.
– reference: T. Kim, Y. Kim, I. Kim, D. Kim, BASN: Enriching feature representation using bipartite auxiliary supervisions for face anti-spoofing, in: Proceedings of the IEEE International Conference on Computer Vision Workshops, 2019, pp. 0–0.
– start-page: 1
  year: 2011
  end-page: 7
  ident: b23
  article-title: Face spoofing detection from single images using micro-texture analysis
  publication-title: 2011 International Joint Conference on Biometrics, IJCB
– start-page: 1
  year: 2012
  end-page: 7
  ident: b24
  article-title: On the effectiveness of local binary patterns in face anti-spoofing
  publication-title: 2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group, BIOSIG
– start-page: 1584
  year: 2019
  end-page: 1590
  ident: b123
  article-title: Multi-modal face presentation attack detection via spatial and channel attentions
  publication-title: 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, CVPRW
– volume: 15
  start-page: 578
  year: 2019
  end-page: 593
  ident: b120
  article-title: Attention-based two-stream convolutional networks for face spoofing detection
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 52
  start-page: 1
  year: 2019
  end-page: 43
  ident: b127
  article-title: How generative adversarial networks and their variants work: An overview
  publication-title: ACM Comput. Surv.
– start-page: 165
  year: 2016
  end-page: 194
  ident: b6
  article-title: Face recognition systems under spoofing attacks
  publication-title: Face Recognition Across the Imaging Spectrum
– reference: A. Hadid, Face biometrics under spoofing attacks: Vulnerabilities, countermeasures, open issues, and research directions, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2014, pp. 113–118.
– volume: 406
  start-page: 378
  year: 2020
  end-page: 385
  ident: b43
  article-title: Evaluating facial recognition web services with adversarial and synthetic samples
  publication-title: Neurocomputing
– volume: 16
  start-page: 56
  year: 2020
  end-page: 69
  ident: b86
  article-title: Unsupervised adversarial domain adaptation for cross-domain face presentation attack detection
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 65
  year: 2019
  ident: b22
  article-title: An extensive review on spectral imaging in biometric systems: Challenges & advancements
  publication-title: J. Vis. Commun. Image Represent.
– volume: 5
  start-page: 31
  year: 2017
  ident: b2
  article-title: Face spoofing and counter-spoofing: A survey of state-of-the-art algorithms
  publication-title: Trans. Mach. Learn. Artif. Intell.
– start-page: 123
  year: 2019
  end-page: 126
  ident: b149
  article-title: Large crowd collected facial anti-spoofing dataset
  publication-title: 2019 Computer Science and Information Technologies, CSIT
– start-page: 187
  year: 2019
  end-page: 206
  ident: b10
  article-title: Introduction to face presentation attack detection
  publication-title: Handbook of Biometric Anti-Spoofing
– reference: B. Lin, X. Li, Z. Yu, G. Zhao, Face liveness detection by rPPG features and contextual patch-based CNN, in: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications, 2019, pp. 61–68.
– reference: Z. Yu, Y. Qin, X. Li, Z. Wang, C. Zhao, Z. Lei, G. Zhao, Multi-modal face anti-spoofing based on central difference networks, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2020, pp. 650–651.
– start-page: 000087
  year: 2017
  end-page: 000092
  ident: b61
  article-title: Anti-spoofing in face recognition with liveness detection using pupil tracking
  publication-title: 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics, SAMI
– year: 2018
  ident: b111
  article-title: Exploiting temporal and depth information for multi-frame face anti-spoofing
– start-page: 1
  year: 2013
  end-page: 8
  ident: b38
  article-title: Disguise detection and face recognition in visible and thermal spectrums
  publication-title: 2013 International Conference on Biometrics, ICB
– start-page: 1
  year: 2017
  end-page: 8
  ident: b140
  article-title: On the vulnerability of extended multispectral face recognition systems towards presentation attacks
  publication-title: 2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA
– start-page: 75
  year: 2018
  end-page: 81
  ident: b97
  article-title: On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing
  publication-title: 2018 International Conference on Biometrics, ICB
– start-page: 1
  year: 2013
  end-page: 6
  ident: b67
  article-title: Face liveness detection with component dependent descriptor
  publication-title: 2013 International Conference on Biometrics, ICB
– start-page: 35
  year: 2019
  end-page: 43
  ident: b32
  article-title: A review of face anti-spoofing and its applications in China
  publication-title: International Conference on Harmony Search Algorithm
– start-page: 641
  year: 2020
  end-page: 657
  ident: b94
  article-title: Face anti-spoofing via disentangled representation learning
  publication-title: European Conference on Computer Vision
– year: 2019
  ident: b82
  article-title: Domain adaptation in multi-channel autoencoder based features for robust face anti-spoofing
  publication-title: International Conference on Biometrics 2019
– volume: 93
  year: 2020
  ident: b36
  article-title: Face presentation attack detection in mobile scenarios: A comprehensive evaluation
  publication-title: Image Vis. Comput.
– volume: 11
  start-page: 2268
  year: 2016
  end-page: 2283
  ident: b18
  article-title: Secure face unlock: Spoof detection on smartphones
  publication-title: IEEE Trans. Inf. Forensics Secur.
– reference: A. Agarwal, D. Yadav, N. Kohli, R. Singh, M. Vatsa, A. Noore, Face presentation attack with latex masks in multispectral videos, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017, pp. 81–89.
– volume: 1
  start-page: 97
  year: 2019
  end-page: 108
  ident: b144
  article-title: Recognizing disguised faces in the wild
  publication-title: IEEE Trans. Biom. Behav. Identity Sci.
– volume: 24
  start-page: 1060
  year: 2015
  end-page: 1075
  ident: b134
  article-title: Presentation attack detection for face recognition using light field camera
  publication-title: IEEE Trans. Image Process.
