A review of state-of-the-art in Face Presentation Attack Detection: From early development to advanced deep learning and multi-modal fusion methods
Face Recognition is considered one of the most common biometric solutions these days and is widely used across a range of devices for various security purposes. The performance of FR systems has improved by orders of magnitude over the past decade. This is mainly due to the latest developments in co...
Saved in:
Published in | Information fusion Vol. 75; pp. 55 - 69 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.11.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Face Recognition is considered one of the most common biometric solutions these days and is widely used across a range of devices for various security purposes. The performance of FR systems has improved by orders of magnitude over the past decade. This is mainly due to the latest developments in computer vision and deep convolutional neural networks, and the availability of large training datasets. At the same time, these systems have been subject to various types of attacks. Presentation attacks are common, simple, and easy to implement. These simply involve presenting a video, photo, or mask to the camera or digital sensor and have proven capable of fooling FR systems and providing access to unauthorised users. Presentation attack detection is increasingly attracting more attention in the research community. A wide range of methods has already been developed to address this challenge. Deep learning-based methods in particular have shown very promising results. However, existing literature suggests that even with state-of-the-art methods, performance drops significantly in cross-dataset evaluation. We present a thorough, comprehensive, and technical review of existing literature on this timely and challenging problem. We first introduce and discuss the presentation attack problem and cover related and recent work in this area. In-depth technical details of existing presentation attack detection methods are then presented and critically discussed and evaluated, followed by a comprehensive discussion and evaluation of existing public datasets and commonly used evaluation metrics. Our review shows clearly that despite the recent and significant advances in this area of research, detecting unseen attacks is still considered a key problem. Machine learning methods tend to perform well, but only when test data comes from the same distribution as the training data (i.e. same dataset). New research directions are discussed in detail, including ways to improve the generalisation of machine learning methods, and move towards creating more stable presentation attack detection techniques that generalise across a wide range of unseen samples.
•Face Presentation Attacks pose a serious challenge to Face Recognition (FR).•A critical review of various types of presentation attacks on FR.•An extensive and critical evaluation of presentation attack detection methods.•A detailed discussion on challenges, limitations, and public datasets in this area.•Research gaps and future directions towards more stable detection methods. |
---|---|
AbstractList | Face Recognition is considered one of the most common biometric solutions these days and is widely used across a range of devices for various security purposes. The performance of FR systems has improved by orders of magnitude over the past decade. This is mainly due to the latest developments in computer vision and deep convolutional neural networks, and the availability of large training datasets. At the same time, these systems have been subject to various types of attacks. Presentation attacks are common, simple, and easy to implement. These simply involve presenting a video, photo, or mask to the camera or digital sensor and have proven capable of fooling FR systems and providing access to unauthorised users. Presentation attack detection is increasingly attracting more attention in the research community. A wide range of methods has already been developed to address this challenge. Deep learning-based methods in particular have shown very promising results. However, existing literature suggests that even with state-of-the-art methods, performance drops significantly in cross-dataset evaluation. We present a thorough, comprehensive, and technical review of existing literature on this timely and challenging problem. We first introduce and discuss the presentation attack problem and cover related and recent work in this area. In-depth technical details of existing presentation attack detection methods are then presented and critically discussed and evaluated, followed by a comprehensive discussion and evaluation of existing public datasets and commonly used evaluation metrics. Our review shows clearly that despite the recent and significant advances in this area of research, detecting unseen attacks is still considered a key problem. Machine learning methods tend to perform well, but only when test data comes from the same distribution as the training data (i.e. same dataset). New research directions are discussed in detail, including ways to improve the generalisation of machine learning methods, and move towards creating more stable presentation attack detection techniques that generalise across a wide range of unseen samples.
•Face Presentation Attacks pose a serious challenge to Face Recognition (FR).•A critical review of various types of presentation attacks on FR.•An extensive and critical evaluation of presentation attack detection methods.•A detailed discussion on challenges, limitations, and public datasets in this area.•Research gaps and future directions towards more stable detection methods. |
Author | Abdullakutty, Faseela Johnston, Pamela Elyan, Eyad |
Author_xml | – sequence: 1 givenname: Faseela orcidid: 0000-0002-3084-0604 surname: Abdullakutty fullname: Abdullakutty, Faseela email: f.abdullakutty@rgu.ac.uk – sequence: 2 givenname: Eyad orcidid: 0000-0002-8342-9026 surname: Elyan fullname: Elyan, Eyad email: e.elyan@rgu.ac.uk – sequence: 3 givenname: Pamela orcidid: 0000-0002-6199-8471 surname: Johnston fullname: Johnston, Pamela email: p.johnston2@rgu.ac.uk |
BookMark | eNqFkMFO3DAQhq0KpALlDTj4BRzsJE6yHJBWC9tWQmoP5WxN7HHxNrFXtncrnoMXxtH21EN7mtHM__-a-S7JmQ8eCbkRvBJcdLe7ynlrD6mqeS0q3lZcyA_kQgx9zbqGy7PSy65jtWzkR3KZ0o5z0fNGXJC3NY14dPibBktThowsWJZfkEHM1Hm6BY30e8SEvmxd8HSdM-hf9AEz6mVwR7cxzBQhTq_U4BGnsJ-LmuZAwRzBazRljns6FY13_icFb-h8mLJjczAw0XL7kjxjfgkmfSLnFqaE13_qFXnePv7YfGFP3z5_3ayfmG54lxmsOFhom2FEacdewqi1WDVDrWVj0A6tGA2segM1cjsiH2yPoIH3bT2CHOvmirSnXB1DShGt2kc3Q3xVgqsFrNqpE1i1gFW8VQVssd39ZdPuhCZHcNP_zPcnM5bHCveokna4IHKx4FQmuH8HvAPvvZ1f |
CitedBy_id | crossref_primary_10_1016_j_cose_2023_103586 crossref_primary_10_3390_electronics12102199 crossref_primary_10_1007_s00530_023_01070_5 crossref_primary_10_1016_j_inffus_2022_10_033 crossref_primary_10_3390_s22145196 crossref_primary_10_3233_IDT_220197 crossref_primary_10_1016_j_inffus_2022_12_020 crossref_primary_10_1109_ACCESS_2023_3298443 crossref_primary_10_1016_j_inffus_2023_01_022 crossref_primary_10_1016_j_cose_2022_103026 crossref_primary_10_1016_j_engappai_2023_107788 crossref_primary_10_1016_j_inffus_2023_102192 crossref_primary_10_1016_j_engappai_2023_107569 crossref_primary_10_3390_bdcc7010037 crossref_primary_10_1007_s12559_022_10037_z crossref_primary_10_1016_j_engappai_2023_106759 crossref_primary_10_1016_j_eswa_2022_116786 crossref_primary_10_1007_s44163_023_00077_1 crossref_primary_10_1109_TDSC_2024_3445570 crossref_primary_10_1007_s00371_024_03567_0 crossref_primary_10_1155_2022_3961910 crossref_primary_10_1109_ACCESS_2023_3261247 |
Cites_doi | 10.1109/TIFS.2020.3002390 10.1007/s11760-016-1014-2 10.1109/TIFS.2019.2916652 10.1109/TIFS.2016.2578288 10.1016/j.patrec.2019.08.008 10.1145/3301282 10.1088/1742-6596/1229/1/012044 10.1145/2976749.2978392 10.1109/CVPR42600.2020.00671 10.1109/TIFS.2014.2349158 10.1109/TBIOM.2019.2946175 10.1016/j.jvcir.2019.102660 10.1016/j.compeleceng.2018.09.005 10.3390/s19214733 10.1007/978-3-030-01261-8_18 10.1016/j.patcog.2019.107032 10.1109/TIFS.2010.2054083 10.1109/TIFS.2017.2676720 10.1109/CVPRW.2017.40 10.1109/CVPRW.2018.00096 10.1145/3386252 10.1049/iet-bmt.2017.0079 10.1109/CVPR.2019.00362 10.1109/TIFS.2015.2406533 10.1109/TIFS.2019.2934867 10.1016/j.inffus.2020.04.001 10.1109/CVPR.2018.00048 10.1016/j.future.2010.11.024 10.1016/j.inffus.2020.08.021 10.1109/TIFS.2015.2400395 10.1109/CVPR.2019.01026 10.1109/CVPR.2019.00481 10.1155/2016/9682453 10.1007/s11277-018-5661-1 10.1109/CVPRW.2018.00008 10.1016/j.patcog.2017.08.003 10.1145/3190618 10.1049/iet-bmt.2014.0075 10.1117/1.JEI.28.4.043001 10.1109/TIFS.2019.2922241 10.1109/ACCESS.2014.2381273 10.1016/j.imavis.2019.11.004 10.3390/sym9120305 10.1109/ACCESS.2019.2957273 10.1049/iet-bmt.2018.5235 10.1109/CVPR42600.2020.00851 10.1109/CVPRW50498.2020.00333 10.1109/TNNLS.2018.2790388 10.1145/3234150 10.1145/3317611 10.1371/journal.pone.0099212 10.1109/ICB45273.2019.8987254 10.1016/j.inffus.2016.05.003 10.1109/TIFS.2015.2403306 10.1109/CVPRW.2018.00010 10.1109/ACCESS.2017.2729161 10.1016/j.jvcir.2019.102746 10.1109/TIFS.2018.2801312 10.3390/electronics9040661 10.1109/TBIOM.2019.2903860 10.1109/CVPR42600.2020.00534 10.1109/CVPRW.2016.193 10.1109/CVPRW50498.2020.00415 10.1109/CVPR.2017.554 10.1016/j.eswa.2019.113002 10.1016/j.inffus.2018.12.003 10.1145/3345336.3345345 10.1109/CVPRW.2019.00201 10.1016/j.cognition.2018.09.002 10.1016/j.eswa.2018.05.004 10.1016/j.neucom.2019.11.117 10.1016/j.neucom.2019.11.016 10.1016/j.eswa.2019.113114 10.1109/ICCVW.2019.00062 10.1016/j.engappai.2018.04.013 10.1145/3038924 10.1109/TIP.2015.2395951 10.1109/CVPRW.2014.22 10.1109/TBIOM.2019.2939421 |
ContentType | Journal Article |
Copyright | 2021 Elsevier B.V. |
Copyright_xml | – notice: 2021 Elsevier B.V. |
DBID | AAYXX CITATION |
DOI | 10.1016/j.inffus.2021.04.015 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Mathematics |
EISSN | 1872-6305 |
EndPage | 69 |
ExternalDocumentID | 10_1016_j_inffus_2021_04_015 S1566253521000919 |
GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 29I 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV AKRWK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EJD EO8 EO9 EP2 EP3 F0J F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W JJJVA KOM M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K UHS ZMT ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKYEP ANKPU APXCP BNPGV CITATION SSH |
ID | FETCH-LOGICAL-c306t-a90afa438be5fb75abcc19382c53def841bda97da2e0fbe08f7eaca0742ba5b23 |
IEDL.DBID | .~1 |
ISSN | 1566-2535 |
IngestDate | Thu Apr 24 23:01:48 EDT 2025 Tue Jul 01 04:14:39 EDT 2025 Mon Apr 15 04:49:33 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Deep learning Presentation attacks Generalisation Face Recognition |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c306t-a90afa438be5fb75abcc19382c53def841bda97da2e0fbe08f7eaca0742ba5b23 |
ORCID | 0000-0002-3084-0604 0000-0002-8342-9026 0000-0002-6199-8471 |
PageCount | 15 |
