6 research outputs found
Vulnerabilities of Facial Recognition and Countermeasures
Due to the developments in deep learning, the use of face recognition systems
started to spread rapidly. Face recognition systems, which are used for purposes such
as unlocking phones, entering our offices, or tracking citizens of states, also bring
several problems. Attackers can find a weakness of the face recognition systems and
avoid detection by facial recognition systems in various ways. Additionally attackers
may carry out an impersonation attack which is the act of tricking the system by
looking like an authorized person. In this research, basic building blocks of face
recognition algorithms, face recognition vulnerabilities, how the attacks occur and
what precautions can be taken are examined. It has been understood that it is
difficult to reach a generalizable result because of a variety of facial recognition
systems. In addition, attacks and countermeasures may differ according to the target
system.M.S. - Master Of Science Without Thesi
Enhanced Deep Learning Architectures for Face Liveness Detection for Static and Video Sequences
The major contribution of this research is the development of deep architectures
for face liveness detection on a static image as well as video sequences that use a
combination of texture analysis and deep Convolutional Neural Network (CNN) to
classify the captured image or video as real or fake. Face recognition is a popular and
efficient form of biometric authentication used in many software applications. One
drawback of this technique is that, it is prone to face spoofing attacks, where an
impostor can gain access to the system by presenting a photograph or recorded video of
a valid user to the sensor. Thus, face liveness detection is a critical preprocessing step in face recognition authentication systems. The first part of our research was on face
liveness detection on a static image, where we applied nonlinear diffusion based on an
additive operator splitting scheme and a tri-diagonal matrix block-solver algorithm to
the image, which enhances the edges and surface texture in the real image. The diffused image was then fed to a deep CNN to identify the complex and deep features for
classification. We obtained high accuracy on the NUAA Photograph Impostor dataset
using one of our enhanced architectures. In the second part of our research, we
developed an end-to-end real-time solution for face liveness detection on static images,
where instead of using a separate preprocessing step for diffusing the images, we used a combined architecture where the diffusion process and CNN were implemented in a
single step. This integrated approach gave promising results with two different
architectures, on the Replay-Attack and Replay-Mobile datasets. We also developed a
novel deep architecture for face liveness detection on video frames that uses the
diffusion of images followed by a deep CNN and Long Short-Term Memory (LSTM) to
classify the video sequence as real or fake. Performance evaluation of our architecture
on the Replay-Attack and Replay-Mobile datasets gave very competitive results. We
performed liveness detection on video sequences using diffusion and the Two-Stream
Inflated 3D ConvNet (I3D) architecture, and our experiments on the Replay-Attack and
Replay-Mobile datasets gave very good results
Conventional and Neural Architectures for Biometric Presentation Attack Detection
Facial biometrics, which enable an efficient and reliable method of person recognition, have been growing continuously as an active sub-area of computer vision. Automatic face recognition offers a natural and non-intrusive method for recognising users from their facial characteristics. However, facial recognition systems are vulnerable to presentation attacks (or spoofing attacks) when an attacker attempts to hide their true identity and masquerades as a valid user by misleading the biometric system. Thus, Facial Presentation Attack Detection (Facial PAD) (or facial antispoofing) techniques that aim to protect face recognition systems from such attacks, have been attracting more research attention in recent years. Various systems and algorithms have been proposed and evaluated. This thesis explores and compares some novel directions for detecting facial presentation attacks, including traditional features as well as approaches based on deep learning. In particular, different features encapsulating temporal information are developed and explored for describing the dynamic characteristics in presentation attacks. Hand-crafted features, deep neural architectures and their possible extensions are explored for their application in PAD. The proposed novel traditional features address the problem of modelling distinct representations of presentation attacks in the temporal domain and consider two possible branches: behaviour-level and texture-level temporal information. The behaviour-level feature is developed from a symbolic system that was widely used in psychological studies and automated emotion analysis. Other proposed traditional features aim to capture the distinct differences in image quality, shadings and skin reflections by using dynamic texture descriptors. This thesis then explores deep learning approaches using different pre-trained neural architectures with the aim of improving detection performance. In doing so, this thesis also explores visualisations of the internal representation of the networks to inform the further development of such approaches for improving performance and suggest possible new directions for future research. These directions include interpretable capability of deep learning approaches for PAD and a fully automatic system design capability in which the network architecture and parameters are determined by the available data. The interpretable capability can produce justifications for PAD decisions through both natural language and saliency map formats. Such systems can lead to further performance improvement through the use of an attention sub-network by learning from the justifications. Designing optimum deep neural architectures for PAD is still a complex problem that requires substantial effort from human experts. For this reason, the necessity of producing a system that can automatically design the neural architecture for a particular task is clear. A gradient-based neural architecture search algorithm is explored and extended through the development of different optimisation functions for designing the neural architectures for PAD automatically. These possible extensions of the deep learning approaches for PAD were evaluated using challenging benchmark datasets and the potential of the proposed approaches were demonstrated by comparing with the state-of-the-art techniques and published results. The proposed methods were evaluated and analysed using publicly available datasets. Results from the experiments demonstrate the usefulness of temporal information and the potential benefits of applying deep learning techniques for presentation attack detection. In particular, the use of explanations for improving usability and performance of deep learning PAD techniques and automatic techniques for the design of PAD neural architectures show considerable promise for future development