– start-page: 504
  year: 2010
  end-page: 517
  ident: b52
  article-title: Face liveness detection from a single image with sparse low rank bilinear discriminative model
  publication-title: European Conference on Computer Vision
– start-page: 4244
  year: 2016
  end-page: 4249
  ident: b63
  article-title: Generalized face anti-spoofing by detecting pulse from face videos
  publication-title: 2016 23rd International Conference on Pattern Recognition, ICPR
– reference: Z. Yu, C. Zhao, Z. Wang, Y. Qin, Z. Su, X. Li, F. Zhou, G. Zhao, Searching central difference convolutional networks for face anti-spoofing, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 5295–5305.
– volume: 12
  start-page: 1713
  year: 2017
  end-page: 1723
  ident: b143
  article-title: Detecting silicone mask-based presentation attack via deep dictionary learning
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 72
  start-page: 39
  year: 2018
  end-page: 52
  ident: b21
  article-title: A survey of mobile face biometrics
  publication-title: Comput. Electr. Eng.
– volume: 182
  start-page: 73
  year: 2019
  end-page: 83
  ident: b3
  article-title: Critical features for face recognition
  publication-title: Cognition
– start-page: 1
  year: 2013
  end-page: 8
  ident: b132
  article-title: Automatic facial makeup detection with application in face recognition
  publication-title: 2013 International Conference on Biometrics, ICB
– volume: 5
  start-page: 441
  year: 2010
  end-page: 448
  ident: b13
  article-title: Plastic surgery: A new dimension to face recognition
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 8
  start-page: 369
  year: 2019
  end-page: 377
  ident: b77
  article-title: Face liveness detection: Fusing colour texture feature and deep feature
  publication-title: IET Biom.
– reference: Y. Liu, A. Jourabloo, X. Liu, Learning deep models for face anti-spoofing: Binary or auxiliary supervision, in: In Proceeding of IEEE Computer Vision and Pattern Recognition, Salt Lake City, UT, 2018.
– volume: 13
  start-page: 1794
  year: 2018
  end-page: 1809
  ident: b145
  article-title: Unsupervised domain adaptation for face anti-spoofing
  publication-title: IEEE Trans. Inf. Forensics Secur.
– start-page: 1
  year: 2019
  end-page: 8
  ident: b89
  article-title: Generalized presentation attack detection: A face anti-spoofing evaluation proposal
  publication-title: 2019 International Conference on Biometrics, ICB
– reference: A. Jourabloo, Y. Liu, X. Liu, Face de-spoofing: Anti-spoofing via noise modeling, in: Proceedings of the European Conference on Computer Vision, ECCV, 2018, pp. 290–306.
– year: 2014
  ident: b128
  article-title: Anti-Spoofing: Face Databases
– reference: S. Liu, B. Yang, P.C. Yuen, G. Zhao, A 3D mask face anti-spoofing database with real world variations, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016, pp. 100–106.
– volume: vol. 34
  start-page: 13583
  year: 2020
  end-page: 13589
  ident: b40
  article-title: On the robustness of face recognition algorithms against attacks and bias
  publication-title: Proceedings of the AAAI Conference on Artificial Intelligence
– volume: 1
  start-page: 238
  year: 2019
  end-page: 251
  ident: b121
  article-title: Multispectral deep embeddings as a countermeasure to custom silicone mask presentation attacks
  publication-title: IEEE Trans. Biom. Behav. Identity Sci.
– start-page: 1
  year: 2019
  end-page: 8
  ident: b146
  article-title: 3dma: A multi-modality 3D mask face anti-spoofing database
  publication-title: 2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS
– volume: 11
  start-page: 713
  year: 2017
  end-page: 720
  ident: b57
  article-title: Deep face liveness detection based on nonlinear diffusion using convolution neural network
  publication-title: Signal Image Video Process.
– start-page: 1
  year: 2018
  end-page: 7
  ident: b55
  article-title: Spoofing deep face recognition with custom silicone masks
  publication-title: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS
– year: 2019
  ident: b53
  article-title: Smartphone multi-modal biometric authentication: Database and evaluation
– volume: 10
  start-page: 746
  year: 2015
  end-page: 761
  ident: b16
  article-title: Face spoof detection with image distortion analysis
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 1229
  year: 2019
  ident: b50
  article-title: Face anti-spoofing using texture-based techniques and filtering methods
  publication-title: J. Phys. Conf. Ser.
– reference: Y. Jia, J. Zhang, S. Shan, X. Chen, Single-side domain generalization for face anti-spoofing, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 8484–8493.
– start-page: 1104
  year: 2017
  end-page: 1108
  ident: b19
  article-title: A comparative study on face spoofing attacks
  publication-title: 2017 International Conference on Computing, Communication and Automation, ICCCA
– year: 2014
  ident: b15
  article-title: Handbook of Biometric Anti-Spoofing, Vol. 1
– volume: 5
  start-page: 48
  year: 2020
  end-page: 59
  ident: b56
  article-title: Effect of feature selection with meta-heuristic optimization methods on face spoofing detection
  publication-title: J. Modern Technol. Eng.
– reference: Y. Liu, J. Stehouwer, A. Jourabloo, X. Liu, Deep tree learning for zero-shot face anti-spoofing, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 4680–4689.
– volume: 24
  start-page: 141
  year: 2016
  end-page: 145
  ident: b68
  article-title: Face antispoofing using speeded-up robust features and fisher vector encoding
  publication-title: IEEE Signal Process. Lett.
– start-page: 319
  year: 2017
  end-page: 328
  ident: b109
  article-title: Face anti-spoofing using patch and depth-based CNNs
  publication-title: 2017 IEEE International Joint Conference on Biometrics, IJCB
– volume: 7
  start-page: 15
  year: 2017
  end-page: 26
  ident: b30
  article-title: Deeply vulnerable: A study of the robustness of face recognition to presentation attacks
  publication-title: IET Biom.
– volume: 52
  start-page: 187
  year: 2019
  end-page: 205
  ident: b48
  article-title: A comprehensive overview of biometric fusion
  publication-title: Inf. Fusion
– start-page: 1
  year: 2019
  end-page: 8
  ident: b110
  article-title: Deep pixel-wise binary supervision for face presentation attack detection
  publication-title: 2019 International Conference on Biometrics, ICB
– reference: N. Kohli, D. Yadav, A. Noore, Face verification with disguise variations via deep disguise recognizer, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 17–24.