ParticipantIDs | crossref_primary_10_1016_j_inffus_2021_04_015 crossref_citationtrail_10_1016_j_inffus_2021_04_015 elsevier_sciencedirect_doi_10_1016_j_inffus_2021_04_015 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | November 2021 2021-11-00 |
PublicationDateYYYYMMDD | 2021-11-01 |
PublicationDate_xml | – month: 11 year: 2021 text: November 2021 |
PublicationDecade | 2020 |
PublicationTitle | Information fusion |
PublicationYear | 2021 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Xiong, AbdAlmageed (b162) 2018 Costa-Pazo, Bhattacharjee, Vazquez-Fernandez, Marcel (b138) 2016 Wang, Yao, Kwok, Ni (b105) 2020; 53 Kotwal, Mostaani, Marcel (b147) 2020; 2 Wen, Han, Jain (b16) 2015; 10 D.-L. Nguyen, S.S. Arora, Y. Wu, H. Yang, Adversarial light projection attacks on face recognition systems: A feasibility study, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2020, pp. 814–815. kalihal Asst, Kaur (b34) 2019 Y. Liu, A. Jourabloo, X. Liu, Learning deep models for face anti-spoofing: Binary or auxiliary supervision, in: In Proceeding of IEEE Computer Vision and Pattern Recognition, Salt Lake City, UT, 2018. George, Mostaani, Geissenbuhler, Nikisins, Anjos, Marcel (b119) 2020; 15 Määttä, Hadid, Pietikäinen (b23) 2011 D. Pérez-Cabo, D. Jiménez-Cabello, A. Costa-Pazo, R.J. López-Sastre, Deep anomaly detection for generalized face anti-spoofing, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019. Yu, Li, Niu, Shi, Zhao (b114) 2020 Li, Komulainen, Zhao, Yuen, Pietikäinen (b63) 2016 Fan, Shi, Wang, Yi (b122) 2019 Ramachandra, Busch (b5) 2017; 50 Chen, Hu, Lei, Chen, Robertson, Li (b120) 2019; 15 J. Hernandez-Ortega, J. Fierrez, A. Morales, P. Tome, Time analysis of pulse-based face anti-spoofing in visible and NIR, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 544–552. Rattani, Derakhshani (b21) 2018; 72 Chingovska, Anjos, Marcel (b24) 2012 Chingovska, Dos Anjos, Marcel (b158) 2014; 9 Nikisins, Mohammadi, Anjos, Marcel (b97) 2018 Manjani, Tariyal, Vatsa, Singh, Majumdar (b143) 2017; 12 Bok, Suh, Lee (b150) 2020; 9 Komulainen, Hadid, Pietikäinen (b66) 2013 Pan, Sun, Wu, Lao (b160) 2007 Jia, Guo, Xu, Wang (b36) 2020; 93 Jiang, Liu, Zhou (b118) 2019; 128 G. Wang, H. Han, S. Shan, X. Chen, Improving cross-database face presentation attack detection via adversarial domain adaptation, in: International Conference on Biometrics, ICB, 2019. Chen, Dantcheva, Swearingen, Ross (b141) 2017 Boulkenafet, Komulainen, Li, Feng, Hadid (b142) 2017 Mahmud, Kaiser, Hussain, Vassanelli (b73) 2018; 29 Raghavendra, Raja, Venkatesh, Cheikh, Busch (b140) 2017 Nguyen, Delahaies, Retraint, Morain-Nicolier (b157) 2019; 7 Killioğlu, Taşkiran, Kahraman (b61) 2017 Abudarham, Shkiller, Yovel (b3) 2019; 182 Kähm, Damer (b26) 2012 Baweja, Oza, Perera, Patel (b104) 2020 Hernandez-Ortega, Fierrez, Morales, Galbally (b10) 2019 Singh, Singh, Vatsa, Ratha, Chellappa (b144) 2019; 1 Liu, Tan, Wan, Escalera, Guo, Li (b152) 2021 Feng, Hong, Yue, Chen, Wang, Han, Liu, Ding (b103) 2020 Ramachandra, Venkatesh, Raja, Bhattacharjee, Wasnik, Marcel, Busch (b54) 2019 Singh, Arora (b60) 2018; 100 Ieracitano, Adeel, Morabito, Hussain (b74) 2020; 387 Soltanpour, Boufama, Wu (b7) 2017; 72 Anjos, Chingovska, Marcel (b128) 2014 Marcel, Nixon, Li (b15) 2014 Alotaibi, Mahmood (b57) 2017; 11 Yang, Zhao, Wang, Lv (b43) 2020; 406 Lucena, Junior, Moia, Souza, Valle, Lotufo (b80) 2017 T. Kim, Y. Kim, I. Kim, D. Kim, BASN: Enriching feature representation using bipartite auxiliary supervisions for face anti-spoofing, in: Proceedings of the IEEE International Conference on Computer Vision Workshops, 2019, pp. 0–0. Zhou, Gao, Chen, Li, Li, Yang, Zhao (b87) 2019 Kisku, Rakshit (b2) 2017; 5 G. Wang, H. Han, S. Shan, X. Chen, Cross-domain face presentation attack detection via multi-domain disentangled representation learning, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 6678–6687. Zhang, Liu, Wan, Liang, Guo, Escalera, Escalante, Li (b148) 2020 Zhang, Yao, Zhang, Tai, Ding, Li, Huang, Song, Ma (b94) 2020 Li, Li, Cao, Wang, Huang, Kot (b145) 2018; 13 Hong, Hwang, Yoo, Yoon (b127) 2019; 52 Z. Zhou, D. Tang, X. Wang, W. Han, X. Liu, K. Zhang, Invisible mask: Practical attacks on face recognition with infrared, arXiv e-prints, 2018, arXiv–1803. Arashloo, Kittler (b96) 2018 Zhang, Yan, Liu, Lei, Yi, Li (b129) 2012 Galbally, Alonso-Fernandez, Fierrez, Ortega-Garcia (b159) 2012; 28 A. Agarwal, D. Yadav, N. Kohli, R. Singh, M. Vatsa, A. Noore, Face presentation attack with latex masks in multispectral videos, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017, pp. 81–89. Z. Yu, C. Zhao, Z. Wang, Y. Qin, Z. Su, X. Li, F. Zhou, G. Zhao, Searching central difference convolutional networks for face anti-spoofing, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 5295–5305. Nagpal, Dubey (b79) 2019 Munir, Khan (b22) 2019; 65 Kotwal, Mostaani, Marcel (b39) 2019; 2 I. Stylios, S. Kokolakis, O. Thanou, S. Chatzis, Behavioral biometrics & continuous user authentication on mobile devices: A survey, Inf. Fusion, 66, 76–99. Singh, Vatsa, Bhatt, Bharadwaj, Noore, Nooreyezdan (b13) 2010; 5 Kaur, Mann (b20) 2017; 164 Atoum, Liu, Jourabloo, Liu (b109) 2017 Yılmaz, Turhal, Nabiyev (b56) 2020; 5 Xiao, Tang, Guo, Yang, Zhu, Lei, Li (b146) 2019 Rehman, Po, Liu (b117) 2020; 142 Chingovska, Erdogmus, Anjos, Marcel (b6) 2016 George, Mostaani, Geissenbuhler, Nikisins, Anjos, Marcel (b51) 2019; 15 Sharif, Bhagavatula, Bauer, Reiter (b45) 2019; 22 Fatemifar, Arashloo, Awais, Kittler (b98) 2019 Dhamecha, Singh, Vatsa, Kumar (b154) 2014; 9 Ghaffar, Mohd (b29) 2017; 9 L. Abduh, I. Ivrissimtzis, Use of in-the-wild images for anomaly detection in face anti-spoofing, arXiv, 2020, arXiv–2006. Jia, Li, Hu, Xu (b151) 2019 Souza, Oliveira, Pamplona, Papa (b14) 2018; 72 B. Lin, X. Li, Z. Yu, G. Zhao, Face liveness detection by rPPG features and contextual patch-based CNN, in: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications, 2019, pp. 61–68. Mohammadi, Bhattacharjee, Marcel (b88) 2020 Y. Liu, A. Jourabloo, X. Liu, Learning deep models for face anti-spoofing: Binary or auxiliary supervision, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 389–398. Wu, Pan, Zhang (b32) 2019 Liu, Stehouwer, Jourabloo, Atoum, Liu (b116) 2019 Y. Jia, J. Zhang, S. Shan, X. Chen, Single-side domain generalization for face anti-spoofing, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 8484–8493. Fatemifar, Awais, Arashloo, Kittler (b99) 2019 Sundararajan, Woodard (b25) 2018; 51 Lumini, Nanni (b8) 2017; 33 D. Deb, X. Liu, A.K. Jain, FaceGuard: A self-supervised defense against adversarial face images, arXiv e-prints, 2020, arXiv–2011. Goodfellow, Pouget-Abadie, Mirza, Xu, Warde-Farley, Ozair, Courville, Bengio (b85) 2014 Yosinski, Clune, Bengio, Lipson (b78) 2014 Dhamecha, Nigam, Singh, Vatsa (b38) 2013 Mohammadi, Bhattacharjee, Marcel (b30) 2017; 7 Raheem, Ahmad, Adnan (b31) 2019; 9 Z. Yu, Y. Qin, X. Li, Z. Wang, C. Zhao, Z. Lei, G. Zhao, Multi-modal face anti-spoofing based on central difference networks, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2020, pp. 650–651. Gogate, Dashtipour, Adeel, Hussain (b71) 2020; 63 Bhattacharjee, Mohammadi, Anjos, Marcel (b33) 2019 Pouyanfar, Sadiq, Yan, Tian, Tao, Reyes, Shyu, Chen, Iyengar (b75) 2018; 51 Raghavendra, Raja, Busch (b134) 2015; 24 Saha, Xu, Kanakis, Georgoulis, Chen, Paudel, Van Gool (b90) 2020 Erdogmus, Marcel (b136) 2013 J. Yang, P. Ren, D. Zhang, D. Chen, F. Wen, H. Li, G. Hua, Neural aggregation network for video face recognition, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2017, pp. 4362–4371. X. Yang, W. Luo, L. Bao, Y. Gao, D. Gong, S. Zheng, Z. Li, W. Liu, Face anti-spoofing: Model matters, so does data, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 3507–3516. Kumar, Singh, Kumar (b19) 2017 V. Kushwaha, M. Singh, R. Singh, M. Vatsa, N. Ratha, R. Chellappa, Disguised faces in the wild, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 1–9. Liu, Song, Zhang, Zhao, Yang, Hou (b125) 2019; 19 Nikisins, George, Marcel (b82) 2019 Yang, Lei, Liao, Li (b67) 2013 Peng, Qin, Long (b163) 2020; 66 Bhattacharjee, Marcel (b131) 2017 Rathgeb, Drozdowski, Busch (b12) 2020 Dargan, Kumar (b9) 2020; 143 Galbally, Marcel, Fierrez (b27) 2014; 2 Peixoto, Michelassi, Rocha (b69) 2011 N. Kohli, D. Yadav, A. Noore, Face verification with disguise variations via deep disguise recognizer, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 17–24. Arora, Tiwari, Gupta (b59) 2019 Rehman, Po, Liu (b76) 2018; 108 M. Sharif, S. Bhagavatula, L. Bauer, M.K. Reiter, Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition, in: Proceedings of the 2016 ACM Sigsac Conference on Computer and Communications Security, 2016, pp. 1528–1540. R. Shao, X. Lan, J. Li, P.C. Yuen, Multi-adversarial discriminative deep domain generalization for face presentation attack detection, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 10023–10031. Chen, Dantcheva, Ross (b132) 2013 A. Jourabloo, Y. Liu, X. Liu, Face de-spoofing: Anti-spoofing via noise modeling, in: Proceedings of the European Conference on Computer Vision, ECCV, 2018, pp. 290–306. Jiang, Liu, Shao, Zhou (b124) 2020 Patel, Han, Jain (b18) 2016; 11 Bhattacharjee, Mohammadi, Marcel (b55) 2018 Chen, Wen, Xie, Wen, Sheng, Tang (b77) 2019; 8 Tu, Zhang, Xie, Luo, Zhang, Ma (b70) 2019; 28 Jia, Guo, Xu (b35) 2020; 98 Boulkenafet, Komulainen, Hadid (b68) 2016; 24 Singh, Agarwal, Singh, Nagpal, Vatsa (b40) 2020; vol. 34 Singh, Singh, Ross (b48) 2019; 52 Ramachandra, Stokkenes, Mohammadi, Venkatesh, Raja, Wasnik, Poiret, Marcel, Busch (b53) 2019 Zhang, Tondi, Barni (b41) 2020; 197 Wang, Zhao, Qin, Zhou, Qi, Wan, Lei (b111) 2018 Information technology- biometric presentation attack detection- part 3: Testing and Reporting, International Organization for Standardization, ISO/IEC DIS 30107-3:2017 (2017). George, Marcel (b110) 2019 Kotwal, Bhattacharjee, Marcel (b121) 2019; Pouyanfar (10.1016/j.inffus.2021.04.015_b75) 2018; 51 Yosinski (10.1016/j.inffus.2021.04.015_b78) 2014 Sundararajan (10.1016/j.inffus.2021.04.015_b25) 2018; 51 Saha (10.1016/j.inffus.2021.04.015_b90) 2020 Boulkenafet (10.1016/j.inffus.2021.04.015_b142) 2017 10.1016/j.inffus.2021.04.015_b133 10.1016/j.inffus.2021.04.015_b126 Ramachandra (10.1016/j.inffus.2021.04.015_b5) 2017; 50 Yu (10.1016/j.inffus.2021.04.015_b114) 2020 Costa-Pazo (10.1016/j.inffus.2021.04.015_b138) 2016 Fatemifar (10.1016/j.inffus.2021.04.015_b98) 2019 Dargan (10.1016/j.inffus.2021.04.015_b9) 2020; 143 Ramachandra (10.1016/j.inffus.2021.04.015_b53) 2019 Wen (10.1016/j.inffus.2021.04.015_b16) 2015; 10 Kotwal (10.1016/j.inffus.2021.04.015_b39) 2019; 2 Munir (10.1016/j.inffus.2021.04.015_b22) 2019; 65 10.1016/j.inffus.2021.04.015_b44 Tu (10.1016/j.inffus.2021.04.015_b70) 2019; 28 10.1016/j.inffus.2021.04.015_b42 Singh (10.1016/j.inffus.2021.04.015_b144) 2019; 1 10.1016/j.inffus.2021.04.015_b47 10.1016/j.inffus.2021.04.015_b46 Souza (10.1016/j.inffus.2021.04.015_b14) 2018; 72 Peng (10.1016/j.inffus.2021.04.015_b163) 2020; 66 10.1016/j.inffus.2021.04.015_b137 Wang (10.1016/j.inffus.2021.04.015_b111) 2018 Erdogmus (10.1016/j.inffus.2021.04.015_b136) 2013 10.1016/j.inffus.2021.04.015_b4 Raghavendra (10.1016/j.inffus.2021.04.015_b134) 2015; 