Research Article

Face Spoof Attack Recognition Using Discriminative Image Patches

Figure 5

Examples of selected discriminative patches using proposed patches selection methods. Top row of (a)–(h), face from REPLAY-ATTACK database. Bottom row of (a)–(h), face from CASIA-FASD database. A normalized face image (a) of a subject and the discriminative selected patches using (b) CS, (c) DEND-CLUSTERING, (d) IPI, (e) IQA, (f) CP, (g) MAXDIST, and (h) DF methods.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)