DepthFake: Spoofing 3D Face Authentication with a 2D Photo.
Zhihao WuYushi ChengJiahui YangXiaoyu JiWenyuan XuPublished in: SP (2023)
Keyphrases
- biometric authentication
- face recognition
- facial expressions
- biometric systems
- human faces
- stereo vision
- recognition algorithm
- face images
- authentication scheme
- identity authentication
- authentication protocol
- biometric data
- pose estimation
- key distribution
- principal component analysis
- identity management
- feature points
- face model
- d objects
- three dimensional
- integrity verification
- image authentication
- security analysis
- security mechanisms
- face detection
- feature extraction
- image sequences