24 Wang (10.1016/j.inffus.2021.04.015_b64) 2017; 9 Sharif (10.1016/j.inffus.2021.04.015_b45) 2019; 22 Qin (10.1016/j.inffus.2021.04.015_b106) 2020 Pan (10.1016/j.inffus.2021.04.015_b160) 2007 Chen (10.1016/j.inffus.2021.04.015_b77) 2019; 8 Nguyen (10.1016/j.inffus.2021.04.015_b157) 2019; 7 Singh (10.1016/j.inffus.2021.04.015_b60) 2018; 100 Costa-Pazo (10.1016/j.inffus.2021.04.015_b89) 2019 Jia (10.1016/j.inffus.2021.04.015_b36) 2020; 93 10.1016/j.inffus.2021.04.015_b37 Jiang (10.1016/j.inffus.2021.04.015_b118) 2019; 128 Määttä (10.1016/j.inffus.2021.04.015_b23) 2011 Steiner (10.1016/j.inffus.2021.04.015_b139) 2016; 2016 Tirunagari (10.1016/j.inffus.2021.04.015_b58) 2015; 10 10.1016/j.inffus.2021.04.015_b112 Liu (10.1016/j.inffus.2021.04.015_b152) 2021 Hasan (10.1016/j.inffus.2021.04.015_b50) 2019; 1229 Liu (10.1016/j.inffus.2021.04.015_b125) 2019; 19 Chingovska (10.1016/j.inffus.2021.04.015_b24) 2012 Tolosana (10.1016/j.inffus.2021.04.015_b49) 2019; 15 Baweja (10.1016/j.inffus.2021.04.015_b104) 2020 10.1016/j.inffus.2021.04.015_b108 Kisku (10.1016/j.inffus.2021.04.015_b2) 2017; 5 Zhou (10.1016/j.inffus.2021.04.015_b87) 2019 10.1016/j.inffus.2021.04.015_b107 Zhang (10.1016/j.inffus.2021.04.015_b153) 2020 Goodfellow (10.1016/j.inffus.2021.04.015_b85) 2014 Chen (10.1016/j.inffus.2021.04.015_b132) 2013 Gogate (10.1016/j.inffus.2021.04.015_b71) 2020; 63 Zhang (10.1016/j.inffus.2021.04.015_b94) 2020 Chingovska (10.1016/j.inffus.2021.04.015_b158) 2014; 9 Ieracitano (10.1016/j.inffus.2021.04.015_b74) 2020; 387 George (10.1016/j.inffus.2021.04.015_b110) 2019 Zhang (10.1016/j.inffus.2021.04.015_b148) 2020 Rattani (10.1016/j.inffus.2021.04.015_b21) 2018; 72 Ramachandra (10.1016/j.inffus.2021.04.015_b54) 2019 Nikisins (10.1016/j.inffus.2021.04.015_b97) 2018 Li (10.1016/j.inffus.2021.04.015_b145) 2018; 13 10.1016/j.inffus.2021.04.015_b28 Zhang (10.1016/j.inffus.2021.04.015_b41) 2020; 197 Singh (10.1016/j.inffus.2021.04.015_b48) 2019; 52 Bok (10.1016/j.inffus.2021.04.015_b150) 2020; 9 10.1016/j.inffus.2021.04.015_b115 10.1016/j.inffus.2021.04.015_b113 Adeel (10.1016/j.inffus.2021.04.015_b72) 2019 George (10.1016/j.inffus.2021.04.015_b51) 2019; 15 kalihal Asst (10.1016/j.inffus.2021.04.015_b34) 2019 Arashloo (10.1016/j.inffus.2021.04.015_b96) 2018 Chingovska (10.1016/j.inffus.2021.04.015_b6) 2016 10.1016/j.inffus.2021.04.015_b11 Fan (10.1016/j.inffus.2021.04.015_b122) 2019 Wang (10.1016/j.inffus.2021.04.015_b86) 2020; 16 Soltanpour (10.1016/j.inffus.2021.04.015_b7) 2017; 72 10.1016/j.inffus.2021.04.015_b17 Kotwal (10.1016/j.inffus.2021.04.015_b121) 2019; 1 Rehman (10.1016/j.inffus.2021.04.015_b76) 2018; 108 Kaur (10.1016/j.inffus.2021.04.015_b20) 2017; 164 Komulainen (10.1016/j.inffus.2021.04.015_b66) 2013 Bhattacharjee (10.1016/j.inffus.2021.04.015_b55) 2018 Jia (10.1016/j.inffus.2021.04.015_b151) 2019 Marcel (10.1016/j.inffus.2021.04.015_b15) 2014 Boulkenafet (10.1016/j.inffus.2021.04.015_b68) 2016; 24 Feng (10.1016/j.inffus.2021.04.015_b103) 2020 10.1016/j.inffus.2021.04.015_b91 Wang (10.1016/j.inffus.2021.04.015_b123) 2019 Raheem (10.1016/j.inffus.2021.04.015_b31) 2019; 9 Galbally (10.1016/j.inffus.2021.04.015_b27) 2014; 2 Mohammadi (10.1016/j.inffus.2021.04.015_b88) 2020 10.1016/j.inffus.2021.04.015_b92 10.1016/j.inffus.2021.04.015_b93 Galbally (10.1016/j.inffus.2021.04.015_b135) 2016; 5 Singh (10.1016/j.inffus.2021.04.015_b13) 2010; 5 Nagpal (10.1016/j.inffus.2021.04.015_b79) 2019 Jia (10.1016/j.inffus.2021.04.015_b35) 2020; 98 Wang (10.1016/j.inffus.2021.04.015_b105) 2020; 53 Yang (10.1016/j.inffus.2021.04.015_b43) 2020; 406 10.1016/j.inffus.2021.04.015_b100 Xiao (10.1016/j.inffus.2021.04.015_b146) 2019 10.1016/j.inffus.2021.04.015_b101 Chen (10.1016/j.inffus.2021.04.015_b120) 2019; 15 Kumar (10.1016/j.inffus.2021.04.015_b19) 2017 Dhamecha (10.1016/j.inffus.2021.04.015_b38) 2013 Anjos (10.1016/j.inffus.2021.04.015_b128) 2014 Dantcheva (10.1016/j.inffus.2021.04.015_b130) 2012 10.1016/j.inffus.2021.04.015_b84 Rathgeb (10.1016/j.inffus.2021.04.015_b12) 2020 Lumini (10.1016/j.inffus.2021.04.015_b8) 2017; 33 Bhattacharjee (10.1016/j.inffus.2021.04.015_b33) 2019 Alotaibi (10.1016/j.inffus.2021.04.015_b57) 2017; 11 Dhamecha (10.1016/j.inffus.2021.04.015_b154) 2014; 9 Yang (10.1016/j.inffus.2021.04.015_b67) 2013 10.1016/j.inffus.2021.04.015_b1 Xiong (10.1016/j.inffus.2021.04.015_b162) 2018 10.1016/j.inffus.2021.04.015_b155 10.1016/j.inffus.2021.04.015_b156 Mahmud (10.1016/j.inffus.2021.04.015_b73) 2018; 29 Killioğlu (10.1016/j.inffus.2021.04.015_b61) 2017 Kähm (10.1016/j.inffus.2021.04.015_b26) 2012 Atoum (10.1016/j.inffus.2021.04.015_b109) 2017 Rehman (10.1016/j.inffus.2021.04.015_b117) 2020; 142 Hernandez-Ortega (10.1016/j.inffus.2021.04.015_b10) 2019 Liu (10.1016/j.inffus.2021.04.015_b116) 2019 Li (10.1016/j.inffus.2021.04.015_b63) 2016 Ghaffar (10.1016/j.inffus.2021.04.015_b29) 2017; 9 Arashloo (10.1016/j.inffus.2021.04.015_b95) 2017; 5 Peixoto (10.1016/j.inffus.2021.04.015_b69) 2011 George (10.1016/j.inffus.2021.04.015_b119) 2020; 15 Arora (10.1016/j.inffus.2021.04.015_b59) 2019 Raghavendra (10.1016/j.inffus.2021.04.015_b140) 2017 Timoshenko (10.1016/j.inffus.2021.04.015_b149) 2019 10.1016/j.inffus.2021.04.015_b65 Bhattacharjee (10.1016/j.inffus.2021.04.015_b131) 2017 Zhang (10.1016/j.inffus.2021.04.015_b129) 2012 Abudarham (10.1016/j.inffus.2021.04.015_b3) 2019; 182 Lucena (10.1016/j.inffus.2021.04.015_b80) 2017 Mohammadi (10.1016/j.inffus.2021.04.015_b30) 2017; 7 Nikisins (10.1016/j.inffus.2021.04.015_b82) 2019 Yılmaz (10.1016/j.inffus.2021.04.015_b56) 2020; 5 Li (10.1016/j.inffus.2021.04.015_b102) 2020 10.1016/j.inffus.2021.04.015_b161 Fatemifar (10.1016/j.inffus.2021.04.015_b99) 2019 Patel (10.1016/j.inffus.2021.04.015_b18) 2016; 11 Galbally (10.1016/j.inffus.2021.04.015_b159) 2012; 28 Manjani (10.1016/j.inffus.2021.04.015_b143) 2017; 12 Yu (10.1016/j.inffus.2021.04.015_b83) 2020 Tan (10.1016/j.inffus.2021.04.015_b52) 2010 Singh (10.1016/j.inffus.2021.04.015_b40) 2020; vol. 34 Jiang (10.1016/j.inffus.2021.04.015_b124) 2020 Wu (10.1016/j.inffus.2021.04.015_b32) 2019 10.1016/j.inffus.2021.04.015_b62 Yang (10.1016/j.inffus.2021.04.015_b81) 2015; 10 Kotwal (10.1016/j.inffus.2021.04.015_b147) 2020; 2 Hong (10.1016/j.inffus.2021.04.015_b127) 2019; 52 Chen (10.1016/j.inffus.2021.04.015_b141) 2017 |
References_xml | – volume: 9 year: 2014 ident: b154 article-title: Recognizing disguised faces: Human and machine evaluation publication-title: PLoS One – volume: 164 start-page: 29 year: 2017 end-page: 33 ident: b20 article-title: Techniques of face spoof detection: A review publication-title: Int. J. Comput. Appl. – year: 2019 ident: b34 article-title: A review on different face spoof detection techniques in biometric systems – year: 2019 ident: b151 article-title: Spoofing and anti-spoofing with wax figure faces – volume: 15 start-page: 42 year: 2019 end-page: 55 ident: b51 article-title: Biometric face presentation attack detection with multi-channel convolutional neural network publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 387 start-page: 51 year: 2020 end-page: 62 ident: b74 article-title: A novel statistical analysis and autoencoder driven intelligent intrusion detection approach publication-title: Neurocomputing – volume: 9 start-page: 33 year: 2017 end-page: 38 ident: b29 article-title: Presentation attack detection for face recognition on smartphones: A comprehensive review publication-title: J. Telecommun. Electron. Comput. Eng. – volume: 100 start-page: 1677 year: 2018 end-page: 1687 ident: b60 article-title: A novel face liveness detection algorithm with multiple liveness indicators publication-title: Wirel. Pers. Commun. – start-page: 70 year: 2020 end-page: 85 ident: b153 article-title: CelebA-spoof: Large-scale face anti-spoofing dataset with rich annotations publication-title: European Conference on Computer Vision – reference: Information technology- biometric presentation attack detection- part 3: Testing and Reporting, International Organization for Standardization, ISO/IEC DIS 30107-3:2017 (2017). – volume: 2 start-page: 1530 year: 2014 end-page: 1552 ident: b27 article-title: Biometric antispoofing methods: A survey in face recognition publication-title: IEEE Access – volume: 53 start-page: 1 year: 2020 end-page: 34 ident: b105 article-title: Generalizing from a few examples: A survey on few-shot learning publication-title: ACM Comput. Surv. – start-page: 1 year: 2019 end-page: 6 ident: b54 article-title: Custom silicone face masks: Vulnerability of commercial face recognition systems & presentation attack detection publication-title: 2019 7th International Workshop on Biometrics and Forensics, IWBF – reference: L. Abduh, I. Ivrissimtzis, Use of in-the-wild images for anomaly detection in face anti-spoofing, arXiv, 2020, arXiv–2006. – volume: 9 start-page: 305 year: 2017 ident: b64 article-title: Face liveness detection based on skin blood flow analysis publication-title: Symmetry – volume: 51 start-page: 1 year: 2018 end-page: 36 ident: b75 article-title: A survey on deep learning: Algorithms, techniques, and applications publication-title: ACM Comput. Surv. – start-page: 1 year: 2020 end-page: 25 ident: b124 article-title: Face anti-spoofing with generated near-infrared images publication-title: Multimedia Tools Appl. – volume: 9 start-page: 661 year: 2020 ident: b150 article-title: Verifying the effectiveness of new face spoofing db with capture angle and distance publication-title: Electronics – volume: 108 start-page: 159 year: 2018 end-page: 169 ident: b76 article-title: LiveNet: Improving features generalization for face liveness detection using convolution neural networks publication-title: Expert Syst. Appl. – start-page: 1 year: 2013 end-page: 8 ident: b66 article-title: Context based face anti-spoofing publication-title: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems, BTAS – start-page: 1 year: 2018 end-page: 9 ident: b162 article-title: Unknown presentation attack detection with face RGB images publication-title: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS – volume: 10 start-page: 762 year: 2015 end-page: 777 ident: b58 article-title: Detection of face spoofing using visual dynamics publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 5 start-page: 83 year: 2016 end-page: 91 ident: b135 article-title: Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models publication-title: IET Biom. – start-page: 3320 year: 2014 end-page: 3328 ident: b78 article-title: How transferable are features in deep neural networks? publication-title: Advances in Neural Information Processing Systems – start-page: 1 year: 2012 end-page: 12 ident: b26 article-title: 2d face liveness detection: An overview publication-title: 2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group, BIOSIG – year: 2020 ident: b106 article-title: Learning Meta Model for Zero-And Few-Shot Face Antispoofing – volume: 63 start-page: 273 year: 2020 end-page: 285 ident: b71 article-title: CochleaNet: A robust language-independent audio-visual model for real-time speech enhancement publication-title: Inf. Fusion – year: 2020 ident: b83 article-title: NAS-FAS: Static-dynamic central difference network search for face anti-spoofing publication-title: IEEE Trans. Pattern Anal. Mach. Intell. – start-page: 1 year: 2017 end-page: 7 ident: b131 article-title: What you can’t see can help you-extended-range imaging for 3d-mask presentation attack detection publication-title: 2017 International Conference of the Biometrics Special Interest Group, BIOSIG – start-page: 391 year: 2012 end-page: 398 ident: b130 article-title: Can facial cosmetics affect the matching accuracy of face recognition systems? publication-title: 2012 IEEE Fifth International Conference on Biometrics: theory, Applications and Systems, BTAS – volume: 15 start-page: 1261 year: 2019 end-page: 1275 ident: b49 article-title: Biometric presentation attack detection: Beyond the visible spectrum publication-title: IEEE Trans. Inf. Forensics Secur. – reference: V. Kushwaha, M. Singh, R. Singh, M. Vatsa, N. Ratha, R. Chellappa, Disguised faces in the wild, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 1–9. – start-page: 192 year: 2019 end-page: 197 ident: b87 article-title: Face anti-spoofing based on multi-layer domain adaptation publication-title: 2019 IEEE International Conference on Multimedia & Expo Workshops, ICMEW – reference: X. Yang, W. Luo, L. Bao, Y. Gao, D. Gong, S. Zheng, Z. Li, W. Liu, Face anti-spoofing: Model matters, so does data, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 3507–3516. – start-page: 2672 year: 2014 end-page: 2680 ident: b85 article-title: Generative adversarial nets publication-title: Advances in Neural Information Processing Systems 27 – year: 2020 ident: b103 article-title: Learning generalized spoof cues for face anti-spoofing – reference: D. Pérez-Cabo, D. Jiménez-Cabello, A. Costa-Pazo, R.J. López-Sastre, Deep anomaly detection for generalized face anti-spoofing, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019. – start-page: 1 year: 2019 end-page: 10 ident: b72 article-title: Lip-reading driven deep learning approach for speech enhancement publication-title: IEEE Trans. Emerg. Top. Comput. Intell. – volume: 15 start-page: 42 year: 2020 end-page: 55 ident: b119 article-title: Biometric face presentation attack detection with multi-channel convolutional neural network publication-title: IEEE Trans. Inf. Forensics Secur. – start-page: 27 year: 2017 end-page: 34 ident: b80 article-title: Transfer learning using convolutional neural networks for face anti-spoofing publication-title: International Conference Image Analysis and Recognition – volume: 29 start-page: 2063 year: 2018 end-page: 2079 ident: b73 article-title: Applications of deep learning and reinforcement learning to biological data publication-title: IEEE Trans. Neural Netw. Learn. Syst. – start-page: 197 year: 2019 end-page: 210 ident: b59 article-title: Liveness and threat aware selfie face recognition publication-title: Selfie Biometrics – start-page: 1 year: 2019 end-page: 8 ident: b79 article-title: A performance evaluation of convolutional neural networks for face anti spoofing publication-title: 2019 International Joint Conference on Neural Networks, IJCNN – volume: 28 year: 2019 ident: b70 article-title: Deep transfer across domains for face antispoofing publication-title: J. Electron. Imaging – start-page: 3557 year: 2011 end-page: 3560 ident: b69 article-title: Face liveness detection under bad illumination conditions publication-title: 2011 18th IEEE International Conference on Image Processing – start-page: 207 year: 2019 end-page: 228 ident: b33 article-title: Recent advances in face presentation attack detection publication-title: Handbook of Biometric Anti-Spoofing – reference: R. Shao, X. Lan, J. Li, P.C. Yuen, Multi-adversarial discriminative deep domain generalization for face presentation attack detection, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 10023–10031. – start-page: 1 year: 2016 end-page: 7 ident: b138 article-title: The replay-mobile face presentation-attack database publication-title: 2016 International Conference of the Biometrics Special Interest Group, BIOSIG – volume: 9 year: 2019 ident: b31 article-title: Insight on face liveness detection: A systematic literature review publication-title: Int. J. Electr. Comput. Eng. – reference: G. Wang, H. Han, S. Shan, X. Chen, Improving cross-database face presentation attack detection via adversarial domain adaptation, in: International Conference on Biometrics, ICB, 2019. – start-page: 1 year: 2020 end-page: 9 ident: b104 article-title: Anomaly detection-based unknown face presentation attack detection publication-title: 2020 IEEE International Joint Conference on Biometrics, IJCB – volume: 50 start-page: 1 year: 2017 end-page: 37 ident: b5 article-title: Presentation attack detection methods for face recognition systems: A comprehensive survey publication-title: ACM Comput. Surv. – start-page: 1 year: 2017 end-page: 8 ident: b141 article-title: Spoofing faces using makeup: An investigative study publication-title: 2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA – volume: 72 start-page: 391 year: 2017 end-page: 406 ident: b7 article-title: A survey of local feature methods for 3D face recognition publication-title: Pattern Recognit. – reference: A. Liu, X. Li, J. Wan, Y. Liang, S. Escalera, H.J. Escalante, M. Madadi, Y. Jin, Z. Wu, X. Yu, et al. Cross-ethnicity face anti-spoofing recognition challenge: A review, IET Biom. – year: 2020 ident: b12 article-title: Detection of makeup presentation attacks based on deep face representations – start-page: 612 year: 2017 end-page: 618 ident: b142 article-title: Oulu-npu: A mobile face presentation attack database with real-world variations publication-title: 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition, FG 2017 – volume: 22 start-page: 1 year: 2019 end-page: 30 ident: b45 article-title: A general framework for adversarial examples with objectives publication-title: ACM Trans. Priv. Secur. – reference: T. Kim, Y. Kim, I. Kim, D. Kim, BASN: Enriching feature representation using bipartite auxiliary supervisions for face anti-spoofing, in: Proceedings of the IEEE International Conference on Computer Vision Workshops, 2019, pp. 0–0. – start-page: 1 year: 2011 end-page: 7 ident: b23 article-title: Face spoofing detection from single images using micro-texture analysis publication-title: 2011 International Joint Conference on Biometrics, IJCB – start-page: 1 year: 2012 end-page: 7 ident: b24 article-title: On the effectiveness of local binary patterns in face anti-spoofing publication-title: 2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group, BIOSIG – start-page: 1584 year: 2019 end-page: 1590 ident: b123 article-title: Multi-modal face presentation attack detection via spatial and channel attentions publication-title: 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, CVPRW – volume: 15 start-page: 578 year: 2019 end-page: 593 ident: b120 article-title: Attention-based two-stream convolutional networks for face spoofing detection publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 52 start-page: 1 year: 2019 end-page: 43 ident: b127 article-title: How generative adversarial networks and their variants work: An overview publication-title: ACM Comput. Surv. – start-page: 165 year: 2016 end-page: 194 ident: b6 article-title: Face recognition systems under spoofing attacks publication-title: Face Recognition Across the Imaging Spectrum – reference: A. Hadid, Face biometrics under spoofing attacks: Vulnerabilities, countermeasures, open issues, and research directions, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2014, pp. 113–118. – volume: 406 start-page: 378 year: 2020 end-page: 385 ident: b43 article-title: Evaluating facial recognition web services with adversarial and synthetic samples publication-title: Neurocomputing – volume: 16 start-page: 56 year: 2020 end-page: 69 ident: b86 article-title: Unsupervised adversarial domain adaptation for cross-domain face presentation attack detection publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 65 year: 2019 ident: b22 article-title: An extensive review on spectral imaging in biometric systems: Challenges & advancements publication-title: J. Vis. Commun. Image Represent. – volume: 5 start-page: 31 year: 2017 ident: b2 article-title: Face spoofing and counter-spoofing: A survey of state-of-the-art algorithms publication-title: Trans. Mach. Learn. Artif. Intell. – start-page: 123 year: 2019 end-page: 126 ident: b149 article-title: Large crowd collected facial anti-spoofing dataset publication-title: 2019 Computer Science and Information Technologies, CSIT – start-page: 187 year: 2019 end-page: 206 ident: b10 article-title: Introduction to face presentation attack detection publication-title: Handbook of Biometric Anti-Spoofing – reference: B. Lin, X. Li, Z. Yu, G. Zhao, Face liveness detection by rPPG features and contextual patch-based CNN, in: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications, 2019, pp. 61–68. – reference: Z. Yu, Y. Qin, X. Li, Z. Wang, C. Zhao, Z. Lei, G. Zhao, Multi-modal face anti-spoofing based on central difference networks, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2020, pp. 650–651. – start-page: 000087 year: 2017 end-page: 000092 ident: b61 article-title: Anti-spoofing in face recognition with liveness detection using pupil tracking publication-title: 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics, SAMI – year: 2018 ident: b111 article-title: Exploiting temporal and depth information for multi-frame face anti-spoofing – start-page: 1 year: 2013 end-page: 8 ident: b38 article-title: Disguise detection and face recognition in visible and thermal spectrums publication-title: 2013 International Conference on Biometrics, ICB – start-page: 1 year: 2017 end-page: 8 ident: b140 article-title: On the vulnerability of extended multispectral face recognition systems towards presentation attacks publication-title: 2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA – start-page: 75 year: 2018 end-page: 81 ident: b97 article-title: On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing publication-title: 2018 International Conference on Biometrics, ICB – start-page: 1 year: 2013 end-page: 6 ident: b67 article-title: Face liveness detection with component dependent descriptor publication-title: 2013 International Conference on Biometrics, ICB – start-page: 35 year: 2019 end-page: 43 ident: b32 article-title: A review of face anti-spoofing and its applications in China publication-title: International Conference on Harmony Search Algorithm – start-page: 641 year: 2020 end-page: 657 ident: b94 article-title: Face anti-spoofing via disentangled representation learning publication-title: European Conference on Computer Vision – year: 2019 ident: b82 article-title: Domain adaptation in multi-channel autoencoder based features for robust face anti-spoofing publication-title: International Conference on Biometrics 2019 – volume: 93 year: 2020 ident: b36 article-title: Face presentation attack detection in mobile scenarios: A comprehensive evaluation publication-title: Image Vis. Comput. – volume: 