Learn More
Research on face spoofing detection has mainly been focused on analyzing the luminance of the face images, hence discarding the chrominance information which can be useful for discriminating fake faces from genuine ones. In this work, we propose a new face anti-spoofing method based on color texture analysis. We analyze the joint color-texture information(More)
Research on non-intrusive software-based face spoofing detection schemes has been mainly focused on the analysis of the luminance information of the face images, hence discarding the chroma component, which can be very useful for discriminating fake faces from genuine ones. This paper introduces a novel and appealing approach for detecting face spoofing(More)
This work aims to propose an efficient hardware/software system fo guassian mixture model (GMM) parts-based topology modeling for face identification and verification. Following its great success in speaker recognition, The GMM approach was extended to face recognition providing a good trade-off in terms of complexity, performance and robustness. Despite(More)
Audiovisual speech synchrony detection is an important liveness check for talking face verification systems in order to make sure that the input biometric samples are actually acquired from the same source. In prior work, the used visual speech features have been mainly describing facial appearance or mouth shape in frame-wise manner, thus ignoring the lip(More)
The I-vector approach to speaker recognition has become the prevalent paradigm overt he past 2y ears, showing top performance in NIST evaluations. This success is due mainly to the capability of the I-vector to capture and compress the speaker characteristics at lowd imension and the subsequent channel compensation techniques that minimize channel(More)
We propose a simple yet efficient approach to face authentication using local binary patterns (LBP) and histogram adaptation. First, a generic face model is constructed as the LBP histogram extracted from the face images of different users. Then, MAP adaptation technique is applied to obtain the user-specific LBP histogram using the generic model as a(More)
The vulnerabilities of face biometric authentication systems to spoofing attacks have received a significant attention during the recent years. Some of the proposed countermeasures have achieved impressive results when evaluated on intratests, i.e., the system is trained and tested on the same database. Unfortunately, most of these techniques fail to(More)
Nowadays, under controlled conditions the speaker verification systems based on the GMM-UBM paradigm show very good performance. However, in forensic investigation activities the conditions; in which recordings are acquired; are uncontrollable, a naive use of the baseline GMM-UBM system without feature normalization, model transformation and score(More)