– reference: J. Yang, P. Ren, D. Zhang, D. Chen, F. Wen, H. Li, G. Hua, Neural aggregation network for video face recognition, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2017, pp. 4362–4371.
– start-page: 2852
  year: 2020
  end-page: 2856
  ident: b102
  article-title: Unseen face presentation attack detection with hypersphere loss
  publication-title: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP
– start-page: 26
  year: 2012
  end-page: 31
  ident: b129
  article-title: A face antispoofing database with diverse attacks
  publication-title: 2012 5th IAPR International Conference on Biometrics, ICB
– volume: 51
  start-page: 1
  year: 2018
  end-page: 34
  ident: b25
  article-title: Deep learning for biometrics: A survey
  publication-title: ACM Comput. Surv.
– volume: 2
  start-page: 15
  year: 2019
  end-page: 25
  ident: b39
  article-title: Detection of age-induced makeup attacks on face recognition systems using multi-layer deep features
  publication-title: IEEE Trans. Biom. Behav. Identity Sci.
– volume: 19
  start-page: 4733
  year: 2019
  ident: b125
  article-title: An identity authentication method combining liveness detection and face recognition
  publication-title: Sensors
– reference: M. Sharif, S. Bhagavatula, L. Bauer, M.K. Reiter, Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition, in: Proceedings of the 2016 ACM Sigsac Conference on Computer and Communications Security, 2016, pp. 1528–1540.
– start-page: 1
  year: 2019
  end-page: 6
  ident: b122
  article-title: Research on liveness detection algorithms based on deep learning
  publication-title: 2019 IEEE 10th International Conference on Software Engineering and Service Science, ICSESS
– reference: I. Stylios, S. Kokolakis, O. Thanou, S. Chatzis, Behavioral biometrics & continuous user authentication on mobile devices: A survey, Inf. Fusion, 66, 76–99.
– start-page: 1001
  year: 2020
  end-page: 1005
  ident: b88
  article-title: Domain adaptation for generalization of face presentation attack detection in mobile settengs with minimal information
  publication-title: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP
– year: 2018
  ident: b96
  article-title: Client-specific anomaly detection for face presentation attack detection
– start-page: 1
  year: 2020
  ident: b148
  article-title: CASIA-SURF: A large-scale multi-modal benchmark for face anti-spoofing
  publication-title: IEEE Trans. Biom. Behav. Identity Sci.
– reference: J. Hernandez-Ortega, J. Fierrez, A. Morales, P. Tome, Time analysis of pulse-based face anti-spoofing in visible and NIR, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 544–552.
– start-page: 1
  year: 2007
  end-page: 8
  ident: b160
  article-title: Eyeblink-based anti-spoofing in face recognition from a generic webcamera
  publication-title: 2007 IEEE 11th International Conference on Computer Vision
– reference: D. Deb, X. Liu, A.K. Jain, FaceGuard: A self-supervised defense against adversarial face images, arXiv e-prints, 2020, arXiv–2011.
– start-page: 1
  year: 2013
  end-page: 8
  ident: b136
  article-title: Spoofing 2D face recognition systems with 3D masks
  publication-title: 2013 International Conference of the BIOSIG Special Interest Group , BIOSIG
– volume: 72
  start-page: 368
  year: 2018
  end-page: 381
  ident: b14
  article-title: How far did we get in face spoofing detection?
  publication-title: Eng. Appl. Artif. Intell.
– start-page: 557
  year: 2020
  end-page: 575
  ident: b114
  article-title: Face anti-spoofing with human material perception
  publication-title: European Conference on Computer Vision
– reference: D.-L. Nguyen, S.S. Arora, Y. Wu, H. Yang, Adversarial light projection attacks on face recognition systems: A feasibility study, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2020, pp. 814–815.
– start-page: 3490
  year: 2020
  end-page: 3499
  ident: b90
  article-title: Domain agnostic feature learning for image and video based face anti-spoofing
  publication-title: 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, CVPRW
– volume: 128
  start-page: 30
  year: 2019
  end-page: 37
  ident: b118
  article-title: Multilevel fusing paired visible light and near-infrared spectral images for face anti-spoofing
  publication-title: Pattern Recognit. Lett.
– volume: 143
  year: 2020
  ident: b9
  article-title: A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities
  publication-title: Expert Syst. Appl.
– volume: 5
  start-page: 13868
  year: 2017
  end-page: 13882
  ident: b95
  article-title: An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol
  publication-title: IEEE Access
– volume: 7
  start-page: 175429
  year: 2019
  end-page: 175442
  ident: b157
  article-title: Face presentation attack detection based on a statistical model of image noise
  publication-title: IEEE Access
– volume: 98
  year: 2020
  ident: b35
  article-title: A survey on 3D mask presentation attack detection and countermeasures
  publication-title: Pattern Recognit.
– volume: 28
  start-page: 311
  year: 2012
  end-page: 321
  ident: b159
  article-title: A high performance fingerprint liveness detection method based on quality related features
  publication-title: Future Gener. Comput. Syst.
– volume: 2
  start-page: 15
  year: 2020
  end-page: 25
  ident: b147
  article-title: Detection of age-induced makeup attacks on face recognition systems using multi-layer deep features
  publication-title: IEEE Trans. Biom. Behav. Identity Sci.
– reference: Y. Liu, A. Jourabloo, X. Liu, Learning deep models for face anti-spoofing: Binary or auxiliary supervision, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 389–398.
– volume: 66
  year: 2020
  ident: b163
  article-title: Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning
  publication-title: J. Vis. Commun. Image Represent.
– volume: 197
  year: 2020
  ident: b41
  article-title: Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability
  publication-title: Comput. Vis. Image Underst.
– reference: G. Wang, H. Han, S. Shan, X. Chen, Cross-domain face presentation attack detection via multi-domain disentangled representation learning, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 6678–6687.
