699 research outputs found
Face Presentation Attack Detection in Learned Color-liked Space
Face presentation attack detection (PAD) has become a thorny problem for
biometric systems and numerous countermeasures have been proposed to address
it. However, majority of them directly extract feature descriptors and
distinguish fake faces from the real ones in existing color spaces (e.g. RGB,
HSV and YCbCr). Unfortunately, it is unknown for us which color space is the
best or how to combine different spaces together. To make matters worse, the
real and fake faces are overlapped in existing color spaces. So, in this paper,
a learned distinguishable color-liked space is generated to deal with the
problem of face PAD. More specifically, we present an end-to-end deep learning
network that can map existing color spaces to a new learned color-liked space.
Inspired by the generator of generative adversarial network (GAN), the proposed
network consists of a space generator and a feature extractor. When training
the color-liked space, a new triplet combination mechanism of points-to-center
is explored to maximize interclass distance and minimize intraclass distance,
and also keep a safe margin between the real and presented fake faces.
Extensive experiments on two standard face PAD databases, i.e., Relay-Attack
and OULU-NPU, indicate that our proposed color-liked space analysis based
countermeasure significantly outperforms the state-of-the-art methods and show
excellent generalization capability
Improving Face Anti-Spoofing by 3D Virtual Synthesis
Face anti-spoofing is crucial for the security of face recognition systems.
Learning based methods especially deep learning based methods need large-scale
training samples to reduce overfitting. However, acquiring spoof data is very
expensive since the live faces should be re-printed and re-captured in many
views. In this paper, we present a method to synthesize virtual spoof data in
3D space to alleviate this problem. Specifically, we consider a printed photo
as a flat surface and mesh it into a 3D object, which is then randomly bent and
rotated in 3D space. Afterward, the transformed 3D photo is rendered through
perspective projection as a virtual sample. The synthetic virtual samples can
significantly boost the anti-spoofing performance when combined with a proposed
data balancing strategy. Our promising results open up new possibilities for
advancing face anti-spoofing using cheap and large-scale synthetic data.Comment: Accepted to ICB 201
Learning Generalizable and Identity-Discriminative Representations for Face Anti-Spoofing
Face anti-spoofing (a.k.a presentation attack detection) has drawn growing
attention due to the high-security demand in face authentication systems.
Existing CNN-based approaches usually well recognize the spoofing faces when
training and testing spoofing samples display similar patterns, but their
performance would drop drastically on testing spoofing faces of unseen scenes.
In this paper, we try to boost the generalizability and applicability of these
methods by designing a CNN model with two major novelties. First, we propose a
simple yet effective Total Pairwise Confusion (TPC) loss for CNN training,
which enhances the generalizability of the learned Presentation Attack (PA)
representations. Secondly, we incorporate a Fast Domain Adaptation (FDA)
component into the CNN model to alleviate negative effects brought by domain
changes. Besides, our proposed model, which is named Generalizable Face
Authentication CNN (GFA-CNN), works in a multi-task manner, performing face
anti-spoofing and face recognition simultaneously. Experimental results show
that GFA-CNN outperforms previous face anti-spoofing approaches and also well
preserves the identity information of input face images.Comment: 8 pages; 8 figures; 4 table
3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Face presentation attacks have become a major threat to face recognition
systems and many countermeasures have been proposed in the past decade.
However, most of them are devoted to 2D face presentation attacks, rather than
3D face masks. Unlike the real face, the 3D face mask is usually made of resin
materials and has a smooth surface, resulting in reflectance differences. So,
we propose a novel detection method for 3D face mask presentation attack by
modeling reflectance differences based on intrinsic image analysis. In the
proposed method, the face image is first processed with intrinsic image
decomposition to compute its reflectance image. Then, the intensity
distribution histograms are extracted from three orthogonal planes to represent
the intensity differences of reflectance images between the real face and 3D
face mask. After that, the 1D convolutional network is further used to capture
the information for describing different materials or surfaces react
differently to changes in illumination. Extensive experiments on the 3DMAD
database demonstrate the effectiveness of our proposed method in distinguishing
a face mask from the real one and show that the detection performance
outperforms other state-of-the-art methods
Deep convolutional neural networks for face and iris presentation attack detection: Survey and case study
Biometric presentation attack detection is gaining increasing attention.
Users of mobile devices find it more convenient to unlock their smart
applications with finger, face or iris recognition instead of passwords. In
this paper, we survey the approaches presented in the recent literature to
detect face and iris presentation attacks. Specifically, we investigate the
effectiveness of fine tuning very deep convolutional neural networks to the
task of face and iris antispoofing. We compare two different fine tuning
approaches on six publicly available benchmark datasets. Results show the
effectiveness of these deep models in learning discriminative features that can
tell apart real from fake biometric images with very low error rate.