11 start-page: 2268 year: 2016 end-page: 2283 ident: b18 article-title: Secure face unlock: Spoof detection on smartphones publication-title: IEEE Trans. Inf. Forensics Secur. – reference: A. Agarwal, D. Yadav, N. Kohli, R. Singh, M. Vatsa, A. Noore, Face presentation attack with latex masks in multispectral videos, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017, pp. 81–89. – volume: 1 start-page: 97 year: 2019 end-page: 108 ident: b144 article-title: Recognizing disguised faces in the wild publication-title: IEEE Trans. Biom. Behav. Identity Sci. – volume: 24 start-page: 1060 year: 2015 end-page: 1075 ident: b134 article-title: Presentation attack detection for face recognition using light field camera publication-title: IEEE Trans. Image Process. – start-page: 504 year: 2010 end-page: 517 ident: b52 article-title: Face liveness detection from a single image with sparse low rank bilinear discriminative model publication-title: European Conference on Computer Vision – start-page: 4244 year: 2016 end-page: 4249 ident: b63 article-title: Generalized face anti-spoofing by detecting pulse from face videos publication-title: 2016 23rd International Conference on Pattern Recognition, ICPR – reference: Z. Yu, C. Zhao, Z. Wang, Y. Qin, Z. Su, X. Li, F. Zhou, G. Zhao, Searching central difference convolutional networks for face anti-spoofing, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 5295–5305. – volume: 12 start-page: 1713 year: 2017 end-page: 1723 ident: b143 article-title: Detecting silicone mask-based presentation attack via deep dictionary learning publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 72 start-page: 39 year: 2018 end-page: 52 ident: b21 article-title: A survey of mobile face biometrics publication-title: Comput. Electr. Eng. – volume: 182 start-page: 73 year: 2019 end-page: 83 ident: b3 article-title: Critical features for face recognition publication-title: Cognition – start-page: 1 year: 2013 end-page: 8 ident: b132 article-title: Automatic facial makeup detection with application in face recognition publication-title: 2013 International Conference on Biometrics, ICB – volume: 5 start-page: 441 year: 2010 end-page: 448 ident: b13 article-title: Plastic surgery: A new dimension to face recognition publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 8 start-page: 369 year: 2019 end-page: 377 ident: b77 article-title: Face liveness detection: Fusing colour texture feature and deep feature publication-title: IET Biom. – reference: Y. Liu, A. Jourabloo, X. Liu, Learning deep models for face anti-spoofing: Binary or auxiliary supervision, in: In Proceeding of IEEE Computer Vision and Pattern Recognition, Salt Lake City, UT, 2018. – volume: 13 start-page: 1794 year: 2018 end-page: 1809 ident: b145 article-title: Unsupervised domain adaptation for face anti-spoofing publication-title: IEEE Trans. Inf. Forensics Secur. – start-page: 1 year: 2019 end-page: 8 ident: b89 article-title: Generalized presentation attack detection: A face anti-spoofing evaluation proposal publication-title: 2019 International Conference on Biometrics, ICB – reference: A. Jourabloo, Y. Liu, X. Liu, Face de-spoofing: Anti-spoofing via noise modeling, in: Proceedings of the European Conference on Computer Vision, ECCV, 2018, pp. 290–306. – year: 2014 ident: b128 article-title: Anti-Spoofing: Face Databases – reference: S. Liu, B. Yang, P.C. Yuen, G. Zhao, A 3D mask face anti-spoofing database with real world variations, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016, pp. 100–106. – volume: vol. 34 start-page: 13583 year: 2020 end-page: 13589 ident: b40 article-title: On the robustness of face recognition algorithms against attacks and bias publication-title: Proceedings of the AAAI Conference on Artificial Intelligence – volume: 1 start-page: 238 year: 2019 end-page: 251 ident: b121 article-title: Multispectral deep embeddings as a countermeasure to custom silicone mask presentation attacks publication-title: IEEE Trans. Biom. Behav. Identity Sci. – start-page: 1 year: 2019 end-page: 8 ident: b146 article-title: 3dma: A multi-modality 3D mask face anti-spoofing database publication-title: 2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS – volume: 11 start-page: 713 year: 2017 end-page: 720 ident: b57 article-title: Deep face liveness detection based on nonlinear diffusion using convolution neural network publication-title: Signal Image Video Process. – start-page: 1 year: 2018 end-page: 7 ident: b55 article-title: Spoofing deep face recognition with custom silicone masks publication-title: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS – year: 2019 ident: b53 article-title: Smartphone multi-modal biometric authentication: Database and evaluation – volume: 10 start-page: 746 year: 2015 end-page: 761 ident: b16 article-title: Face spoof detection with image distortion analysis publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 1229 year: 2019 ident: b50 article-title: Face anti-spoofing using texture-based techniques and filtering methods publication-title: J. Phys. Conf. Ser. – reference: Y. Jia, J. Zhang, S. Shan, X. Chen, Single-side domain generalization for face anti-spoofing, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 8484–8493. – start-page: 1104 year: 2017 end-page: 1108 ident: b19 article-title: A comparative study on face spoofing attacks publication-title: 2017 International Conference on Computing, Communication and Automation, ICCCA – year: 2014 ident: b15 article-title: Handbook of Biometric Anti-Spoofing, Vol. 1 – volume: 5 start-page: 48 year: 2020 end-page: 59 ident: b56 article-title: Effect of feature selection with meta-heuristic optimization methods on face spoofing detection publication-title: J. Modern Technol. Eng. – reference: Y. Liu, J. Stehouwer, A. Jourabloo, X. Liu, Deep tree learning for zero-shot face anti-spoofing, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 4680–4689. – volume: 24 start-page: 141 year: 2016 end-page: 145 ident: b68 article-title: Face antispoofing using speeded-up robust features and fisher vector encoding publication-title: IEEE Signal Process. Lett. – start-page: 319 year: 2017 end-page: 328 ident: b109 article-title: Face anti-spoofing using patch and depth-based CNNs publication-title: 2017 IEEE International Joint Conference on Biometrics, IJCB – volume: 7 start-page: 15 year: 2017 end-page: 26 ident: b30 article-title: Deeply vulnerable: A study of the robustness of face recognition to presentation attacks publication-title: IET Biom. – volume: 52 start-page: 187 year: 2019 end-page: 205 ident: b48 article-title: A comprehensive overview of biometric fusion publication-title: Inf. Fusion – start-page: 1 year: 2019 end-page: 8 ident: b110 article-title: Deep pixel-wise binary supervision for face presentation attack detection publication-title: 2019 International Conference on Biometrics, ICB – reference: N. Kohli, D. Yadav, A. Noore, Face verification with disguise variations via deep disguise recognizer, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 17–24. – reference: J. Yang, P. Ren, D. Zhang, D. Chen, F. Wen, H. Li, G. Hua, Neural aggregation network for video face recognition, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2017, pp. 4362–4371. – start-page: 2852 year: 2020 end-page: 2856 ident: b102 article-title: Unseen face presentation attack detection with hypersphere loss publication-title: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP – start-page: 26 year: 2012 end-page: 31 ident: b129 article-title: A face antispoofing database with diverse attacks publication-title: 2012 5th IAPR International Conference on Biometrics, ICB – volume: 51 start-page: 1 year: 2018 end-page: 34 ident: b25 article-title: Deep learning for biometrics: A survey publication-title: ACM Comput. Surv. – volume: 2 start-page: 15 year: 2019 end-page: 25 ident: b39 article-title: Detection of age-induced makeup attacks on face recognition systems using multi-layer deep features publication-title: IEEE Trans. Biom. Behav. Identity Sci. – volume: 19 start-page: 4733 year: 2019 ident: b125 article-title: An identity authentication method combining liveness detection and face recognition publication-title: Sensors – reference: M. Sharif, S. Bhagavatula, L. Bauer, M.K. Reiter, Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition, in: Proceedings of the 2016 ACM Sigsac Conference on Computer and Communications Security, 2016, pp. 1528–1540. – start-page: 1 year: 2019 end-page: 6 ident: b122 article-title: Research on liveness detection algorithms based on deep learning publication-title: 2019 IEEE 10th International Conference on Software Engineering and Service Science, ICSESS – reference: I. Stylios, S. Kokolakis, O. Thanou, S. Chatzis, Behavioral biometrics & continuous user authentication on mobile devices: A survey, Inf. Fusion, 66, 76–99. – start-page: 1001 year: 2020 end-page: 1005 ident: b88 article-title: Domain adaptation for generalization of face presentation attack detection in mobile settengs with minimal information publication-title: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP – year: 2018 ident: b96 article-title: Client-specific anomaly detection for face presentation attack detection – start-page: 1 year: 2020 ident: b148 article-title: CASIA-SURF: A large-scale multi-modal benchmark for face anti-spoofing publication-title: IEEE Trans. Biom. Behav. Identity Sci. – reference: J. Hernandez-Ortega, J. Fierrez, A. Morales, P. Tome, Time analysis of pulse-based face anti-spoofing in visible and NIR, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 544–552. – start-page: 1 year: 2007 end-page: 8 ident: b160 article-title: Eyeblink-based anti-spoofing in face recognition from a generic webcamera publication-title: 2007 IEEE 11th International Conference on Computer Vision – reference: D. Deb, X. Liu, A.K. Jain, FaceGuard: A self-supervised defense against adversarial face images, arXiv e-prints, 2020, arXiv–2011. – start-page: 1 year: 2013 end-page: 8 ident: b136 article-title: Spoofing 2D face recognition systems with 3D masks publication-title: 2013 International Conference of the BIOSIG Special Interest Group , BIOSIG – volume: 72 start-page: 368 year: 2018 end-page: 381 ident: b14 article-title: How far did we get in face spoofing detection? publication-title: Eng. Appl. Artif. Intell. – start-page: 557 year: 2020 end-page: 575 ident: b114 article-title: Face anti-spoofing with human material perception publication-title: European Conference on Computer Vision – reference: D.