%Aigaion2 BibTeX export from Idiap Publications
%Saturday 21 December 2024 05:00:35 PM

@ARTICLE{George_ACCESS_2023,
         author = {George, Anjith and Marcel, S{\'{e}}bastien},
       projects = {Idiap},
          title = {Attacking Face Recognition with T-shirts: Database, Vulnerability Assessment and Detection},
        journal = {IEEE Access},
           year = {2023},
       crossref = {George_Idiap-RR-08-2023},
            pdf = {https://publications.idiap.ch/attachments/papers/2023/George_ACCESS_2023.pdf}
}



crossreferenced publications: 
@TECHREPORT{George_Idiap-RR-08-2023,
         author = {George, Anjith and Marcel, S{\'{e}}bastien},
       projects = {Idiap},
          month = {11},
          title = {Attacking Face Recognition with T-shirts: Database, Vulnerability Assessment and Detection},
           type = {Idiap-RR},
         number = {Idiap-RR-08-2023},
           year = {2023},
    institution = {Idiap},
       abstract = {Face recognition systems are widely deployed for biometric authentication. Despite this, it is well-known that, without any safeguards, face recognition systems are highly vulnerable to presentation attacks. In response to this security issue, several promising methods for detecting presentation attacks have been proposed which show high performance on existing benchmarks. However, an ongoing challenge is the generalization of presentation attack detection methods to unseen and new attack types. To this end, we propose a new T-shirt Face Presentation Attack (TFPA) database of 1,608 T-shirt attacks using 100 unique presentation attack instruments. In an extensive evaluation, we show that this type of attack can compromise the security of face recognition systems and that some state-of-the-art attack detection mechanisms trained on popular benchmarks fail to robustly generalize to the new attacks. Further, we propose three new methods for detecting T-shirt attack images, one which relies on the statistical differences between depth maps of bona fide images and T-shirt attacks, an anomaly detection approach trained on features only extracted from bona fide RGB images, and a fusion approach which achieves competitive detection performance.},
            pdf = {https://publications.idiap.ch/attachments/reports/2023/George_Idiap-RR-08-2023.pdf}
}