Logo des Repositoriums
 

Spoofing 2D face recognition systems with 3D masks

dc.contributor.authorErdogmus, Nesli
dc.contributor.authorMarcel, Sébastien
dc.contributor.editorBrömme, Arslan
dc.contributor.editorBusch, Christoph
dc.date.accessioned2018-10-31T12:33:58Z
dc.date.available2018-10-31T12:33:58Z
dc.date.issued2013
dc.description.abstractVulnerability to spoofing attacks is a serious drawback for many biometric systems. Among all biometric traits, face is the one that is exposed to the most serious threat, since it is exceptionally easy to access. The limited work on fraud detection capabilities for face mainly shapes around 2D attacks forged by displaying printed photos or replaying recorded videos on mobile devices. A significant portion of this work is based on the flatness of the facial surface in front of the sensor. In this study, we complicate the spoofing problem further by introducing the 3rd dimension and examine possible 3D attack instruments. A small database is constructed with six different types of 3D facial masks and experimented on to determine the right direction to study 3D attacks. Spoofing performance for each type of mask is assessed and analysed thoroughly using two Gabor-wavelet-based algorithms.en
dc.identifier.isbn978-3-88579-606-0
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/17670
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofBIOSIG 2013
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-212
dc.titleSpoofing 2D face recognition systems with 3D masksen
dc.typeText/Conference Paper
gi.citation.endPage216
gi.citation.publisherPlaceBonn
gi.citation.startPage209
gi.conference.date04.-06. September 2013
gi.conference.locationDarmstadt
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
209.pdf
Größe:
76.28 KB
Format:
Adobe Portable Document Format