Authors
Allan Pinto, Helio Pedrini, William Robson Schwartz, Anderson Rocha
Publication date
2015/8/11
Journal
IEEE Transactions on image processing
Volume
24
Issue
12
Pages
4726-4740
Publisher
IEEE
Description
Despite important recent advances, the vulnerability of biometric systems to spoofing attacks is still an open problem. Spoof attacks occur when impostor users present synthetic biometric samples of a valid user to the biometric system seeking to deceive it. Considering the case of face biometrics, a spoofing attack consists in presenting a fake sample (e.g., photograph, digital video, or even a 3D mask) to the acquisition sensor with the facial information of a valid user. In this paper, we introduce a low cost and software-based method for detecting spoofing attempts in face recognition systems. Our hypothesis is that during acquisition, there will be inevitable artifacts left behind in the recaptured biometric samples allowing us to create a discriminative signature of the video generated by the biometric sensor. To characterize these artifacts, we extract time-spectral feature descriptors from the video, which can be …
Total citations
2016201720182019202020212022202320244153235333023263
Scholar articles
A Pinto, H Pedrini, WR Schwartz, A Rocha - IEEE Transactions on image processing, 2015