297 research outputs found
Deep Learning for Face Anti-Spoofing: A Survey
Face anti-spoofing (FAS) has lately attracted increasing attention due to its
vital role in securing face recognition systems from presentation attacks
(PAs). As more and more realistic PAs with novel types spring up, traditional
FAS methods based on handcrafted features become unreliable due to their
limited representation capacity. With the emergence of large-scale academic
datasets in the recent decade, deep learning based FAS achieves remarkable
performance and dominates this area. However, existing reviews in this field
mainly focus on the handcrafted features, which are outdated and uninspiring
for the progress of FAS community. In this paper, to stimulate future research,
we present the first comprehensive review of recent advances in deep learning
based FAS. It covers several novel and insightful components: 1) besides
supervision with binary label (e.g., '0' for bonafide vs. '1' for PAs), we also
investigate recent methods with pixel-wise supervision (e.g., pseudo depth
map); 2) in addition to traditional intra-dataset evaluation, we collect and
analyze the latest methods specially designed for domain generalization and
open-set FAS; and 3) besides commercial RGB camera, we summarize the deep
learning applications under multi-modal (e.g., depth and infrared) or
specialized (e.g., light field and flash) sensors. We conclude this survey by
emphasizing current open issues and highlighting potential prospects.Comment: IEEE Transactions on Pattern Analysis and Machine Intelligence
(TPAMI
Restrictive Voting Technique for Faces Spoofing Attack
Face anti-spoofing has become widely used due to the increasing use of biometric authentication systems that rely on facial recognition. It is a critical issue in biometric authentication systems that aim to prevent unauthorized access. In this paper, we propose a modified version of majority voting that ensembles the votes of six classifiers for multiple video chunks to improve the accuracy of face anti-spoofing. Our approach involves sampling sub-videos of 2 seconds each with a one-second overlap and classifying each sub-video using multiple classifiers. We then ensemble the classifications for each sub-video across all classifiers to decide the complete video classification. We focus on the False Acceptance Rate (FAR) metric to highlight the importance of preventing unauthorized access. We evaluated our method using the Replay Attack dataset and achieved a zero FAR. We also reported the Half Total Error Rate (HTER) and Equal Error Rate (EER) and gained a better result than most state-of-the-art methods. Our experimental results show that our proposed method significantly reduces the FAR, which is crucial for real-world face anti-spoofing applications
Learning One Class Representations for Face Presentation Attack Detection using Multi-channel Convolutional Neural Networks
Face recognition has evolved as a widely used biometric modality. However,
its vulnerability against presentation attacks poses a significant security
threat. Though presentation attack detection (PAD) methods try to address this
issue, they often fail in generalizing to unseen attacks. In this work, we
propose a new framework for PAD using a one-class classifier, where the
representation used is learned with a Multi-Channel Convolutional Neural
Network (MCCNN). A novel loss function is introduced, which forces the network
to learn a compact embedding for bonafide class while being far from the
representation of attacks. A one-class Gaussian Mixture Model is used on top of
these embeddings for the PAD task. The proposed framework introduces a novel
approach to learn a robust PAD system from bonafide and available (known)
attack classes. This is particularly important as collecting bonafide data and
simpler attacks are much easier than collecting a wide variety of expensive
attacks. The proposed system is evaluated on the publicly available WMCA
multi-channel face PAD database, which contains a wide variety of 2D and 3D
attacks. Further, we have performed experiments with MLFP and SiW-M datasets
using RGB channels only. Superior performance in unseen attack protocols shows
the effectiveness of the proposed approach. Software, data, and protocols to
reproduce the results are made available publicly.Comment: 15 page
Face Recognition: Issues, Methods and Alternative Applications
Face recognition, as one of the most successful applications of image analysis, has recently gained significant attention. It is due to availability of feasible technologies, including mobile solutions. Research in automatic face recognition has been conducted since the 1960s, but the problem is still largely unsolved. Last decade has provided significant progress in this area owing to advances in face modelling and analysis techniques. Although systems have been developed for face detection and tracking, reliable face recognition still offers a great challenge to computer vision and pattern recognition researchers. There are several reasons for recent increased interest in face recognition, including rising public concern for security, the need for identity verification in the digital world, face analysis and modelling techniques in multimedia data management and computer entertainment. In this chapter, we have discussed face recognition processing, including major components such as face detection, tracking, alignment and feature extraction, and it points out the technical challenges of building a face recognition system. We focus on the importance of the most successful solutions available so far. The final part of the chapter describes chosen face recognition methods and applications and their potential use in areas not related to face recognition
- …