Affiliation:
1. Computing, Macquarie University, Sydney, Australia
2. Locii Innovation Pty Ltd, Sydney, Australia
Abstract
Identity authentication is the process of verifying one’s identity. Many identity authentication methods have been developed, from the conventional username-password systems to the recent electroencephalography-based authentication. Among them, biometric authentication shows particular importance due to its convenience and wide application in real-world scenarios. Face recognition is one of the most widely used biometric authentication methods, but simultaneously it receives various attacks. To overcome attacks, face presentation attack detection has been intensively studied in the last two decades regarding diverse domains of datasets, evaluation methods, and attack types. In this systematic literature review, we identify and categorise the state-of-the-art approaches in each domain to cover the challenges and solutions in a single place. We provide comparisons of representative methods on widely used datasets, discuss their pros and cons, and hope our insights can inspire future works.
Publisher
Association for Computing Machinery (ACM)
Reference106 articles.
1. 2021. What is the Difference between Validation Verification and ... - Experian. Retrieved September 16 2024 from https://www.experian.co.uk/blogs/latest-thinking/fraud-prevention/what-is-the-difference-between-validation-verification-and-authentication/
2. Face anti-spoofing using Haralick features
3. Deep learning based face liveness detection in videos
4. Mustafa Alahmid. 2020. Face Recognition System and Calculating FRR Far and EER for Biometric System Evaluation + Code. Retrieved September 16 2024 from https://medium.com/@mustafaazzurri/face-recognition-system-and-calculating-frrfar-and-eer-for-biometric-system-evaluation-code-2ac2bd4fd2e5
5. Counter-measures to photo attacks in face recognition: A public database and a baseline
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献