Research Article
Face Spoof Attack Recognition Using Discriminative Image Patches
Figure 5
Examples of selected discriminative patches using proposed patches selection methods. Top row of (a)–(h), face from REPLAY-ATTACK database. Bottom row of (a)–(h), face from CASIA-FASD database. A normalized face image (a) of a subject and the discriminative selected patches using (b) CS, (c) DEND-CLUSTERING, (d) IPI, (e) IQA, (f) CP, (g) MAXDIST, and (h) DF methods.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |
| (g) |
| (h) |