-L. Nguyen, S.S. Arora, Y. Wu, H. Yang, Adversarial light projection attacks on face recognition systems: A feasibility study, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2020, pp. 814–815. – start-page: 3490 year: 2020 end-page: 3499 ident: b90 article-title: Domain agnostic feature learning for image and video based face anti-spoofing publication-title: 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, CVPRW – volume: 128 start-page: 30 year: 2019 end-page: 37 ident: b118 article-title: Multilevel fusing paired visible light and near-infrared spectral images for face anti-spoofing publication-title: Pattern Recognit. Lett. – volume: 143 year: 2020 ident: b9 article-title: A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities publication-title: Expert Syst. Appl. – volume: 5 start-page: 13868 year: 2017 end-page: 13882 ident: b95 article-title: An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol publication-title: IEEE Access – volume: 7 start-page: 175429 year: 2019 end-page: 175442 ident: b157 article-title: Face presentation attack detection based on a statistical model of image noise publication-title: IEEE Access – volume: 98 year: 2020 ident: b35 article-title: A survey on 3D mask presentation attack detection and countermeasures publication-title: Pattern Recognit. – volume: 28 start-page: 311 year: 2012 end-page: 321 ident: b159 article-title: A high performance fingerprint liveness detection method based on quality related features publication-title: Future Gener. Comput. Syst. – volume: 2 start-page: 15 year: 2020 end-page: 25 ident: b147 article-title: Detection of age-induced makeup attacks on face recognition systems using multi-layer deep features publication-title: IEEE Trans. Biom. Behav. Identity Sci. – reference: Y. Liu, A. Jourabloo, X. Liu, Learning deep models for face anti-spoofing: Binary or auxiliary supervision, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 389–398. – volume: 66 year: 2020 ident: b163 article-title: Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning publication-title: J. Vis. Commun. Image Represent. – volume: 197 year: 2020 ident: b41 article-title: Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability publication-title: Comput. Vis. Image Underst. – reference: G. Wang, H. Han, S. Shan, X. Chen, Cross-domain face presentation attack detection via multi-domain disentangled representation learning, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 6678–6687. – start-page: 1 year: 2019 end-page: 7 ident: b99 article-title: Combining multiple one-class classifiers for anomaly based face spoofing attack detection publication-title: 2019 International Conference on Biometrics, ICB – start-page: 171 year: 2019 end-page: 196 ident: b116 article-title: Presentation attack detection for face in mobile phones publication-title: Selfie Biometrics – volume: 10 start-page: 797 year: 2015 end-page: 809 ident: b81 article-title: Person-specific face antispoofing with subject domain adaptation publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 2016 year: 2016 ident: b139 article-title: Design of an active multispectral swir camera system for skin detection and face verification publication-title: J. Sens. – volume: 9 start-page: 2264 year: 2014 end-page: 2276 ident: b158 article-title: Biometrics evaluation under spoofing attacks publication-title: IEEE Trans. Inf. Forensics Secur. – reference: Z. Zhou, D. Tang, X. Wang, W. Han, X. Liu, K. Zhang, Invisible mask: Practical attacks on face recognition with infrared, arXiv e-prints, 2018, arXiv–1803. – volume: 33 start-page: 71 year: 2017 end-page: 85 ident: b8 article-title: Overview of the combination of biometric matchers publication-title: Inf. Fusion – start-page: 1179 year: 2021 end-page: 1187 ident: b152 article-title: Casia-surf cefa: A benchmark for multi-modal cross-ethnicity face anti-spoofing publication-title: Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision – start-page: 8464 year: 2019 end-page: 8468 ident: b98 article-title: Spoofing attack detection by anomaly detection publication-title: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP – volume: 142 year: 2020 ident: b117 article-title: SLNet: Stereo face liveness detection via dynamic disparity-maps and convolutional neural network publication-title: Expert Syst. Appl. – volume: 16 start-page: 56 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b86 article-title: Unsupervised adversarial domain adaptation for cross-domain face presentation attack detection publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2020.3002390 – start-page: 1 year: 2013 ident: 10.1016/j.inffus.2021.04.015_b136 article-title: Spoofing 2D face recognition systems with 3D masks – volume: 11 start-page: 713 issue: 4 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b57 article-title: Deep face liveness detection based on nonlinear diffusion using convolution neural network publication-title: Signal Image Video Process. doi: 10.1007/s11760-016-1014-2 – start-page: 1 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b89 article-title: Generalized presentation attack detection: A face anti-spoofing evaluation proposal – volume: 15 start-page: 42 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b119 article-title: Biometric face presentation attack detection with multi-channel convolutional neural network publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2019.2916652 – year: 2018 ident: 10.1016/j.inffus.2021.04.015_b96 – volume: 11 start-page: 2268 issue: 10 year: 2016 ident: 10.1016/j.inffus.2021.04.015_b18 article-title: Secure face unlock: Spoof detection on smartphones publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2016.2578288 – start-page: 557 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b114 article-title: Face anti-spoofing with human material perception – start-page: 1 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b141 article-title: Spoofing faces using makeup: An investigative study – volume: 128 start-page: 30 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b118 article-title: Multilevel fusing paired visible light and near-infrared spectral images for face anti-spoofing publication-title: Pattern Recognit. Lett. doi: 10.1016/j.patrec.2019.08.008 – year: 2019 ident: 10.1016/j.inffus.2021.04.015_b151 – volume: 52 start-page: 1 issue: 1 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b127 article-title: How generative adversarial networks and their variants work: An overview publication-title: ACM Comput. Surv. doi: 10.1145/3301282 – volume: 5 start-page: 48 issue: 1 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b56 article-title: Effect of feature selection with meta-heuristic optimization methods on face spoofing detection publication-title: J. Modern Technol. Eng. – year: 2020 ident: 10.1016/j.inffus.2021.04.015_b12 – volume: 1229 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b50 article-title: Face anti-spoofing using texture-based techniques and filtering methods publication-title: J. Phys. Conf. Ser. doi: 10.1088/1742-6596/1229/1/012044 – ident: 10.1016/j.inffus.2021.04.015_b44 doi: 10.1145/2976749.2978392 – start-page: 504 year: 2010 ident: 10.1016/j.inffus.2021.04.015_b52 article-title: Face liveness detection from a single image with sparse low rank bilinear discriminative model – start-page: 1 year: 2016 ident: 10.1016/j.inffus.2021.04.015_b138 article-title: The replay-mobile face presentation-attack database – ident: 10.1016/j.inffus.2021.04.015_b91 doi: 10.1109/CVPR42600.2020.00671 – volume: 9 start-page: 2264 issue: 12 year: 2014 ident: 10.1016/j.inffus.2021.04.015_b158 article-title: Biometrics evaluation under spoofing attacks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2014.2349158 – volume: 2 start-page: 15 issue: 1 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b147 article-title: Detection of age-induced makeup attacks on face recognition systems using multi-layer deep features publication-title: IEEE Trans. Biom. Behav. Identity Sci. doi: 10.1109/TBIOM.2019.2946175 – volume: 65 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b22 article-title: An extensive review on spectral imaging in biometric systems: Challenges & advancements publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2019.102660 – start-page: 1 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b140 article-title: On the vulnerability of extended multispectral face recognition systems towards presentation attacks – start-page: 1 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b146 article-title: 3dma: A multi-modality 3D mask face anti-spoofing database – ident: 10.1016/j.inffus.2021.04.015_b37 – start-page: 1 year: 2007 ident: 10.1016/j.inffus.2021.04.015_b160 article-title: Eyeblink-based anti-spoofing in face recognition from a generic webcamera – year: 2019 ident: 10.1016/j.inffus.2021.04.015_b34 – start-page: 3557 year: 2011 ident: 10.1016/j.inffus.2021.04.015_b69 article-title: Face liveness detection under bad illumination conditions – volume: 15 start-page: 42 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b51 article-title: Biometric face presentation attack detection with multi-channel convolutional neural network publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2019.2916652 – start-page: 1 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b104 article-title: Anomaly detection-based unknown face presentation attack detection – start-page: 3490 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b90 article-title: Domain agnostic feature learning for image and video based face anti-spoofing – start-page: 1 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b131 article-title: What you can’t see can help you-extended-range imaging for 3d-mask presentation attack detection – volume: 72 start-page: 39 year: 2018 ident: 10.1016/j.inffus.2021.04.015_b21 article-title: A survey of mobile face biometrics publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2018.09.005 – start-page: 1 year: 2011 ident: 10.1016/j.inffus.2021.04.015_b23 article-title: Face spoofing detection from single images using micro-texture analysis – start-page: 8464 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b98 article-title: Spoofing attack detection by anomaly detection – ident: 10.1016/j.inffus.2021.04.015_b161 – volume: 19 start-page: 4733 issue: 21 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b125 article-title: An identity authentication method combining liveness detection and face recognition publication-title: Sensors doi: 10.3390/s19214733 – ident: 10.1016/j.inffus.2021.04.015_b17 doi: 10.1007/978-3-030-01261-8_18 – volume: 98 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b35 article-title: A survey on 3D mask presentation attack detection and countermeasures publication-title: Pattern Recognit. doi: 10.1016/j.patcog.2019.107032 – start-page: 4244 year: 2016 ident: 10.1016/j.inffus.2021.04.015_b63 article-title: Generalized face anti-spoofing by detecting pulse from face videos – start-page: 1 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b79 article-title: A performance evaluation of convolutional neural networks for face anti spoofing – volume: 5 start-page: 441 issue: 3 year: 2010 ident: 10.1016/j.inffus.2021.04.015_b13 article-title: Plastic surgery: A new dimension to face recognition publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2010.2054083 – volume: 12 start-page: 1713 issue: 7 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b143 article-title: Detecting silicone mask-based presentation attack via deep dictionary learning publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2017.2676720 – ident: 10.1016/j.inffus.2021.04.015_b133 doi: 10.1109/CVPRW.2017.40 – volume: 9 start-page: 33 issue: 3–8 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b29 article-title: Presentation attack detection for face recognition on smartphones: A comprehensive review publication-title: J. Telecommun. Electron. Comput. Eng. – year: 2020 ident: 10.1016/j.inffus.2021.04.015_b83 article-title: NAS-FAS: Static-dynamic central difference network search for face anti-spoofing publication-title: IEEE Trans. Pattern Anal. Mach. Intell. – ident: 10.1016/j.inffus.2021.04.015_b62 doi: 10.1109/CVPRW.2018.00096 – volume: 53 start-page: 1 issue: 3 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b105 article-title: Generalizing from a few examples: A survey on few-shot learning publication-title: ACM Comput. Surv. doi: 10.1145/3386252 – volume: 7 start-page: 15 issue: 1 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b30 article-title: Deeply vulnerable: A study of the robustness of face recognition to presentation attacks publication-title: IET Biom. doi: 10.1049/iet-bmt.2017.0079 – ident: 10.1016/j.inffus.2021.04.015_b126 doi: 10.1109/CVPR.2019.00362 – volume: 164 start-page: 29 issue: 1 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b20 article-title: Techniques of face spoof detection: A review publication-title: Int. J. Comput. Appl. – volume: 10 start-page: 762 issue: 4 year: 2015 ident: 10.1016/j.inffus.2021.04.015_b58 article-title: Detection of face spoofing using visual dynamics publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2406533 – start-page: 1 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b110 article-title: Deep pixel-wise binary supervision for face presentation attack detection – volume: 15 start-page: 1261 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b49 article-title: Biometric presentation attack detection: Beyond the visible spectrum publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2019.2934867 – year: 2020 ident: 10.1016/j.inffus.2021.04.015_b106 – volume: 63 start-page: 273 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b71 article-title: CochleaNet: A robust language-independent audio-visual model for real-time speech enhancement publication-title: Inf. Fusion doi: 10.1016/j.inffus.2020.04.001 – ident: 10.1016/j.inffus.2021.04.015_b108 doi: 10.1109/CVPR.2018.00048 – volume: 28 start-page: 311 issue: 1 year: 2012 ident: 10.1016/j.inffus.2021.04.015_b159 article-title: A high performance fingerprint liveness detection method based on quality related features publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2010.11.024 – volume: vol. 34 start-page: 13583 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b40 article-title: On the robustness of face recognition algorithms against attacks and bias – year: 2018 ident: 10.1016/j.inffus.2021.04.015_b111 – ident: 10.1016/j.inffus.2021.04.015_b1 doi: 10.1016/j.inffus.2020.08.021 – volume: 10 start-page: 746 issue: 4 year: 2015 ident: 10.1016/j.inffus.2021.04.015_b16 article-title: Face spoof detection with image distortion analysis publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2400395 – ident: 10.1016/j.inffus.2021.04.015_b92 doi: 10.1109/CVPR.2019.01026 – ident: 10.1016/j.inffus.2021.04.015_b107 doi: 10.1109/CVPR.2019.00481 – start-page: 319 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b109 article-title: Face anti-spoofing using patch and depth-based CNNs – volume: 2016 year: 2016 ident: 10.1016/j.inffus.2021.04.015_b139 article-title: Design of an active multispectral swir camera system for skin detection and face verification publication-title: J. Sens. doi: 10.1155/2016/9682453 – volume: 100 start-page: 1677 issue: 4 year: 2018 ident: 10.1016/j.inffus.2021.04.015_b60 article-title: A novel face liveness detection algorithm with multiple liveness indicators publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-018-5661-1 – ident: 10.1016/j.inffus.2021.04.015_b155 doi: 10.1109/CVPRW.2018.00008 – ident: 10.1016/j.inffus.2021.04.015_b46 – start-page: 1 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b54 article-title: Custom silicone face masks: Vulnerability of commercial face recognition systems & presentation attack detection – volume: 72 start-page: 391 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b7 article-title: A survey of local feature methods for 3D face recognition publication-title: Pattern Recognit. doi: 10.1016/j.patcog.2017.08.003 – volume: 51 start-page: 1 issue: 3 year: 2018 ident: 10.1016/j.inffus.2021.04.015_b25 article-title: Deep learning for biometrics: A survey publication-title: ACM Comput. Surv. doi: 10.1145/3190618 – start-page: 641 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b94 article-title: Face anti-spoofing via disentangled representation learning – volume: 5 start-page: 83 issue: 2 year: 2016 ident: 10.1016/j.inffus.2021.04.015_b135 article-title: Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models publication-title: IET Biom. doi: 10.1049/iet-bmt.2014.0075 – start-page: 75 year: 2018 ident: 10.1016/j.inffus.2021.04.015_b97 article-title: On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing – volume: 28 issue: 4 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b70 article-title: Deep transfer across domains for face antispoofing publication-title: J. Electron. Imaging doi: 10.1117/1.JEI.28.4.043001 – volume: 15 start-page: 578 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b120 article-title: Attention-based two-stream convolutional networks for face spoofing detection publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2019.2922241 – volume: 24 start-page: 141 issue: 2 year: 2016 ident: 10.1016/j.inffus.2021.04.015_b68 article-title: Face antispoofing using speeded-up robust features and fisher vector encoding publication-title: IEEE Signal Process. Lett. – start-page: 1 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b124 article-title: Face anti-spoofing with generated near-infrared images publication-title: Multimedia Tools Appl. – volume: 2 start-page: 1530 year: 2014 ident: 10.1016/j.inffus.2021.04.015_b27 article-title: Biometric antispoofing methods: A survey in face recognition publication-title: IEEE Access doi: 10.1109/ACCESS.2014.2381273 – volume: 93 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b36 article-title: Face presentation attack detection in mobile scenarios: A comprehensive evaluation publication-title: Image Vis. Comput. doi: 10.1016/j.imavis.2019.11.004 – year: 2014 ident: 10.1016/j.inffus.2021.04.015_b15 – year: 2019 ident: 10.1016/j.inffus.2021.04.015_b53 – volume: 9 start-page: 305 issue: 12 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b64 article-title: Face liveness detection based on skin blood flow analysis publication-title: Symmetry doi: 10.3390/sym9120305 – volume: 7 start-page: 175429 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b157 article-title: Face presentation attack detection based on a statistical model of image noise publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2957273 – volume: 8 start-page: 369 issue: 6 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b77 article-title: Face liveness detection: Fusing colour texture feature and deep feature publication-title: IET Biom. doi: 10.1049/iet-bmt.2018.5235 – ident: 10.1016/j.inffus.2021.04.015_b93 doi: 10.1109/CVPR42600.2020.00851 – start-page: 1 year: 2018 ident: 10.1016/j.inffus.2021.04.015_b55 article-title: Spoofing deep face recognition with custom silicone masks – start-page: 1 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b99 article-title: Combining multiple one-class classifiers for anomaly based face spoofing attack detection – start-page: 391 year: 2012 ident: 10.1016/j.inffus.2021.04.015_b130 article-title: Can facial cosmetics affect the matching accuracy of face recognition systems? – ident: 10.1016/j.inffus.2021.04.015_b113 doi: 10.1109/CVPRW50498.2020.00333 – start-page: 000087 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b61 article-title: Anti-spoofing in face recognition with liveness detection using pupil tracking – volume: 29 start-page: 2063 issue: 6 year: 2018 ident: 10.1016/j.inffus.2021.04.015_b73 article-title: Applications of deep learning and reinforcement learning to biological data publication-title: IEEE Trans. Neural Netw. Learn. Syst. doi: 10.1109/TNNLS.2018.2790388 – start-page: 1 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b148 article-title: CASIA-SURF: A large-scale multi-modal benchmark for face anti-spoofing publication-title: IEEE Trans. Biom. Behav. Identity Sci. – start-page: 35 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b32 article-title: A review of face anti-spoofing and its applications in China – volume: 51 start-page: 1 issue: 5 year: 2018 ident: 10.1016/j.inffus.2021.04.015_b75 article-title: A survey on deep learning: Algorithms, techniques, and applications publication-title: ACM Comput. Surv. doi: 10.1145/3234150 – start-page: 70 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b153 article-title: CelebA-spoof: Large-scale face anti-spoofing dataset with rich annotations – volume: 22 start-page: 1 issue: 3 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b45 article-title: A general framework for adversarial examples with objectives publication-title: ACM Trans. Priv. Secur. doi: 10.1145/3317611 – volume: 9 issue: 7 year: 2014 ident: 10.1016/j.inffus.2021.04.015_b154 article-title: Recognizing disguised faces: Human and machine evaluation publication-title: PLoS One doi: 10.1371/journal.pone.0099212 – start-page: 1 year: 2013 ident: 10.1016/j.inffus.2021.04.015_b66 article-title: Context based face anti-spoofing – start-page: 165 year: 2016 ident: 10.1016/j.inffus.2021.04.015_b6 article-title: Face recognition systems under spoofing attacks – start-page: 1104 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b19 article-title: A comparative study on face spoofing attacks – ident: 10.1016/j.inffus.2021.04.015_b84 doi: 10.1109/ICB45273.2019.8987254 – volume: 33 start-page: 71 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b8 article-title: Overview of the combination of biometric matchers publication-title: Inf. Fusion doi: 10.1016/j.inffus.2016.05.003 – volume: 10 start-page: 797 issue: 4 year: 2015 ident: 10.1016/j.inffus.2021.04.015_b81 article-title: Person-specific face antispoofing with subject domain adaptation publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2403306 – start-page: 1 year: 2012 ident: 10.1016/j.inffus.2021.04.015_b26 article-title: 2d face liveness detection: An overview – ident: 10.1016/j.inffus.2021.04.015_b11 doi: 10.1109/CVPRW.2018.00010 – start-page: 1 year: 2012 ident: 10.1016/j.inffus.2021.04.015_b24 article-title: On the effectiveness of local binary patterns in face anti-spoofing – volume: 5 start-page: 13868 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b95 article-title: An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2729161 – volume: 2 start-page: 15 issue: 1 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b39 article-title: Detection