%Aigaion2 BibTeX export from Idiap Publications %Thursday 21 November 2024 12:41:37 PM @ARTICLE{Erdogmus_IEEETIFS_2014, author = {Erdogmus, Nesli and Marcel, S{\'{e}}bastien}, projects = {Idiap, TABULA RASA}, month = jul, title = {Spoofing Face Recognition with 3D Masks}, journal = {IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY}, year = {2014}, pages = {1084-1097}, issn = {1556-6013}, doi = {10.1109/TIFS.2014.2322255}, abstract = {Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still an open security issue in biometrics domain and among all biometric traits, face is exposed to the most serious threat, since it is particularly easy to access and reproduce. In the literature, many different types of face spoofing attacks have been examined and various algorithms have been proposed to detect them. Mainly focusing on 2D attacks forged by displaying printed photos or replaying recorded videos on mobile devices, a significant portion of these studies ground their arguments on the flatness of the spoofing material in front of the sensor. However, with the advancements in 3D reconstruction and printing technologies, this assumption can no longer be maintained. In this paper, we aim to inspect the spoofing potential of subject-specific 3D facial masks for different recognition systems and address the detection problem of this more complex attack type. In order to assess the spoofing performance of 3D masks against 2D, 2.5D and 3D face recognition and to analyse various texture based countermeasures using both 2D and 2.5D data, a parallel study with comprehensive experiments is performed on two datasets: The Morpho database which is not publicly available and the newly distributed 3D mask attack database.}, pdf = {https://publications.idiap.ch/attachments/papers/2014/Erdogmus_IEEETIFS_2014.pdf} }