Table of Content

Open Access iconOpen Access

REVIEW

crossmark

A Survey on Face Anti-Spoofing Algorithms

by Meigui Zhang, Kehui Zeng, Jinwei Wang

Nanjing University of Information Science and Technology, Nanjing, 210044, China

* Corresponding Author: Meigui Zhang. Email: email

Journal of Information Hiding and Privacy Protection 2020, 2(1), 21-34. https://doi.org/10.32604/jihpp.2020.010467

Abstract

The development of artificial intelligence makes the application of face recognition more and more extensive, which also leads to the security of face recognition technology increasingly prominent. How to design a face anti-spoofing method with high accuracy, strong generalization ability and meeting practical needs is the focus of current research. This paper introduces the research progress of face anti-spoofing algorithm, and divides the existing face anti-spoofing methods into two categories: methods based on manual feature expression and methods based on deep learning. Then, the typical algorithms included in them are classified twice, and the basic ideas, advantages and disadvantages of these algorithms are analyzed. Finally, the methods of face anti-spoofing are summarized, and the existing problems and future prospects are expounded.

Keywords


Cite This Article

APA Style
Zhang, M., Zeng, K., Wang, J. (2020). A survey on face anti-spoofing algorithms. Journal of Information Hiding and Privacy Protection, 2(1), 21-34. https://doi.org/10.32604/jihpp.2020.010467
Vancouver Style
Zhang M, Zeng K, Wang J. A survey on face anti-spoofing algorithms. J Inf Hiding Privacy Protection . 2020;2(1):21-34 https://doi.org/10.32604/jihpp.2020.010467
IEEE Style
M. Zhang, K. Zeng, and J. Wang, “A Survey on Face Anti-Spoofing Algorithms,” J. Inf. Hiding Privacy Protection , vol. 2, no. 1, pp. 21-34, 2020. https://doi.org/10.32604/jihpp.2020.010467



cc Copyright © 2020 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 3371

    View

  • 4032

    Download

  • 0

    Like

Share Link