Abstract:
We faced the problem of detecting 2-D face spoofing attacks performed by placing a printed photo of a real user in front of the camera. For this type of attack it is not ...Show MoreMetadata
Abstract:
We faced the problem of detecting 2-D face spoofing attacks performed by placing a printed photo of a real user in front of the camera. For this type of attack it is not possible to relay just on the face movements as a clue of vitality because the attacker can easily simulate such a case, and also because real users often show a “low vitality” during the authentication session. In this paper, we perform both video and static analysis in order to employ complementary information about motion, texture and liveness and consequently to obtain a more robust classification.
Published in: 2011 International Joint Conference on Biometrics (IJCB)
Date of Conference: 11-13 October 2011
Date Added to IEEE Xplore: 29 December 2011
ISBN Information: