SOTAVerified

Face Anti-Spoofing

Facial anti-spoofing is the task of preventing false facial verification by using a photo, video, mask or a different substitute for an authorized person’s face. Some examples of attacks:

  • Print attack: The attacker uses someone’s photo. The image is printed or displayed on a digital device.

  • Replay/video attack: A more sophisticated way to trick the system, which usually requires a looped video of a victim’s face. This approach ensures behaviour and facial movements to look more ‘natural’ compared to holding someone’s photo.

  • 3D mask attack: During this type of attack, a mask is used as the tool of choice for spoofing. It’s an even more sophisticated attack than playing a face video. In addition to natural facial movements, it enables ways to deceive some extra layers of protection such as depth sensors.

( Image credit: Learning Generalizable and Identity-Discriminative Representations for Face Anti-Spoofing )

Papers

Showing 2130 of 204 papers

TitleStatusHype
A Multi-Modal Approach for Face Anti-Spoofing in Non-Calibrated Systems using Disparity Maps0
DiffFAS: Face Anti-Spoofing via Generative Diffusion ModelsCode1
Towards Data-Centric Face Anti-Spoofing: Improving Cross-domain Generalization via Physics-based Data SynthesisCode0
Time-Aware Face Anti-Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning0
Re-evaluation of Face Anti-spoofing Algorithm in Post COVID-19 Era Using Mask Based Occlusion Attack0
G^2V^2former: Graph Guided Video Vision Transformer for Face Anti-Spoofing0
Generalized Face Anti-spoofing via Finer Domain Partition and Disentangling Liveness-irrelevant FactorsCode0
Liveness Detection in Computer Vision: Transformer-based Self-Supervised Learning for Face Anti-Spoofing0
Advancing Cross-Domain Generalizability in Face Anti-Spoofing: Insights, Design, and Metrics0
Principles of Designing Robust Remote Face Anti-Spoofing Systems0
Show:102550
← PrevPage 3 of 21Next →

No leaderboard results yet.