{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T05:54:07Z","timestamp":1721195647484},"reference-count":14,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Electrical and Computer Engineering"],"published-print":{"date-parts":[[2016]]},"abstract":"Face recognition systems are now being used in many applications such as border crossings, banks, and mobile payments. The wide scale deployment of facial recognition systems has attracted intensive attention to the reliability of face biometrics against spoof attacks, where a photo, a video, or a 3D mask of a genuine user\u2019s face can be used to gain illegitimate access to facilities or services. Though several face antispoofing or liveness detection methods (which determine at the time of capture whether a face is live or spoof) have been proposed, the issue is still unsolved due to difficulty in finding discriminative and computationally inexpensive features and methods for spoof attacks. In addition, existing techniques use whole face image or complete video for liveness detection. However, often certain face regions (video frames) are redundant or correspond to the clutter in the image (video), thus leading generally to low performances. Therefore, we propose seven novel methods to find discriminative image patches, which we define as regions that are salient, instrumental, and class-specific. Four well-known classifiers, namely, support vector machine (SVM), Naive-Bayes, Quadratic Discriminant Analysis (QDA), and Ensemble, are then used to distinguish between genuine and spoof faces using a voting based scheme. Experimental analysis on two publicly available databases (Idiap REPLAY-ATTACK and CASIA-FASD) shows promising results compared to existing works.<\/jats:p>","DOI":"10.1155\/2016\/4721849","type":"journal-article","created":{"date-parts":[[2016,5,23]],"date-time":"2016-05-23T11:36:17Z","timestamp":1464003377000},"page":"1-14","source":"Crossref","is-referenced-by-count":29,"title":["Face Spoof Attack Recognition Using Discriminative Image Patches"],"prefix":"10.1155","volume":"2016","author":[{"given":"Zahid","family":"Akhtar","sequence":"first","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Udine, Via delle Scienze 206, 33100 Udine, Italy"}]},{"given":"Gian Luca","family":"Foresti","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Udine, Via delle Scienze 206, 33100 Udine, Italy"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2015.116"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2292332"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2011.0009"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2007.05.004"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9313-3"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2406533"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.11.012"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-015-0822-0"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1117\/1.2401138"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2002.807363"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2013.2293423"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.167"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/tmi.2006.891486"}],"container-title":["Journal of Electrical and Computer Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2016\/4721849.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2016\/4721849.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2016\/4721849.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T12:11:51Z","timestamp":1469535111000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/jece\/2016\/4721849\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":14,"alternative-id":["4721849","4721849"],"URL":"https:\/\/doi.org\/10.1155\/2016\/4721849","relation":{},"ISSN":["2090-0147","2090-0155"],"issn-type":[{"value":"2090-0147","type":"print"},{"value":"2090-0155","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}