Face Anti-spoofing, Face Presentation Attack Detection
Yaojie Liu, Joel Stehouwer, Amin Jourabloo, Yousef Atoum, Xiaoming LiuBiometrics utilize physiological, such as fingerprint, face, and iris, or behavioral characteristics, such as typing rhythm and gait, to uniquely identify or authenticate an individual. As biometric systems are widely used in real-world applications including mobile phone authentication and access control, biometric spoof, or Presentation Attack (PA) are becoming a ...
Continue readingKeywords: Face Antispoofing, Biometrics, Low-level Vision, Database