– start-page: 1
  year: 2019
  end-page: 7
  ident: b99
  article-title: Combining multiple one-class classifiers for anomaly based face spoofing attack detection
  publication-title: 2019 International Conference on Biometrics, ICB
– start-page: 171
  year: 2019
  end-page: 196
  ident: b116
  article-title: Presentation attack detection for face in mobile phones
  publication-title: Selfie Biometrics
– volume: 10
  start-page: 797
  year: 2015
  end-page: 809
  ident: b81
  article-title: Person-specific face antispoofing with subject domain adaptation
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 2016
  year: 2016
  ident: b139
  article-title: Design of an active multispectral swir camera system for skin detection and face verification
  publication-title: J. Sens.
– volume: 9
  start-page: 2264
  year: 2014
  end-page: 2276
  ident: b158
  article-title: Biometrics evaluation under spoofing attacks
  publication-title: IEEE Trans. Inf. Forensics Secur.
– reference: Z. Zhou, D. Tang, X. Wang, W. Han, X. Liu, K. Zhang, Invisible mask: Practical attacks on face recognition with infrared, arXiv e-prints, 2018, arXiv–1803.
– volume: 33
  start-page: 71
  year: 2017
  end-page: 85
  ident: b8
  article-title: Overview of the combination of biometric matchers
  publication-title: Inf. Fusion
– start-page: 1179
  year: 2021
  end-page: 1187
  ident: b152
  article-title: Casia-surf cefa: A benchmark for multi-modal cross-ethnicity face anti-spoofing
  publication-title: Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision
– start-page: 8464
  year: 2019
  end-page: 8468
  ident: b98
  article-title: Spoofing attack detection by anomaly detection
  publication-title: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP
– volume: 142
  year: 2020
  ident: b117
  article-title: SLNet: Stereo face liveness detection via dynamic disparity-maps and convolutional neural network
  publication-title: Expert Syst. Appl.
– volume: 16
  start-page: 56
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b86
  article-title: Unsupervised adversarial domain adaptation for cross-domain face presentation attack detection
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2020.3002390
– start-page: 1
  year: 2013
  ident: 10.1016/j.inffus.2021.04.015_b136
  article-title: Spoofing 2D face recognition systems with 3D masks
– volume: 11
  start-page: 713
  issue: 4
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b57
  article-title: Deep face liveness detection based on nonlinear diffusion using convolution neural network
  publication-title: Signal Image Video Process.
  doi: 10.1007/s11760-016-1014-2
– start-page: 1
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b89
  article-title: Generalized presentation attack detection: A face anti-spoofing evaluation proposal
– volume: 15
  start-page: 42
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b119
  article-title: Biometric face presentation attack detection with multi-channel convolutional neural network
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2019.2916652
– year: 2018
  ident: 10.1016/j.inffus.2021.04.015_b96
– volume: 11
  start-page: 2268
  issue: 10
  year: 2016
  ident: 10.1016/j.inffus.2021.04.015_b18
  article-title: Secure face unlock: Spoof detection on smartphones
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2016.2578288
– start-page: 557
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b114
  article-title: Face anti-spoofing with human material perception
– start-page: 1
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b141
  article-title: Spoofing faces using makeup: An investigative study
– volume: 128
  start-page: 30
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b118
  article-title: Multilevel fusing paired visible light and near-infrared spectral images for face anti-spoofing
  publication-title: Pattern Recognit. Lett.
  doi: 10.1016/j.patrec.2019.08.008
– year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b151
– volume: 52
  start-page: 1
  issue: 1
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b127
  article-title: How generative adversarial networks and their variants work: An overview
  publication-title: ACM Comput. Surv.
  doi: 10.1145/3301282
– volume: 5
  start-page: 48
  issue: 1
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b56
  article-title: Effect of feature selection with meta-heuristic optimization methods on face spoofing detection
  publication-title: J. Modern Technol. Eng.
– year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b12
– volume: 1229
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b50
  article-title: Face anti-spoofing using texture-based techniques and filtering methods
  publication-title: J. Phys. Conf. Ser.
  doi: 10.1088/1742-6596/1229/1/012044
– ident: 10.1016/j.inffus.2021.04.015_b44
  doi: 10.1145/2976749.2978392
– start-page: 504
  year: 2010
  ident: 10.1016/j.inffus.2021.04.015_b52
  article-title: Face liveness detection from a single image with sparse low rank bilinear discriminative model
– start-page: 1
  year: 2016
  ident: 10.1016/j.inffus.2021.04.015_b138
  article-title: The replay-mobile face presentation-attack database
– ident: 10.1016/j.inffus.2021.04.015_b91
  doi: 10.1109/CVPR42600.2020.00671
– volume: 9
  start-page: 2264
  issue: 12
  year: 2014
  ident: 10.1016/j.inffus.2021.04.015_b158
  article-title: Biometrics evaluation under spoofing attacks
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2014.2349158
– volume: 2
  start-page: 15
  issue: 1
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b147
  article-title: Detection of age-induced makeup attacks on face recognition systems using multi-layer deep features
  publication-title: IEEE Trans. Biom. Behav. Identity Sci.
  doi: 10.1109/TBIOM.2019.2946175
– volume: 65
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b22
  article-title: An extensive review on spectral imaging in biometric systems: Challenges & advancements
  publication-title: J. Vis. Commun. Image Represent.
  doi: 10.1016/j.jvcir.2019.102660
– start-page: 1
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b140
  article-title: On the vulnerability of extended multispectral face recognition systems towards presentation attacks
– start-page: 1
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b146
  article-title: 3dma: A multi-modality 3D mask face anti-spoofing database
– ident: 10.1016/j.inffus.2021.04.015_b37
– start-page: 1
  year: 2007
  ident: 10.1016/j.inffus.2021.04.015_b160
  article-title: Eyeblink-based anti-spoofing in face recognition from a generic webcamera
– year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b34
– start-page: 3557
  year: 2011
  ident: 10.1016/j.inffus.2021.04.015_b69
  article-title: Face liveness detection under bad illumination conditions
– volume: 15
  start-page: 42
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b51
  article-title: Biometric face presentation attack detection with multi-channel convolutional neural network
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2019.2916652
– start-page: 1
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b104
  article-title: Anomaly detection-based unknown face presentation attack detection
– start-page: 3490
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b90
  article-title: Domain agnostic feature learning for image and video based face anti-spoofing
– start-page: 1
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b131
  article-title: What you can’t see can help you-extended-range imaging for 3d-mask presentation attack detection
– volume: 72
  start-page: 39
  year: 2018
  ident: 10.1016/j.inffus.2021.04.015_b21
  article-title: A survey of mobile face biometrics
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2018.09.005
– start-page: 1
  year: 2011
  ident: 10.1016/j.inffus.2021.04.015_b23
  article-title: Face spoofing detection from single images using micro-texture analysis
– start-page: 8464
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b98
  article-title: Spoofing attack detection by anomaly detection
– ident: 10.1016/j.inffus.2021.04.015_b161
– volume: 19
  start-page: 4733
  issue: 21
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b125
  article-title: An identity authentication method combining liveness detection and face recognition
  publication-title: Sensors
  doi: 10.3390/s19214733
– ident: 10.1016/j.inffus.2021.04.015_b17
  doi: 10.1007/978-3-030-01261-8_18
– volume: 98
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b35
  article-title: A survey on 3D mask presentation attack detection and countermeasures
  publication-title: Pattern Recognit.