Cross-dataset evaluation on face PAD showed better generalization than state of
the art. We also performed cross-dataset testing on iris PAD datasets in terms
of equal error rate which was not reported in literature before. Additionally,
we propose the use of a single deep network trained to detect both face and
iris attacks. We have not noticed accuracy degradation compared to networks
trained for only one biometric separately. Finally, we analyzed the learned
features by the network, in correlation with the image frequency components, to
justify its prediction decision.Comment: A preprint of a paper accepted by IET Biometrics journal and is
subject to Institution of Engineering and Technology Copyrigh
Learning Generalized Spoof Cues for Face Anti-spoofing
Many existing face anti-spoofing (FAS) methods focus on modeling the decision
boundaries for some predefined spoof types. However, the diversity of the spoof
samples including the unknown ones hinders the effective decision boundary
modeling and leads to weak generalization capability. In this paper, we
reformulate FAS in an anomaly detection perspective and propose a
residual-learning framework to learn the discriminative live-spoof differences
which are defined as the spoof cues. The proposed framework consists of a spoof
cue generator and an auxiliary classifier. The generator minimizes the spoof
cues of live samples while imposes no explicit constraint on those of spoof
samples to generalize well to unseen attacks. In this way, anomaly detection is
implicitly used to guide spoof cue generation, leading to discriminative
feature learning. The auxiliary classifier serves as a spoof cue amplifier and
makes the spoof cues more discriminative. We conduct extensive experiments and
the experimental results show the proposed method consistently outperforms the
state-of-the-art methods. The code will be publicly available at
https://github.com/vis-var/lgsc-for-fas.Comment: 16 page
Discriminative Representation Combinations for Accurate Face Spoofing Detection
Three discriminative representations for face presentation attack detection
are introduced in this paper. Firstly we design a descriptor called spatial
pyramid coding micro-texture (SPMT) feature to characterize local appearance
information. Secondly we utilize the SSD, which is a deep learning framework
for detection, to excavate context cues and conduct end-to-end face
presentation attack detection. Finally we design a descriptor called template
face matched binocular depth (TFBD) feature to characterize stereo structures
of real and fake faces. For accurate presentation attack detection, we also
design two kinds of representation combinations. Firstly, we propose a
decision-level cascade strategy to combine SPMT with SSD. Secondly, we use a
simple score fusion strategy to combine face structure cues (TFBD) with local
micro-texture features (SPMT). To demonstrate the effectiveness of our design,
we evaluate the representation combination of SPMT and SSD on three public
datasets, which outperforms all other state-of-the-art methods. In addition, we
evaluate the representation combination of SPMT and TFBD on our dataset and
excellent performance is also achieved.Comment: To be published in Pattern Recognitio
Face Spoofing Detection by Fusing Binocular Depth and Spatial Pyramid Coding Micro-Texture Features
Robust features are of vital importance to face spoofing detection, because
various situations make feature space extremely complicated to partition. Thus
in this paper, two novel and robust features for anti-spoofing are proposed.
The first one is a binocular camera based depth feature called Template Face
Matched Binocular Depth (TFBD) feature. The second one is a high-level
micro-texture based feature called Spatial Pyramid Coding Micro-Texture (SPMT)
feature. Novel template face registration algorithm and spatial pyramid coding
algorithm are also introduced along with the two novel features. Multi-modal
face spoofing detection is implemented based on these two robust features.
Experiments are conducted on a widely used dataset and a comprehensive dataset
constructed by ourselves. The results reveal that face spoofing detection with
the fusion of our proposed features is of strong robustness and time
efficiency, meanwhile outperforming other state-of-the-art traditional methods.Comment: 5 pages, 2 figures, accepted by 2017 IEEE International Conference on
Image Processing (ICIP
Face De-Spoofing: Anti-Spoofing via Noise Modeling
Many prior face anti-spoofing works develop discriminative models for
recognizing the subtle differences between live and spoof faces. Those
approaches often regard the image as an indivisible unit, and process it
holistically, without explicit modeling of the spoofing process. In this work,
motivated by the noise modeling and denoising algorithms, we identify a new
problem of face de-spoofing, for the purpose of anti-spoofing: inversely
decomposing a spoof face into a spoof noise and a live face, and then utilizing
the spoof noise for classification. A CNN architecture with proper constraints
and supervisions is proposed to overcome the problem of having no ground truth
for the decomposition. We evaluate the proposed method on multiple face
anti-spoofing databases. The results show promising improvements due to our
spoof noise modeling. Moreover, the estimated spoof noise provides a
visualization which helps to understand the added spoof noise by each spoof
medium.Comment: To appear in ECCV 2018. The first two authors contributed equally to
this wor
On the Learning of Deep Local Features for Robust Face Spoofing Detection
Biometrics emerged as a robust solution for security systems. However, given
the dissemination of biometric applications, criminals are developing
techniques to circumvent them by simulating physical or behavioral traits of
legal users (spoofing attacks). Despite face being a promising characteristic
due to its universality, acceptability and presence of cameras almost
everywhere, face recognition systems are extremely vulnerable to such frauds
since they can be easily fooled with common printed facial photographs.
State-of-the-art approaches, based on Convolutional Neural Networks (CNNs),
present good results in face spoofing detection. However, these methods do not
consider the importance of learning deep local features from each facial
region, even though it is known from face recognition that each facial region
presents different visual aspects, which can also be exploited for face
spoofing detection. In this work we propose a novel CNN architecture trained in
two steps for such task. Initially, each part of the neural network learns
features from a given facial region. Afterwards, the whole model is fine-tuned
on the whole facial images. Results show that such pre-training step allows the
CNN to learn different local spoofing cues, improving the performance and the
convergence speed of the final model, outperforming the state-of-the-art
approaches
- …