• English
  • Deutsch
  • Log In
    Password Login
    or
  • Research Outputs
  • Projects
  • Researchers
  • Institutes
  • Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Artikel
  4. Real Masks and Spoof Faces: On the Masked Face Presentation Attack Detection
 
  • Details
  • Full
Options
2022
Journal Article
Titel

Real Masks and Spoof Faces: On the Masked Face Presentation Attack Detection

Abstract
Face masks have become one of the main methods for reducing the transmission of COVID-19. This makes face recognition (FR) a challenging task because masks hide several discriminative features of faces. Moreover, face presentation attack detection (PAD) is crucial to ensure the security of FR systems. In contrast to the growing number of masked FR studies, the impact of face masked attacks on PAD has not been explored. Therefore, we present novel attacks with real face masks placed on presentations and attacks with subjects wearing masks to reflect the current real-world situation. Furthermore, this study investigates the effect of masked attacks on PAD performance by using seven state-of-the-art PAD algorithms under different experimental settings. We also evaluate the vulnerability of FR systems to masked attacks. The experiments show that real masked attacks pose a serious threat to the operation and security of FR systems.
Author(s)
Fang, Meiling
Fraunhofer-Institut für Graphische Datenverarbeitung IGD
Damer, Naser
Fraunhofer-Institut für Graphische Datenverarbeitung IGD
Kirchbuchner, Florian orcid-logo
Fraunhofer-Institut für Graphische Datenverarbeitung IGD
Kuijper, Arjan orcid-logo
Fraunhofer-Institut für Graphische Datenverarbeitung IGD
Zeitschrift
Pattern recognition
Project(s)
ATHENE
Funder
Bundesministerium für Bildung und Forschung BMBF (Deutschland)
Thumbnail Image
DOI
10.1016/j.patcog.2021.108398
Language
English
google-scholar
Fraunhofer-Institut für Graphische Datenverarbeitung IGD
Tags
  • Lead Topic: Digitized Work

  • Lead Topic: Visual Computing as a Service

  • Research Line: Computer vision (CV)

  • Research Line: Human computer interaction (HCI)

  • Research Line: Machine Learning (ML)

  • biometrics

  • face recognition

  • spoofing attacks

  • deep learning

  • performance evaluation

  • CRISP

  • ATHENE

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Send Feedback
© 2022