Face Anti-Spoofing

66 papers with code • 8 benchmarks • 17 datasets

Facial anti-spoofing is the task of preventing false facial verification by using a photo, video, mask or a different substitute for an authorized person’s face. Some examples of attacks:

  • Print attack: The attacker uses someone’s photo. The image is printed or displayed on a digital device.

  • Replay/video attack: A more sophisticated way to trick the system, which usually requires a looped video of a victim’s face. This approach ensures behaviour and facial movements to look more ‘natural’ compared to holding someone’s photo.

  • 3D mask attack: During this type of attack, a mask is used as the tool of choice for spoofing. It’s an even more sophisticated attack than playing a face video. In addition to natural facial movements, it enables ways to deceive some extra layers of protection such as depth sensors.

( Image credit: Learning Generalizable and Identity-Discriminative Representations for Face Anti-Spoofing )

Libraries

Use these libraries to find Face Anti-Spoofing models and implementations
2 papers
15,465
2 papers
5,023
See all 9 libraries.

Most implemented papers

Enhancing Mobile Face Anti-Spoofing: A Robust Framework for Diverse Attack Types under Screen Flash

chaochao-lin/atr-fas 29 Aug 2023

In this paper, we propose an attack type robust face anti-spoofing framework under light flash, called ATR-FAS.

S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing with Statistical Tokens

FaceOnLive/Face-Liveness-Detection-SDK-Linux 7 Sep 2023

Face Anti-Spoofing (FAS) aims to detect malicious attempts to invade a face recognition system by presenting spoofed faces.

FLIP: Cross-domain Face Anti-spoofing with Language Guidance

koushiksrivats/flip ICCV 2023

Specifically, we show that aligning the image representation with an ensemble of class descriptions (based on natural language semantics) improves FAS generalizability in low-data regimes.

Domain-Generalized Face Anti-Spoofing with Unknown Attacks

ai-application-and-integration-lab/dgua_fas 18 Oct 2023

Although face anti-spoofing (FAS) methods have achieved remarkable performance on specific domains or attack types, few studies have focused on the simultaneous presence of domain changes and unknown attacks, which is closer to real application scenarios.

Cross-Database Liveness Detection: Insights from Comparative Biometric Analysis

ZamDimon/liveness-detection 29 Jan 2024

In an era where biometric security serves as a keystone of modern identity verification systems, ensuring the authenticity of these biometric samples is paramount.

SHIELD : An Evaluation Benchmark for Face Spoofing and Forgery Detection with Multimodal Large Language Models

laiyingxin2/shield 6 Feb 2024

For the face forgery detection task, we evaluate GAN-based and diffusion-based data with both visual and acoustic modalities.

face anti-spoofing based on color texture analysis

coderwangson/Face-anti-spoofing-based-on-color-texture-analysis 19 Nov 2015

Research on face spoofing detection has mainly been focused on analyzing the luminance of the face images, hence discarding the chrominance information which can be useful for discriminating fake faces from genuine ones.

Face De-Spoofing: Anti-Spoofing via Noise Modeling

yaojieliu/ECCV2018-FaceDeSpoofing ECCV 2018

In this work, motivated by the noise modeling and denoising algorithms, we identify a new problem of face de-spoofing, for the purpose of anti-spoofing: inversely decomposing a spoof face into a spoof noise and a live face, and then utilizing the spoof noise for classification.

Exploiting temporal and depth information for multi-frame face anti-spoofing

laoshiwei/face-anti-spoofing 13 Nov 2018

Face anti-spoofing is significant to the security of face recognition systems.

Learning Generalizable and Identity-Discriminative Representations for Face Anti-Spoofing

tungdt92/GFA-CNN 17 Jan 2019

Face anti-spoofing (a. k. a presentation attack detection) has drawn growing attention due to the high-security demand in face authentication systems.