Salian et al., 2024 - Google Patents
Computer Vision and Deep Learning-Based Model for Detecting Spoofed Faces in ImagesSalian et al., 2024
- Document ID
- 16085637140312674548
- Author
- Salian G
- Rao M
- Rashmi M
- Publication year
- Publication venue
- International Conference on Data Science and Network Engineering
External Links
Snippet
In the modern era of smart applications, video data is critically important in various contexts. In most of these applications, cameras are frequently incorporated to facilitate authentication. As a result, face recognition is the biometric method most frequently …
- 238000000034 method 0 abstract description 43
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6256—Obtaining sets of training patterns; Bootstrap methods, e.g. bagging, boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/4671—Extracting features based on salient regional features, e.g. Scale Invariant Feature Transform [SIFT] keypoints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
- G06K9/32—Aligning or centering of the image pick-up or image-field
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Peng et al. | Face presentation attack detection using guided scale texture | |
Deb et al. | Look locally infer globally: A generalizable face anti-spoofing approach | |
WO2022161286A1 (en) | Image detection method, model training method, device, medium, and program product | |
Wang et al. | Face manipulation detection via auxiliary supervision | |
Sun et al. | A face spoofing detection method based on domain adaptation and lossless size adaptation | |
Das et al. | Facial spoof detection using support vector machine | |
Hashemifard et al. | A compact deep learning model for face spoofing detection | |
Solomon | Face anti-spoofing and deep learning based unsupervised image recognition systems | |
Saadi et al. | Image Fake News Prediction Based on Random Forest and Gradient-boosting Methods | |
Liu et al. | Face detection and encryption for privacy preserving in surveillance video | |
Sabri et al. | An effective facial spoofing detection approach based on weighted deep ensemble learning | |
Ibrahim et al. | Improving Face Presentation Attack Detection Through Deformable Convolution and Transfer Learning | |
El-Rashidy et al. | A novel texture descriptor using machine learning for face anti-spoofing detection | |
Latha et al. | Image Forgery Detection Using Machine Learning | |
Elloumi et al. | Anti-spoofing in face recognition: deep learning and image quality assessment-based approaches | |
Salian et al. | Computer Vision and Deep Learning-Based Model for Detecting Spoofed Faces in Images | |
Koppikar et al. | Face liveness detection to overcome spoofing attacks in face recognition system | |
Raheem et al. | Statistical analysis of image quality measures for face liveness detection | |
Peng et al. | POSTER: non-intrusive face spoofing detection based on guided filtering and image quality analysis | |
Lubna et al. | Detecting Fake Image: A Review for Stopping Image Manipulation | |
van der Haar | Real-time face antispoofing using Shearlets | |
Wang et al. | Explore and Enhance the Generalization of Anomaly DeepFake Detection | |
Kou et al. | Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks | |
Lakshminarasimha et al. | Deep learning base face anti spoofing-convolutional restricted basis neural network technique | |
Alshammari | E-passport security systems and attack implications |