of age-induced makeup attacks on face recognition systems using multi-layer deep features publication-title: IEEE Trans. Biom. Behav. Identity Sci. doi: 10.1109/TBIOM.2019.2946175 – start-page: 171 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b116 article-title: Presentation attack detection for face in mobile phones – volume: 66 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b163 article-title: Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2019.102746 – start-page: 26 year: 2012 ident: 10.1016/j.inffus.2021.04.015_b129 article-title: A face antispoofing database with diverse attacks – volume: 13 start-page: 1794 issue: 7 year: 2018 ident: 10.1016/j.inffus.2021.04.015_b145 article-title: Unsupervised domain adaptation for face anti-spoofing publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2018.2801312 – start-page: 207 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b33 article-title: Recent advances in face presentation attack detection – volume: 9 start-page: 661 issue: 4 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b150 article-title: Verifying the effectiveness of new face spoofing db with capture angle and distance publication-title: Electronics doi: 10.3390/electronics9040661 – volume: 1 start-page: 97 issue: 2 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b144 article-title: Recognizing disguised faces in the wild publication-title: IEEE Trans. Biom. Behav. Identity Sci. doi: 10.1109/TBIOM.2019.2903860 – ident: 10.1016/j.inffus.2021.04.015_b112 doi: 10.1109/CVPR42600.2020.00534 – ident: 10.1016/j.inffus.2021.04.015_b137 doi: 10.1109/CVPRW.2016.193 – ident: 10.1016/j.inffus.2021.04.015_b47 doi: 10.1109/CVPRW50498.2020.00415 – ident: 10.1016/j.inffus.2021.04.015_b156 doi: 10.1109/CVPR.2018.00048 – ident: 10.1016/j.inffus.2021.04.015_b4 doi: 10.1109/CVPR.2017.554 – start-page: 197 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b59 article-title: Liveness and threat aware selfie face recognition – start-page: 123 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b149 article-title: Large crowd collected facial anti-spoofing dataset – ident: 10.1016/j.inffus.2021.04.015_b101 – volume: 142 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b117 article-title: SLNet: Stereo face liveness detection via dynamic disparity-maps and convolutional neural network publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2019.113002 – start-page: 1 year: 2013 ident: 10.1016/j.inffus.2021.04.015_b38 article-title: Disguise detection and face recognition in visible and thermal spectrums – volume: 52 start-page: 187 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b48 article-title: A comprehensive overview of biometric fusion publication-title: Inf. Fusion doi: 10.1016/j.inffus.2018.12.003 – ident: 10.1016/j.inffus.2021.04.015_b65 doi: 10.1145/3345336.3345345 – start-page: 2672 year: 2014 ident: 10.1016/j.inffus.2021.04.015_b85 article-title: Generative adversarial nets – start-page: 1 year: 2013 ident: 10.1016/j.inffus.2021.04.015_b132 article-title: Automatic facial makeup detection with application in face recognition – start-page: 3320 year: 2014 ident: 10.1016/j.inffus.2021.04.015_b78 article-title: How transferable are features in deep neural networks? – start-page: 612 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b142 article-title: Oulu-npu: A mobile face presentation attack database with real-world variations – start-page: 1 year: 2018 ident: 10.1016/j.inffus.2021.04.015_b162 article-title: Unknown presentation attack detection with face RGB images – start-page: 192 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b87 article-title: Face anti-spoofing based on multi-layer domain adaptation – ident: 10.1016/j.inffus.2021.04.015_b100 doi: 10.1109/CVPRW.2019.00201 – start-page: 187 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b10 article-title: Introduction to face presentation attack detection – volume: 197 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b41 article-title: Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability publication-title: Comput. Vis. Image Underst. – start-page: 1584 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b123 article-title: Multi-modal face presentation attack detection via spatial and channel attentions – volume: 9 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b31 article-title: Insight on face liveness detection: A systematic literature review publication-title: Int. J. Electr. Comput. Eng. – start-page: 1 year: 2013 ident: 10.1016/j.inffus.2021.04.015_b67 article-title: Face liveness detection with component dependent descriptor – volume: 182 start-page: 73 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b3 article-title: Critical features for face recognition publication-title: Cognition doi: 10.1016/j.cognition.2018.09.002 – volume: 5 start-page: 31 issue: 2 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b2 article-title: Face spoofing and counter-spoofing: A survey of state-of-the-art algorithms publication-title: Trans. Mach. Learn. Artif. Intell. – volume: 108 start-page: 159 year: 2018 ident: 10.1016/j.inffus.2021.04.015_b76 article-title: LiveNet: Improving features generalization for face liveness detection using convolution neural networks publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2018.05.004 – year: 2014 ident: 10.1016/j.inffus.2021.04.015_b128 – volume: 406 start-page: 378 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b43 article-title: Evaluating facial recognition web services with adversarial and synthetic samples publication-title: Neurocomputing doi: 10.1016/j.neucom.2019.11.117 – year: 2020 ident: 10.1016/j.inffus.2021.04.015_b103 – volume: 387 start-page: 51 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b74 article-title: A novel statistical analysis and autoencoder driven intelligent intrusion detection approach publication-title: Neurocomputing doi: 10.1016/j.neucom.2019.11.016 – start-page: 1179 year: 2021 ident: 10.1016/j.inffus.2021.04.015_b152 article-title: Casia-surf cefa: A benchmark for multi-modal cross-ethnicity face anti-spoofing – volume: 143 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b9 article-title: A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2019.113114 – ident: 10.1016/j.inffus.2021.04.015_b115 doi: 10.1109/ICCVW.2019.00062 – start-page: 1 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b122 article-title: Research on liveness detection algorithms based on deep learning – volume: 72 start-page: 368 year: 2018 ident: 10.1016/j.inffus.2021.04.015_b14 article-title: How far did we get in face spoofing detection? publication-title: Eng. Appl. Artif. Intell. doi: 10.1016/j.engappai.2018.04.013 – start-page: 27 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b80 article-title: Transfer learning using convolutional neural networks for face anti-spoofing – start-page: 2852 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b102 article-title: Unseen face presentation attack detection with hypersphere loss – ident: 10.1016/j.inffus.2021.04.015_b42 – volume: 50 start-page: 1 issue: 1 year: 2017 ident: 10.1016/j.inffus.2021.04.015_b5 article-title: Presentation attack detection methods for face recognition systems: A comprehensive survey publication-title: ACM Comput. Surv. doi: 10.1145/3038924 – volume: 24 start-page: 1060 issue: 3 year: 2015 ident: 10.1016/j.inffus.2021.04.015_b134 article-title: Presentation attack detection for face recognition using light field camera publication-title: IEEE Trans. Image Process. doi: 10.1109/TIP.2015.2395951 – start-page: 1001 year: 2020 ident: 10.1016/j.inffus.2021.04.015_b88 article-title: Domain adaptation for generalization of face presentation attack detection in mobile settengs with minimal information – ident: 10.1016/j.inffus.2021.04.015_b28 doi: 10.1109/CVPRW.2014.22 – volume: 1 start-page: 238 issue: 4 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b121 article-title: Multispectral deep embeddings as a countermeasure to custom silicone mask presentation attacks publication-title: IEEE Trans. Biom. Behav. Identity Sci. doi: 10.1109/TBIOM.2019.2939421 – year: 2019 ident: 10.1016/j.inffus.2021.04.015_b82 article-title: Domain adaptation in multi-channel autoencoder based features for robust face anti-spoofing – start-page: 1 year: 2019 ident: 10.1016/j.inffus.2021.04.015_b72 article-title: Lip-reading driven deep learning approach for speech enhancement publication-title: IEEE Trans. Emerg. Top. Comput. Intell. |
SSID | ssj0017031 |
Score | 2.4587965 |
Snippet | Face Recognition is considered one of the most common biometric solutions these days and is widely used across a range of devices for various security... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 55 |
SubjectTerms | Deep learning Face Recognition Generalisation Presentation attacks |
Title | A review of state-of-the-art in Face Presentation Attack Detection: From early development to advanced deep learning and multi-modal fusion methods |
URI | https://dx.doi.org/10.1016/j.inffus.2021.04.015 |
Volume | 75 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6iFz2IT3wzB69x2ybZtt6W1WV9Ij7AW0nSRNZHu2i9-if8w2bSdlUQBU-lIVPSTJhH-OYbQnZ1ZFwYIELKtOCUx8xSlWhNIyNSTB9s4inzz867wxt-fCtup0i_rYVBWGVj-2ub7q11M9JpdrMzHo06V5h5RMhOglfUqaf-5DzGU773NoF5hMjP7jlTu12Ks9vyOY_xckq0r0jaHYWe8BSb4_7knr64nMECmW9iRejVy1kkU6ZYInNnE6LVl2Xy3oO6-ARKC744iJaWugmIeINRAQOpDVx81hgV0KsqqR_gwFQehVXsw-C5fAKDTMeQf2KIoCqhRQi4cTOGpsPEHcgiB49EpE9l7lbo_g6_XHejflkhN4PD6_6QNn0WqHYJQ0VlGkgrOUuUEVbFQiqtXVyXRFqw3NiEhyqXaZzLyARWmSCxsTPXErNqJYWK2CqZLsrCrBGQMrLc5MwFGi5WtFKFSguRs1QGOk0lWyes3d5MNyTk2AvjMWvRZvdZrZQMlZIFPHNKWSd0IjWuSTj-mB-3msu-HabM-YlfJTf-LblJZvGtLlPcItPV86vZdvFKpXb8gdwhM73-5ekFPo9OhucfirDvxw |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JTsMwELVQewAOiFXszIGr1TSOm4RbVagKtBUSReJm2Y6NCjSpIHwJP4wnSwEJgcTV8USOx5olfvOGkFPtGxcG8DZlmgc0CJmlKtKa-obHmD7YqKDMH407g7vg6p7fL5FeXQuDsMrK9pc2vbDW1Uir2s3WfDpt3WLm4SM7Cf6ijpH6s4nsVLxBmt3L68F4cZmAFO0FbWqnQ1GgrqArYF5Oj_YNebv9dsF5iv1xf_JQX7xOf52sVeEidMsVbZAlk26S1dGCa_V1i7x3oaw_gcxCUR9EM0vdBAS9wTSFvtQGbj7LjFLo5rnUT3Bu8gKIlZ5B_yWbgUGyY0g-YUSQZ1CDBNy4mUPVZOIBZJpAAUaksyxxK3Rfh28uG1K_bpO7_sWkN6BVqwWqXc6QUxl70sqARcpwq0IuldYutIt8zVlibBS0VSLjMJG-8awyXmRDZ7ElJtZKcuWzHdJIs9TsEpDSt4FJmIs1XLhopWorzXnCYunpOJZsj7B6e4WueMixHcazqAFnj6JUikClCC8QTil7hC6k5iUPxx_zw1pz4tt5Es5V_Cq5_2_JE7I8mIyGYng5vj4gK_ikrFo8JI385c0cufAlV8fV8fwANT7w4w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+review+of+state-of-the-art+in+Face+Presentation+Attack+Detection%3A+From+early+development+to+advanced+deep+learning+and+multi-modal+fusion+methods&rft.jtitle=Information+fusion&rft.au=Abdullakutty%2C+Faseela&rft.au=Elyan%2C+Eyad&rft.au=Johnston%2C+Pamela&rft.date=2021-11-01&rft.pub=Elsevier+B.V&rft.issn=1566-2535&rft.eissn=1872-6305&rft.volume=75&rft.spage=55&rft.epage=69&rft_id=info:doi/10.1016%2Fj.inffus.2021.04.015&rft.externalDocID=S1566253521000919 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1566-2535&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1566-2535&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1566-2535&client=summon |