We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Techniques of Face Spoof Detection: A Review

by Ramandeep Kaur, P. S. Mann
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 1
Year of Publication: 2017
Authors: Ramandeep Kaur, P. S. Mann
10.5120/ijca2017913569

Ramandeep Kaur, P. S. Mann . Techniques of Face Spoof Detection: A Review. International Journal of Computer Applications. 164, 1 ( Apr 2017), 29-33. DOI=10.5120/ijca2017913569

@article{ 10.5120/ijca2017913569,
author = { Ramandeep Kaur, P. S. Mann },
title = { Techniques of Face Spoof Detection: A Review },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 1 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number1/27449-2017913569/ },
doi = { 10.5120/ijca2017913569 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:04.929342+05:30
%A Ramandeep Kaur
%A P. S. Mann
%T Techniques of Face Spoof Detection: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 1
%P 29-33
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

To automatically recognition of face is wide used in several applications like authentication of mobile payment. Automatic face recognition has raised issues concerning face spoof attacks (biometric sensor presentation attacks), in which a photograph or video of an authorized person’s face will be used to gain access.There are variety of face spoof detection techniques are proposed, their generalization ability has not been adequately addressed. The intention of this paper is to review and acknowledge numerous face detection ways and to sort them into totally different classes.

References
  1. B. E. Boser, I. M. Guyon, and V. N. Vapnik, 1992. “A training algorithm for optimal margin classifiers,” in Proc. 5th ACM Workshop on Computational Learning Theory.
  2. P. Marziliano, F. Dufaux, S. Winkler and T. Ebrahimi, 2002 “A no-reference perceptual blur metric,” in Proc. ICIP, vol. 3.
  3. R. Tan and K. Ikeuchi, Feb. 2005.“Separating reflection components of textured surfaces using a single image”. IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 2, pp. 178–193.
  4. Y. Chen, Z. Li, M. Li, and W.-Y. Ma, 2006 “Automatic classification of photographs and graphics,” in Proc. ICME .
  5. K. Kollreider, H. Fronthaler, M. I. Faraj, and J. Bigun, 2007. “Real-time face detection and motion analysis with application in “liveness” assessment,” IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 548–558.
  6. W. Bao, H. Li ,N. Li, and W. Jiang,2009. “A liveness detection method for face recognition based on optical flow field,” in Proc. IASP.
  7. C. Zhang, F. Nie, and S. Xiang, 2010.“A general kernelization framework for learning algorithms based on kernel PCA,” Neurocomputing, vol. 73,no. 4–6, pp. 959 – 967.
  8. Q. Yang, S. Wang, and N. Ahuja,2010. “Real-time specular highlight removal using bilateral filtering,” in Proc. ECCV.
  9. X. Gao, T.-T. Ng, B. Qiu, and S.-F. Chang, 2010. “Single-view recaptured image detection based on physics-based features,” in Proc. ICME.
  10. Z. Zhang, D. Yi, Z. Lei, and S. Z. Li ,2011.“Face liveness detection by learning multispectral reflectance distributions,” in Proc. pp. 436–441. FG.
  11. J.-F. Lalonde, A. A. Efros, and S. G. Narasimhan, 2011. “Estimating the natural illumination conditions from a single outdoor image,” Int. J. Comput. Vision, vol. 98, no. 2, pp. 123 – 145.
  12. A. Anjos and S. Marcel 2011. “Counter-measures to photo attacks in face recognition: A public database and a baseline,” in Proc. IJCB.
  13. H. Han, S. Shan, X. Chen S. Lao, and W. Gao, 2012.“ Separability oriented preprocessing for illumination-insensitive face recognition,” in Proc. ECCV.
  14. N. Kose and J.-l. Dugelay, 2012.“Classification of captured and recaptured images to detect photograph spoofing,” in Proc. ICIEV.
  15. T. de Freitas Pereira, A. Anjos, J. M. De Martino, and S. Marcel, 2012.“ LBP-TOP based countermeasure against face spoofing attacks,” in Proc. ACCV Workshops.
  16. V. Christlein, C. Riess,E. Angelopoulou, G. Evangelopoulos, and I. Kakadiaris, 2013. “The impact of specular highlights on 3D-2D face recognition,” in Proc. SPIE.
  17. S. Bharadwaj, T. I. Dhamecha, M. Vatsa, and R. Singh,2013. “Computationally efficient face spoofing detection with motion magnification,” in Proc.CVPR Workshops. IEEE Trans. Image Process. vol. 23, no. 2, pp. 710–724.
  18. J. Yang and S. Z. Li,2013. “Face Liveness Detection with Component Dependent Descriptor,” in Proc. IJCB, pp. 1–6.
  19. C. Hou, F. Nie, C. Zhang, D. Yi, and Y. Wu, 2014. “Multiple rank multi-linear SVM for matrix data classification,” Pattern Recognition, vol. 47, no. 1, pp. 454 – 469.
  20. J. Galbally, S. Marcel, and J. Fierrez, 2014.“Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition,” IEEE Trans. Image Process. vol. 23, no. 2, pp. 710–724.
  21. Di Wen, Hu Han, and Anil K. Jain, 2015.” Face Spoof Detection with Image Distortion Analysis”, IEEE Transactions on information Forensics and Security, Vol. 4No. 3.
Index Terms

Computer Science
Information Sciences

Keywords

Face recognition spoof detection image distortion analysis and svm classifier.