<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
	<record>
		<datafield tag="980" ind1=" " ind2=" ">
			<subfield code="a">ARTICLE</subfield>
		</datafield>
		<datafield tag="970" ind1=" " ind2=" ">
			<subfield code="a">Heusch_TBIOM_2020/IDIAP</subfield>
		</datafield>
		<datafield tag="245" ind1=" " ind2=" ">
			<subfield code="a">Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks</subfield>
		</datafield>
		<datafield tag="700" ind1=" " ind2=" ">
			<subfield code="a">Heusch, Guillaume</subfield>
		</datafield>
		<datafield tag="700" ind1=" " ind2=" ">
			<subfield code="a">George, Anjith</subfield>
		</datafield>
		<datafield tag="700" ind1=" " ind2=" ">
			<subfield code="a">Geissbuhler, David</subfield>
		</datafield>
		<datafield tag="700" ind1=" " ind2=" ">
			<subfield code="a">Mostaani, Zohreh</subfield>
		</datafield>
		<datafield tag="700" ind1=" " ind2=" ">
			<subfield code="a">Marcel, Sébastien</subfield>
		</datafield>
		<datafield tag="856" ind1="4" ind2="0">
			<subfield code="i">EXTERNAL</subfield>
			<subfield code="u">http://publications.idiap.ch/attachments/papers/2020/Heusch_TBIOM_2020.pdf</subfield>
			<subfield code="x">PUBLIC</subfield>
		</datafield>
		<datafield tag="773" ind1=" " ind2=" ">
			<subfield code="p">IEEE Transactions on Biometrics, Behavior, and Identity Science</subfield>
		</datafield>
		<datafield tag="260" ind1=" " ind2=" ">
			<subfield code="c">2020</subfield>
		</datafield>
		<datafield tag="520" ind1=" " ind2=" ">
			<subfield code="a">This paper addresses the problem of face presentation attack detection using different image modalities. In particular, the usage
of short wave infrared (SWIR) imaging is considered. 
  Face presentation attack detection is performed using recent models based on Convolutional Neural Networks 
  using only carefully selected SWIR image differences as input. Conducted experiments show superior performance over similar models
acting on either color images or on a combination of different modalities (visible, NIR, thermal and depth), as well as on a SVM-based classifier 
acting on SWIR image differences. Experiments have been carried on a new public and freely available database, 
containing a wide variety of attacks. 
Video sequences have been recorded thanks to several
sensors resulting in 14 different streams in the visible, NIR, SWIR and thermal spectra, as well as depth data.
The best proposed approach is able to almost perfectly detect all impersonation attacks while ensuring low \bona classification
errors. On the other hand, obtained results show that obfuscation attacks are more difficult to detect. We hope that the proposed
database will foster research on this challenging problem. 
Finally, all the code and instructions to reproduce presented
experiments is made available to the research community.</subfield>
		</datafield>
	</record>
</collection>