Face recognition systems under spoofing attacks

68Citations
Citations of this article
35Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this chapter, we give an overview of spoofing attacks and spoofing countermeasures for face recognition systems, with a focus on visual spectrum systems (VIS) in 2D and 3D, as well as near-infrared (NIR) and multispectral systems. We cover the existing types of spoofing attacks and report on their success to bypass several state-of-the-art face recognition systems. The results on two different face spoofing databases in VIS and one newly developed face spoofing database in NIR show that spoofing attacks present a significant security risk for face recognition systems in any part of the spectrum. The risk is partially reduced when using multispectral systems. We also give a systematic overview of the existing anti-spoofing techniques, with an analysis of their advantages and limitations and prospective for future work.

Cite

CITATION STYLE

APA

Chingovska, I., Erdogmus, N., Anjos, A., & Marcel, S. (2016). Face recognition systems under spoofing attacks. In Face Recognition Across the Imaging Spectrum (pp. 165–194). Springer International Publishing. https://doi.org/10.1007/978-3-319-28501-6_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free