  doi: 10.1016/j.patcog.2019.107032
– start-page: 4244
  year: 2016
  ident: 10.1016/j.inffus.2021.04.015_b63
  article-title: Generalized face anti-spoofing by detecting pulse from face videos
– start-page: 1
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b79
  article-title: A performance evaluation of convolutional neural networks for face anti spoofing
– volume: 5
  start-page: 441
  issue: 3
  year: 2010
  ident: 10.1016/j.inffus.2021.04.015_b13
  article-title: Plastic surgery: A new dimension to face recognition
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2010.2054083
– volume: 12
  start-page: 1713
  issue: 7
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b143
  article-title: Detecting silicone mask-based presentation attack via deep dictionary learning
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2017.2676720
– ident: 10.1016/j.inffus.2021.04.015_b133
  doi: 10.1109/CVPRW.2017.40
– volume: 9
  start-page: 33
  issue: 3–8
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b29
  article-title: Presentation attack detection for face recognition on smartphones: A comprehensive review
  publication-title: J. Telecommun. Electron. Comput. Eng.
– year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b83
  article-title: NAS-FAS: Static-dynamic central difference network search for face anti-spoofing
  publication-title: IEEE Trans. Pattern Anal. Mach. Intell.
– ident: 10.1016/j.inffus.2021.04.015_b62
  doi: 10.1109/CVPRW.2018.00096
– volume: 53
  start-page: 1
  issue: 3
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b105
  article-title: Generalizing from a few examples: A survey on few-shot learning
  publication-title: ACM Comput. Surv.
  doi: 10.1145/3386252
– volume: 7
  start-page: 15
  issue: 1
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b30
  article-title: Deeply vulnerable: A study of the robustness of face recognition to presentation attacks
  publication-title: IET Biom.
  doi: 10.1049/iet-bmt.2017.0079
– ident: 10.1016/j.inffus.2021.04.015_b126
  doi: 10.1109/CVPR.2019.00362
– volume: 164
  start-page: 29
  issue: 1
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b20
  article-title: Techniques of face spoof detection: A review
  publication-title: Int. J. Comput. Appl.
– volume: 10
  start-page: 762
  issue: 4
  year: 2015
  ident: 10.1016/j.inffus.2021.04.015_b58
  article-title: Detection of face spoofing using visual dynamics
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2406533
– start-page: 1
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b110
  article-title: Deep pixel-wise binary supervision for face presentation attack detection
– volume: 15
  start-page: 1261
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b49
  article-title: Biometric presentation attack detection: Beyond the visible spectrum
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2019.2934867
– year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b106
– volume: 63
  start-page: 273
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b71
  article-title: CochleaNet: A robust language-independent audio-visual model for real-time speech enhancement
  publication-title: Inf. Fusion
  doi: 10.1016/j.inffus.2020.04.001
– ident: 10.1016/j.inffus.2021.04.015_b108
  doi: 10.1109/CVPR.2018.00048
– volume: 28
  start-page: 311
  issue: 1
  year: 2012
  ident: 10.1016/j.inffus.2021.04.015_b159
  article-title: A high performance fingerprint liveness detection method based on quality related features
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2010.11.024
– volume: vol. 34
  start-page: 13583
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b40
  article-title: On the robustness of face recognition algorithms against attacks and bias
– year: 2018
  ident: 10.1016/j.inffus.2021.04.015_b111
– ident: 10.1016/j.inffus.2021.04.015_b1
  doi: 10.1016/j.inffus.2020.08.021
– volume: 10
  start-page: 746
  issue: 4
  year: 2015
  ident: 10.1016/j.inffus.2021.04.015_b16
  article-title: Face spoof detection with image distortion analysis
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2400395
– ident: 10.1016/j.inffus.2021.04.015_b92
  doi: 10.1109/CVPR.2019.01026
– ident: 10.1016/j.inffus.2021.04.015_b107
  doi: 10.1109/CVPR.2019.00481
– start-page: 319
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b109
  article-title: Face anti-spoofing using patch and depth-based CNNs
– volume: 2016
  year: 2016
  ident: 10.1016/j.inffus.2021.04.015_b139
  article-title: Design of an active multispectral swir camera system for skin detection and face verification
  publication-title: J. Sens.
  doi: 10.1155/2016/9682453
– volume: 100
  start-page: 1677
  issue: 4
  year: 2018
  ident: 10.1016/j.inffus.2021.04.015_b60
  article-title: A novel face liveness detection algorithm with multiple liveness indicators
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-018-5661-1
– ident: 10.1016/j.inffus.2021.04.015_b155
  doi: 10.1109/CVPRW.2018.00008
– ident: 10.1016/j.inffus.2021.04.015_b46
– start-page: 1
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b54
  article-title: Custom silicone face masks: Vulnerability of commercial face recognition systems & presentation attack detection
– volume: 72
  start-page: 391
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b7
  article-title: A survey of local feature methods for 3D face recognition
  publication-title: Pattern Recognit.
  doi: 10.1016/j.patcog.2017.08.003
– volume: 51
  start-page: 1
  issue: 3
  year: 2018
  ident: 10.1016/j.inffus.2021.04.015_b25
  article-title: Deep learning for biometrics: A survey
  publication-title: ACM Comput. Surv.
  doi: 10.1145/3190618
– start-page: 641
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b94
  article-title: Face anti-spoofing via disentangled representation learning
– volume: 5
  start-page: 83
  issue: 2
  year: 2016
  ident: 10.1016/j.inffus.2021.04.015_b135
  article-title: Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models
  publication-title: IET Biom.
  doi: 10.1049/iet-bmt.2014.0075
– start-page: 75
  year: 2018
  ident: 10.1016/j.inffus.2021.04.015_b97
  article-title: On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing
– volume: 28
  issue: 4
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b70
  article-title: Deep transfer across domains for face antispoofing
  publication-title: J. Electron. Imaging
  doi: 10.1117/1.JEI.28.4.043001
– volume: 15
  start-page: 578
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b120
  article-title: Attention-based two-stream convolutional networks for face spoofing detection
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2019.2922241
– volume: 24
  start-page: 141
  issue: 2
  year: 2016
  ident: 10.1016/j.inffus.2021.04.015_b68
  article-title: Face antispoofing using speeded-up robust features and fisher vector encoding
  publication-title: IEEE Signal Process. Lett.
– start-page: 1
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b124
  article-title: Face anti-spoofing with generated near-infrared images
  publication-title: Multimedia Tools Appl.
– volume: 2
  start-page: 1530
  year: 2014
  ident: 10.1016/j.inffus.2021.04.015_b27
  article-title: Biometric antispoofing methods: A survey in face recognition
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2014.2381273
– volume: 93
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b36
  article-title: Face presentation attack detection in mobile scenarios: A comprehensive evaluation
  publication-title: Image Vis. Comput.
  doi: 10.1016/j.imavis.2019.11.004
– year: 2014
  ident: 10.1016/j.inffus.2021.04.015_b15
– year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b53
– volume: 9
  start-page: 305
  issue: 12
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b64
  article-title: Face liveness detection based on skin blood flow analysis
  publication-title: Symmetry
  doi: 10.3390/sym9120305
– volume: 7
  start-page: 175429
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b157
  article-title: Face presentation attack detection based on a statistical model of image noise
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2957273
– volume: 8
  start-page: 369
  issue: 6
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b77
  article-title: Face liveness detection: Fusing colour texture feature and deep feature
  publication-title: IET Biom.
  doi: 10.1049/iet-bmt.2018.5235
– ident: 10.1016/j.inffus.2021.04.015_b93
  doi: 10.1109/CVPR42600.2020.00851
– start-page: 1
  year: 2018
  ident: 10.1016/j.inffus.2021.04.015_b55
  article-title: Spoofing deep face recognition with custom silicone masks
– start-page: 1
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b99
  article-title: Combining multiple one-class classifiers for anomaly based face spoofing attack detection
– start-page: 391
  year: 2012
  ident: 10.1016/j.inffus.2021.04.015_b130
  article-title: Can facial cosmetics affect the matching accuracy of face recognition systems?
– ident: 10.1016/j.inffus.2021.04.015_b113
  doi: 10.1109/CVPRW50498.2020.00333
– start-page: 000087
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b61
  article-title: Anti-spoofing in face recognition with liveness detection using pupil tracking
– volume: 29
  start-page: 2063
  issue: 6
  year: 2018
  ident: 10.1016/j.inffus.2021.04.015_b73
  article-title: Applications of deep learning and reinforcement learning to biological data
  publication-title: IEEE Trans. Neural Netw. Learn. Syst.
  doi: 10.1109/TNNLS.2018.2790388
– start-page: 1
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b148
  article-title: CASIA-SURF: A large-scale multi-modal benchmark for face anti-spoofing
  publication-title: IEEE Trans. Biom. Behav. Identity Sci.
– start-page: 35
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b32
  article-title: A review of face anti-spoofing and its applications in China
– volume: 51
  start-page: 1
  issue: 5
  year: 2018
  ident: 10.1016/j.inffus.2021.04.015_b75
  article-title: A survey on deep learning: Algorithms, techniques, and applications
  publication-title: ACM Comput. Surv.
  doi: 10.1145/3234150
– start-page: 70
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b153
  article-title: CelebA-spoof: Large-scale face anti-spoofing dataset with rich annotations
– volume: 22
  start-page: 1
  issue: 3
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b45
  article-title: A general framework for adversarial examples with objectives
  publication-title: ACM Trans. Priv. Secur.
  doi: 10.1145/3317611
– volume: 9
  issue: 7
  year: 2014
  ident: 10.1016/j.inffus.2021.04.015_b154
  article-title: Recognizing disguised faces: Human and machine evaluation
  publication-title: PLoS One
  doi: 10.1371/journal.pone.0099212
– start-page: 1
  year: 2013
  ident: 10.1016/j.inffus.2021.04.015_b66
  article-title: Context based face anti-spoofing
– start-page: 165
  year: 2016
  ident: 10.1016/j.inffus.2021.04.015_b6
  article-title: Face recognition systems under spoofing attacks
– start-page: 1104
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b19
  article-title: A comparative study on face spoofing attacks
– ident: 10.1016/j.inffus.2021.04.015_b84
  doi: 10.1109/ICB45273.2019.8987254
– volume: 33
  start-page: 71
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b8
  article-title: Overview of the combination of biometric matchers
  publication-title: Inf. Fusion
  doi: 10.1016/j.inffus.2016.05.003
– volume: 10
  start-page: 797
  issue: 4
  year: 2015
  ident: 10.1016/j.inffus.2021.04.015_b81
  article-title: Person-specific face antispoofing with subject domain adaptation
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2403306
– start-page: 1
  year: 2012
  ident: 10.1016/j.inffus.2021.04.015_b26
  article-title: 2d face liveness detection: An overview
– ident: 10.1016/j.inffus.2021.04.015_b11
  doi: 10.1109/CVPRW.2018.00010
– start-page: 1
  year: 2012
  ident: 10.1016/j.inffus.2021.04.015_b24
  article-title: On the effectiveness of local binary patterns in face anti-spoofing
– volume: 5
  start-page: 13868
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b95
  article-title: An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2729161
– volume: 2
  start-page: 15
  issue: 1
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b39
  article-title: Detection of age-induced makeup attacks on face recognition systems using multi-layer deep features
  publication-title: IEEE Trans. Biom. Behav. Identity Sci.
