10 research outputs found
ΠΠ΅ΡΠΎΡΠΌΠΈΡΡΡΡΠΈΠ΅ ΠΏΡΠ΅ΠΎΠ±ΡΠ°Π·ΠΎΠ²Π°Π½ΠΈΡ ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΠΉ ΠΈ ΠΈΡ ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΠΏΡΠΈ Π°ΡΠ³ΠΌΠ΅Π½ΡΠ°ΡΠΈΠΈ Π΄Π°Π½Π½ΡΡ Π΄Π»Ρ ΠΎΠ±ΡΡΠ΅Π½ΠΈΡ Π³Π»ΡΠ±ΠΎΠΊΠΈΡ Π½Π΅ΠΉΡΠΎΠ½Π½ΡΡ ΡΠ΅ΡΠ΅ΠΉ
The paper focuses on the improvement of the quality of learning for deep neural networks for a small data set in a classification task. One of the possible approaches to improve the quality of learning is researched which is based on the use of data augmentation (artificial reproduction of the data set) by image warping. The presented mathematical model and fast algorithm for warping make it possible to transform the original image while preserving its structural basis. The proposed algorithm is used to augment image data sets containing a small number of training samples. The augmentation consists of two stages including horizontal mirroring and warping of each of the samples. The effectiveness of such augmentation is tested through the training of neural networks of various types: convolutional neural networks (CNN) of a standard architecture and deep residual networks (DRN). A specific feature of the implemented approach for the solution of the problem under consideration consists in the refusal to use pre-trained neural networks with a large number of layers as well as further transfer learning, since their application incurs costs in terms of the computational resources. The paper shows that the efficiency of image classification when implementing the proposed method of augmenting training data on small and medium-sized data sets increases to statistically significant values of the metric used.ΠΡΠΎΠ²Π΅Π΄Π΅Π½Ρ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΠ΅ΠΉ Π°ΡΠ³ΠΌΠ΅Π½ΡΠ°ΡΠΈΠΈ (ΠΈΡΠΊΡΡΡΡΠ²Π΅Π½Π½ΠΎΠ³ΠΎ ΡΠ°Π·ΠΌΠ½ΠΎΠΆΠ΅Π½ΠΈΡ) ΠΎΠ±ΡΡΠ°ΡΡΠΈΡ
Π΄Π°Π½Π½ΡΡ
Π² Π·Π°Π΄Π°ΡΠ΅ ΠΊΠ»Π°ΡΡΠΈΡΠΈΠΊΠ°ΡΠΈΠΈ Ρ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅ΠΌ Π΄Π΅ΡΠΎΡΠΌΠΈΡΡΡΡΠΈΡ
ΠΏΡΠ΅ΠΎΠ±ΡΠ°Π·ΠΎΠ²Π°Π½ΠΈΠΉ ΠΎΠ±ΡΠ°Π±Π°ΡΡΠ²Π°Π΅ΠΌΡΡ
ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΠΉ. ΠΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½Ρ ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠ°Ρ ΠΌΠΎΠ΄Π΅Π»Ρ ΠΈ Π±ΡΡΡΡΠΎΠ΄Π΅ΠΉΡΡΠ²ΡΡΡΠΈΠΉ Π°Π»Π³ΠΎΡΠΈΡΠΌ Π²ΡΠΏΠΎΠ»Π½Π΅Π½ΠΈΡ Π΄Π΅ΡΠΎΡΠΌΠΈΡΡΡΡΠ΅Π³ΠΎ ΠΏΡΠ΅ΠΎΠ±ΡΠ°Π·ΠΎΠ²Π°Π½ΠΈΡ ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΡ, ΠΏΡΠΈ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠΈ ΠΊΠΎΡΠΎΡΡΡ
ΠΈΡΡ
ΠΎΠ΄Π½ΠΎΠ΅ ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΠ΅ ΠΏΡΠ΅ΠΎΠ±ΡΠ°Π·ΡΠ΅ΡΡΡ Ρ ΡΠΎΡ
ΡΠ°Π½Π΅Π½ΠΈΠ΅ΠΌ ΡΠ²ΠΎΠ΅ΠΉ ΡΡΡΡΠΊΡΡΡΠ½ΠΎΠΉ ΠΎΡΠ½ΠΎΠ²Ρ ΠΈ ΠΎΡΡΡΡΡΡΠ²ΠΈΠ΅ΠΌ ΠΊΡΠ°Π΅Π²ΡΡ
ΡΡΡΠ΅ΠΊΡΠΎΠ². ΠΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π½ΡΠΉ Π°Π»Π³ΠΎΡΠΈΡΠΌ ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΡΡΡ Π΄Π»Ρ Π°ΡΠ³ΠΌΠ΅Π½ΡΠ°ΡΠΈΠΈ Π½Π°Π±ΠΎΡΠΎΠ² ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΠΉ Π² Π·Π°Π΄Π°ΡΠ΅ ΠΊΠ»Π°ΡΡΠΈΡΠΈΠΊΠ°ΡΠΈΠΈ, ΡΠΎΠ΄Π΅ΡΠΆΠ°ΡΠΈΡ
ΠΎΡΠ½ΠΎΡΠΈΡΠ΅Π»ΡΠ½ΠΎ Π½Π΅Π±ΠΎΠ»ΡΡΠΎΠ΅ ΠΊΠΎΠ»ΠΈΡΠ΅ΡΡΠ²ΠΎ ΠΎΠ±ΡΡΠ°ΡΡΠΈΡ
ΠΏΡΠΈΠΌΠ΅ΡΠΎΠ². ΠΡΠ³ΠΌΠ΅Π½ΡΠ°ΡΠΈΡ ΠΈΡΡ
ΠΎΠ΄Π½ΠΎΠΉ Π²ΡΠ±ΠΎΡΠΊΠΈ ΠΎΡΡΡΠ΅ΡΡΠ²Π»ΡΠ΅ΡΡΡ Π² Π΄Π²Π° ΡΡΠ°ΠΏΠ°, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈΡ
