How far did we get in face spoofing detection?
Loading...
External sources
External sources
Date
Advisor
Coadvisor
Graduate program
Undergraduate course
Journal Title
Journal ISSN
Volume Title
Publisher
Elsevier B.V.
Type
Article
Access right
Acesso aberto

External sources
External sources
Abstract
The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks. In this paper, an extensive analysis on face spoofing detection works published in the last decade is presented. The analyzed works are categorized by their fundamental parts, i.e., descriptors and classifiers. This structured survey also brings a comparative performance analysis of the works considering the most important public data sets in the field. The methodology followed in this work is particularly relevant to observe temporal evolution of the field, trends in the existing approaches, to discuss still opened issues, and to propose new perspectives for the future of face spoofing detection.
Description
Keywords
Face spoofing, Face recognition, Survey, Spoofing attack
Language
English
Citation
Engineering Applications Of Artificial Intelligence. Oxford: Pergamon-elsevier Science Ltd, v. 72, p. 368-381, 2018.




