Skip to main content

Research Repository

Advanced Search

Designing a facial spoofing database for processed image attacks (2016)
Conference Proceeding
Omar, L., & Ivrissimtzis, I. (2016). Designing a facial spoofing database for processed image attacks. In 7th International Conference on Imaging for Crime Detection and Prevention (ICDP 2016) : Madrid, Spain, 23-25 November 2016 ; proceedings. https://doi.org/10.1049/ic.2016.0073

Face recognition systems are used for user authentication in everyday applications such as logging into a laptop or smartphone without need to memorize a password. However, they are still vulnerable to spoofing attacks, as for example when an imposte... Read More about Designing a facial spoofing database for processed image attacks.

Resilience of Luminance based Liveness Tests under Attacks with Processed Imposter Images (2016)
Conference Proceeding
Omar, L., & Ivrissimtzis, I. (2016). Resilience of Luminance based Liveness Tests under Attacks with Processed Imposter Images. In V. Skala (Ed.),

Liveness tests are techniques employed by face recognition authentication systems, aiming at verifying that a live face rather than a photo is standing in front of the system camera. In this paper, we study the resilience of a standard liveness test... Read More about Resilience of Luminance based Liveness Tests under Attacks with Processed Imposter Images.

Evaluating the Resilience of Face Recognition Systems Against Malicious Attacks (2015)
Conference Proceeding
Omar, L., & Ivrissimtzis, I. (2015). Evaluating the Resilience of Face Recognition Systems Against Malicious Attacks. In X. Xie, M. W. Jones, & G. K. L. Tam (Eds.), Proceedings of the 7th UK Computer Vision Student Workshop (BMVW) (5.1-5.9). https://doi.org/10.5244/c.29.bmvw.5

This paper presents an experiment designed to test the resilience of several user verification systems based on face recognition technology against simple identity spoofing methods, such as trying to gain access to the system by using mobile camera s... Read More about Evaluating the Resilience of Face Recognition Systems Against Malicious Attacks.