  doi: 10.1109/TBIOM.2019.2946175
– start-page: 171
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b116
  article-title: Presentation attack detection for face in mobile phones
– volume: 66
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b163
  article-title: Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning
  publication-title: J. Vis. Commun. Image Represent.
  doi: 10.1016/j.jvcir.2019.102746
– start-page: 26
  year: 2012
  ident: 10.1016/j.inffus.2021.04.015_b129
  article-title: A face antispoofing database with diverse attacks
– volume: 13
  start-page: 1794
  issue: 7
  year: 2018
  ident: 10.1016/j.inffus.2021.04.015_b145
  article-title: Unsupervised domain adaptation for face anti-spoofing
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2018.2801312
– start-page: 207
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b33
  article-title: Recent advances in face presentation attack detection
– volume: 9
  start-page: 661
  issue: 4
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b150
  article-title: Verifying the effectiveness of new face spoofing db with capture angle and distance
  publication-title: Electronics
  doi: 10.3390/electronics9040661
– volume: 1
  start-page: 97
  issue: 2
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b144
  article-title: Recognizing disguised faces in the wild
  publication-title: IEEE Trans. Biom. Behav. Identity Sci.
  doi: 10.1109/TBIOM.2019.2903860
– ident: 10.1016/j.inffus.2021.04.015_b112
  doi: 10.1109/CVPR42600.2020.00534
– ident: 10.1016/j.inffus.2021.04.015_b137
  doi: 10.1109/CVPRW.2016.193
– ident: 10.1016/j.inffus.2021.04.015_b47
  doi: 10.1109/CVPRW50498.2020.00415
– ident: 10.1016/j.inffus.2021.04.015_b156
  doi: 10.1109/CVPR.2018.00048
– ident: 10.1016/j.inffus.2021.04.015_b4
  doi: 10.1109/CVPR.2017.554
– start-page: 197
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b59
  article-title: Liveness and threat aware selfie face recognition
– start-page: 123
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b149
  article-title: Large crowd collected facial anti-spoofing dataset
– ident: 10.1016/j.inffus.2021.04.015_b101
– volume: 142
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b117
  article-title: SLNet: Stereo face liveness detection via dynamic disparity-maps and convolutional neural network
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2019.113002
– start-page: 1
  year: 2013
  ident: 10.1016/j.inffus.2021.04.015_b38
  article-title: Disguise detection and face recognition in visible and thermal spectrums
– volume: 52
  start-page: 187
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b48
  article-title: A comprehensive overview of biometric fusion
  publication-title: Inf. Fusion
  doi: 10.1016/j.inffus.2018.12.003
– ident: 10.1016/j.inffus.2021.04.015_b65
  doi: 10.1145/3345336.3345345
– start-page: 2672
  year: 2014
  ident: 10.1016/j.inffus.2021.04.015_b85
  article-title: Generative adversarial nets
– start-page: 1
  year: 2013
  ident: 10.1016/j.inffus.2021.04.015_b132
  article-title: Automatic facial makeup detection with application in face recognition
– start-page: 3320
  year: 2014
  ident: 10.1016/j.inffus.2021.04.015_b78
  article-title: How transferable are features in deep neural networks?
– start-page: 612
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b142
  article-title: Oulu-npu: A mobile face presentation attack database with real-world variations
– start-page: 1
  year: 2018
  ident: 10.1016/j.inffus.2021.04.015_b162
  article-title: Unknown presentation attack detection with face RGB images
– start-page: 192
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b87
  article-title: Face anti-spoofing based on multi-layer domain adaptation
– ident: 10.1016/j.inffus.2021.04.015_b100
  doi: 10.1109/CVPRW.2019.00201
– start-page: 187
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b10
  article-title: Introduction to face presentation attack detection
– volume: 197
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b41
  article-title: Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability
  publication-title: Comput. Vis. Image Underst.
– start-page: 1584
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b123
  article-title: Multi-modal face presentation attack detection via spatial and channel attentions
– volume: 9
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b31
  article-title: Insight on face liveness detection: A systematic literature review
  publication-title: Int. J. Electr. Comput. Eng.
– start-page: 1
  year: 2013
  ident: 10.1016/j.inffus.2021.04.015_b67
  article-title: Face liveness detection with component dependent descriptor
– volume: 182
  start-page: 73
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b3
  article-title: Critical features for face recognition
  publication-title: Cognition
  doi: 10.1016/j.cognition.2018.09.002
– volume: 5
  start-page: 31
  issue: 2
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b2
  article-title: Face spoofing and counter-spoofing: A survey of state-of-the-art algorithms
  publication-title: Trans. Mach. Learn. Artif. Intell.
– volume: 108
  start-page: 159
  year: 2018
  ident: 10.1016/j.inffus.2021.04.015_b76
  article-title: LiveNet: Improving features generalization for face liveness detection using convolution neural networks
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2018.05.004
– year: 2014
  ident: 10.1016/j.inffus.2021.04.015_b128
– volume: 406
  start-page: 378
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b43
  article-title: Evaluating facial recognition web services with adversarial and synthetic samples
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2019.11.117
– year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b103
– volume: 387
  start-page: 51
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b74
  article-title: A novel statistical analysis and autoencoder driven intelligent intrusion detection approach
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2019.11.016
– start-page: 1179
  year: 2021
  ident: 10.1016/j.inffus.2021.04.015_b152
  article-title: Casia-surf cefa: A benchmark for multi-modal cross-ethnicity face anti-spoofing
– volume: 143
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b9
  article-title: A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2019.113114
– ident: 10.1016/j.inffus.2021.04.015_b115
  doi: 10.1109/ICCVW.2019.00062
– start-page: 1
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b122
  article-title: Research on liveness detection algorithms based on deep learning
– volume: 72
  start-page: 368
  year: 2018
  ident: 10.1016/j.inffus.2021.04.015_b14
  article-title: How far did we get in face spoofing detection?