Π·Π΅ΡΠΊΠ°Π»ΡΠ½ΠΎΠ΅ ΠΎΡΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΠ΅ ΠΈ Π΄Π΅ΡΠΎΡΠΌΠΈΡΡΡΡΠ΅Π΅ ΠΏΡΠ΅ΠΎΠ±ΡΠ°Π·ΠΎΠ²Π°Π½ΠΈΠ΅ ΠΊΠ°ΠΆΠ΄ΠΎΠ³ΠΎ ΠΈΡΡ
ΠΎΠ΄Π½ΠΎΠ³ΠΎ ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΡ. ΠΠ»Ρ ΠΏΡΠΎΠ²Π΅ΡΠΊΠΈ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΠΈ ΠΏΠΎΠ΄ΠΎΠ±Π½ΠΎΠΉ ΡΠ΅Ρ
Π½ΠΈΠΊΠΈ Π°ΡΠ³ΠΌΠ΅Π½ΡΠ°ΡΠΈΠΈ Π² ΡΡΠ°ΡΡΠ΅ ΠΏΡΠΎΠ²ΠΎΠ΄ΠΈΡΡΡ ΠΎΠ±ΡΡΠ΅Π½ΠΈΠ΅ Π½Π΅ΠΉΡΠΎΠ½Π½ΡΡ
ΡΠ΅ΡΠ΅ΠΉ β ΠΊΠ»Π°ΡΡΠΈΡΠΈΠΊΠ°ΡΠΎΡΠΎΠ² ΡΠ°Π·Π»ΠΈΡΠ½ΠΎΠ³ΠΎ Π²ΠΈΠ΄Π°: ΡΠ²Π΅ΡΡΠΎΡΠ½ΡΡ
ΡΠ΅ΡΠ΅ΠΉ ΡΡΠ°Π½Π΄Π°ΡΡΠ½ΠΎΠΉ Π°ΡΡ
ΠΈΡΠ΅ΠΊΡΡΡΡ (convolutional neural network, CNN) ΠΈ ΡΠ΅ΡΠ΅ΠΉ Ρ ΠΎΡΡΠ°ΡΠΎΡΠ½ΡΠΌΠΈ ΡΠ²ΡΠ·ΡΠΌΠΈ (deep residual network, DRN). ΠΡΠΎΠ±Π΅Π½Π½ΠΎΡΡΡΡ ΡΠ΅Π°Π»ΠΈΠ·ΡΠ΅ΠΌΠΎΠ³ΠΎ ΠΏΠΎΠ΄Ρ
ΠΎΠ΄Π° ΠΏΡΠΈ ΡΠ΅ΡΠ΅Π½ΠΈΠΈ ΡΠ°ΡΡΠΌΠ°ΡΡΠΈΠ²Π°Π΅ΠΌΠΎΠΉ Π·Π°Π΄Π°ΡΠΈ ΡΠ²Π»ΡΠ΅ΡΡΡ ΡΠ°ΠΊΠΆΠ΅ ΠΎΡΠΊΠ°Π· ΠΎΡ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ ΠΏΡΠ΅Π΄ΠΎΠ±ΡΡΠ΅Π½Π½ΡΡ
Π½Π΅ΠΉΡΠΎΠ½Π½ΡΡ
ΡΠ΅ΡΠ΅ΠΉ Ρ Π±ΠΎΠ»ΡΡΠΈΠΌ ΠΊΠΎΠ»ΠΈΡΠ΅ΡΡΠ²ΠΎΠΌ ΡΠ»ΠΎΠ΅Π² ΠΈ Π΄Π°Π»ΡΠ½Π΅ΠΉΡΠΈΠΌ ΠΏΠ΅ΡΠ΅Π½ΠΎΡΠΎΠΌ ΠΎΠ±ΡΡΠ΅Π½ΠΈΡ, ΠΏΠΎΡΠΊΠΎΠ»ΡΠΊΡ ΠΈΡ
ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ Π½Π΅ΡΠ΅Ρ Π·Π° ΡΠΎΠ±ΠΎΠΉ Π·Π°ΡΡΠ°ΡΡ Ρ ΡΠΎΡΠΊΠΈ Π·ΡΠ΅Π½ΠΈΡ ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΠΎΠ³ΠΎ Π²ΡΡΠΈΡΠ»ΠΈΡΠ΅Π»ΡΠ½ΠΎΠ³ΠΎ ΡΠ΅ΡΡΡΡΠ°. ΠΠΎΠΊΠ°Π·Π°Π½ΠΎ, ΡΡΠΎ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ ΠΊΠ»Π°ΡΡΠΈΡΠΈΠΊΠ°ΡΠΈΠΈ ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΠΉ ΠΏΡΠΈ ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΠΈ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π½ΠΎΠ³ΠΎ ΠΌΠ΅ΡΠΎΠ΄Π° Π°ΡΠ³ΠΌΠ΅Π½ΡΠ°ΡΠΈΠΈ ΠΎΠ±ΡΡΠ°ΡΡΠΈΡ
Π΄Π°Π½Π½ΡΡ
Π½Π° Π²ΡΠ±ΠΎΡΠΊΠ°Ρ
ΠΌΠ°Π»ΠΎΠ³ΠΎ ΠΈ ΡΡΠ΅Π΄Π½Π΅Π³ΠΎ ΠΎΠ±ΡΠ΅ΠΌΠ° ΠΏΠΎΠ²ΡΡΠ°Π΅ΡΡΡ Π΄ΠΎ ΡΡΠ°ΡΠΈΡΡΠΈΡΠ΅ΡΠΊΠΈ Π·Π½Π°ΡΠΈΠΌΡΡ
Π·Π½Π°ΡΠ΅Π½ΠΈΠΉ ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΠΎΠΉ ΠΌΠ΅ΡΡΠΈΠΊΠΈ
A Double Siamese Framework for Differential Morphing Attack Detection
Face morphing and related morphing attacks have emerged as a serious security threat for automatic face recognition systems and a challenging research field. Therefore, the availability of effective and reliable morphing attack detectors is strongly needed. In this paper, we proposed a framework based on a double Siamese architecture to tackle the morphing attack detection task in the differential scenario, in which two images, a trusted live acquired image and a probe image (morphed or bona fide) are given as the input for the system. In particular, the presented framework aimed to merge the information computed by two different modules to predict the final score. The first one was designed to extract information about the identity of the input faces, while the second module was focused on the detection of artifacts related to the morphing process. Experimental results were obtained through several and rigorous cross-dataset tests, exploiting three well-known datasets, namely PMDB, MorphDB, and AMSL, containing automatic and manually refined facial morphed images, showing that the proposed framework was able to achieve satisfying results
Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking
Morphing attacks have posed a severe threat to Face Recognition System (FRS).
Despite the number of advancements reported in recent works, we note serious
open issues such as independent benchmarking, generalizability challenges and
considerations to age, gender, ethnicity that are inadequately addressed.
Morphing Attack Detection (MAD) algorithms often are prone to generalization
challenges as they are database dependent. The existing databases, mostly of
semi-public nature, lack in diversity in terms of ethnicity, various morphing
process and post-processing pipelines. Further, they do not reflect a realistic
operational scenario for Automated Border Control (ABC) and do not provide a
basis to test MAD on unseen data, in order to benchmark the robustness of
algorithms. In this work, we present a new sequestered dataset for facilitating
the advancements of MAD where the algorithms can be tested on unseen data in an
effort to better generalize. The newly constructed dataset consists of facial
images from 150 subjects from various ethnicities, age-groups and both genders.
In order to challenge the existing MAD algorithms, the morphed images are with
careful subject pre-selection created from the contributing images, and further
post-processed to remove morphing artifacts. The images are also printed and
scanned to remove all digital cues and to simulate a realistic challenge for
MAD algorithms. Further, we present a new online evaluation platform to test
algorithms on sequestered data. With the platform we can benchmark the morph
detection performance and study the generalization ability. This work also
presents a detailed analysis on various subsets of sequestered data and
outlines open challenges for future directions in MAD research.Comment: This paper is a pre-print. The article is accepted for publication in
IEEE Transactions on Information Forensics and Security (TIFS
DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection
The free access to large-scale public databases, together with the fast
progress of deep learning techniques, in particular Generative Adversarial
Networks, have led to the generation of very realistic fake content with its
corresponding implications towards society in this era of fake news. This
survey provides a thorough review of techniques for manipulating face images
including DeepFake methods, and methods to detect such manipulations. In
particular, four types of facial manipulation are reviewed: i) entire face
synthesis, ii) identity swap (DeepFakes), iii) attribute manipulation, and iv)
expression swap. For each manipulation group, we provide details regarding
manipulation techniques, existing public databases, and key benchmarks for
technology evaluation of fake detection methods, including a summary of results
from those evaluations. Among all the aspects discussed in the survey, we pay
special attention to the latest generation of DeepFakes, highlighting its
improvements and challenges for fake detection.
In addition to the survey information, we also discuss open issues and future
trends that should be considered to advance in the field