  publication-title: Eng. Appl. Artif. Intell.
  doi: 10.1016/j.engappai.2018.04.013
– start-page: 27
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b80
  article-title: Transfer learning using convolutional neural networks for face anti-spoofing
– start-page: 2852
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b102
  article-title: Unseen face presentation attack detection with hypersphere loss
– ident: 10.1016/j.inffus.2021.04.015_b42
– volume: 50
  start-page: 1
  issue: 1
  year: 2017
  ident: 10.1016/j.inffus.2021.04.015_b5
  article-title: Presentation attack detection methods for face recognition systems: A comprehensive survey
  publication-title: ACM Comput. Surv.
  doi: 10.1145/3038924
– volume: 24
  start-page: 1060
  issue: 3
  year: 2015
  ident: 10.1016/j.inffus.2021.04.015_b134
  article-title: Presentation attack detection for face recognition using light field camera
  publication-title: IEEE Trans. Image Process.
  doi: 10.1109/TIP.2015.2395951
– start-page: 1001
  year: 2020
  ident: 10.1016/j.inffus.2021.04.015_b88
  article-title: Domain adaptation for generalization of face presentation attack detection in mobile settengs with minimal information
– ident: 10.1016/j.inffus.2021.04.015_b28
  doi: 10.1109/CVPRW.2014.22
– volume: 1
  start-page: 238
  issue: 4
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b121
  article-title: Multispectral deep embeddings as a countermeasure to custom silicone mask presentation attacks
  publication-title: IEEE Trans. Biom. Behav. Identity Sci.
  doi: 10.1109/TBIOM.2019.2939421
– year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b82
  article-title: Domain adaptation in multi-channel autoencoder based features for robust face anti-spoofing
– start-page: 1
  year: 2019
  ident: 10.1016/j.inffus.2021.04.015_b72
  article-title: Lip-reading driven deep learning approach for speech enhancement
  publication-title: IEEE Trans. Emerg. Top. Comput. Intell.
SSID ssj0017031
Score 2.4587965
Snippet Face Recognition is considered one of the most common biometric solutions these days and is widely used across a range of devices for various security...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 55
SubjectTerms Deep learning
Face Recognition
Generalisation
Presentation attacks
Title A review of state-of-the-art in Face Presentation Attack Detection: From early development to advanced deep learning and multi-modal fusion methods
URI https://dx.doi.org/10.1016/j.inffus.2021.04.015
Volume 75
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6iFz2IT3wzB69x2ybZtt6W1WV9Ij7AW0nSRNZHu2i9-if8w2bSdlUQBU-lIVPSTJhH-OYbQnZ1ZFwYIELKtOCUx8xSlWhNIyNSTB9s4inzz867wxt-fCtup0i_rYVBWGVj-2ub7q11M9JpdrMzHo06V5h5RMhOglfUqaf-5DzGU773NoF5hMjP7jlTu12Ks9vyOY_xckq0r0jaHYWe8BSb4_7knr64nMECmW9iRejVy1kkU6ZYInNnE6LVl2Xy3oO6-ARKC744iJaWugmIeINRAQOpDVx81hgV0KsqqR_gwFQehVXsw-C5fAKDTMeQf2KIoCqhRQi4cTOGpsPEHcgiB49EpE9l7lbo_g6_XHejflkhN4PD6_6QNn0WqHYJQ0VlGkgrOUuUEVbFQiqtXVyXRFqw3NiEhyqXaZzLyARWmSCxsTPXErNqJYWK2CqZLsrCrBGQMrLc5MwFGi5WtFKFSguRs1QGOk0lWyes3d5MNyTk2AvjMWvRZvdZrZQMlZIFPHNKWSd0IjWuSTj-mB-3msu-HabM-YlfJTf-LblJZvGtLlPcItPV86vZdvFKpXb8gdwhM73-5ekFPo9OhucfirDvxw
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JTsMwELVQewAOiFXszIGr1TSOm4RbVagKtBUSReJm2Y6NCjSpIHwJP4wnSwEJgcTV8USOx5olfvOGkFPtGxcG8DZlmgc0CJmlKtKa-obHmD7YqKDMH407g7vg6p7fL5FeXQuDsMrK9pc2vbDW1Uir2s3WfDpt3WLm4SM7Cf6ijpH6s4nsVLxBmt3L68F4cZmAFO0FbWqnQ1GgrqArYF5Oj_YNebv9dsF5iv1xf_JQX7xOf52sVeEidMsVbZAlk26S1dGCa_V1i7x3oaw_gcxCUR9EM0vdBAS9wTSFvtQGbj7LjFLo5rnUT3Bu8gKIlZ5B_yWbgUGyY0g-YUSQZ1CDBNy4mUPVZOIBZJpAAUaksyxxK3Rfh28uG1K_bpO7_sWkN6BVqwWqXc6QUxl70sqARcpwq0IuldYutIt8zVlibBS0VSLjMJG-8awyXmRDZ7ElJtZKcuWzHdJIs9TsEpDSt4FJmIs1XLhopWorzXnCYunpOJZsj7B6e4WueMixHcazqAFnj6JUikClCC8QTil7hC6k5iUPxx_zw1pz4tt5Es5V_Cq5_2_JE7I8mIyGYng5vj4gK_ikrFo8JI385c0cufAlV8fV8fwANT7w4w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+review+of+state-of-the-art+in+Face+Presentation+Attack+Detection%3A+From+early+development+to+advanced+deep+learning+and+multi-modal+fusion+methods&rft.jtitle=Information+fusion&rft.au=Abdullakutty%2C+Faseela&rft.au=Elyan%2C+Eyad&rft.au=Johnston%2C+Pamela&rft.date=2021-11-01&rft.pub=Elsevier+B.V&rft.issn=1566-2535&rft.eissn=1872-6305&rft.volume=75&rft.spage=55&rft.epage=69&rft_id=info:doi/10.1016%2Fj.inffus.2021.04.015&rft.externalDocID=S1566253521000919
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1566-2535&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1566-2535&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1566-2535&client=summon