Design Face Spoof Detection using Deep Learning

Pranavi Thiruchelvam, Sayanthan Sathiyarasah, Thushaliny Paranthaman, Rajeetha Thaneeshan
{"title":"Design Face Spoof Detection using Deep Learning","authors":"Pranavi Thiruchelvam, Sayanthan Sathiyarasah, Thushaliny Paranthaman, Rajeetha Thaneeshan","doi":"10.1109/ICEPECC57281.2023.10209524","DOIUrl":null,"url":null,"abstract":"The recognition of facial patterns has grown in popularity among the various biometric systems in recent years. As a result, there has been a significant advancement in this field. The security of such systems, however, may be of paramount concern given that numerous studies have shown that face recognition systems are susceptible to a number of threats, including spoofing attacks. When a biometric system is used to identify unauthorized users, spoofing refers to the capacity to trick the system into thinking the unauthorized user is the real deal by using a variety of methods to show a fake version of the original biometric attribute to sensing objects. A number of anti-spoofing techniques that do exist protects face spoofing. This study presents a simple and efficient Resnet18 Convolutional Neural Network (CNN) model architecture, which is more beneficial and produces greater accuracy than other handcrafted, machine learning and pre trained Models. This proposed system has three steps such as analyzing possible enhancements to features, loading photographs and their predictions, and face verification of real or spoofs in an image. We have proposed the model using publicly available challenging CASIA dataset. Wrap photo, cut photo, and electronic screen are three numerous varieties of images that capture real people’s faces. The input video split into picture frames in this step. Experimental results demonstrated that proposed approached outperforms similar approaches by showed a 99.12 percentage of real detection accuracy and a 98.20 percentage of spoof detection accuracy. The results of the experiments demonstrate that our proposed detection system indicates a higher results of detection rate rather than earlier used techniques.","PeriodicalId":102289,"journal":{"name":"2023 International Conference on Energy, Power, Environment, Control, and Computing (ICEPECC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Energy, Power, Environment, Control, and Computing (ICEPECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEPECC57281.2023.10209524","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The recognition of facial patterns has grown in popularity among the various biometric systems in recent years. As a result, there has been a significant advancement in this field. The security of such systems, however, may be of paramount concern given that numerous studies have shown that face recognition systems are susceptible to a number of threats, including spoofing attacks. When a biometric system is used to identify unauthorized users, spoofing refers to the capacity to trick the system into thinking the unauthorized user is the real deal by using a variety of methods to show a fake version of the original biometric attribute to sensing objects. A number of anti-spoofing techniques that do exist protects face spoofing. This study presents a simple and efficient Resnet18 Convolutional Neural Network (CNN) model architecture, which is more beneficial and produces greater accuracy than other handcrafted, machine learning and pre trained Models. This proposed system has three steps such as analyzing possible enhancements to features, loading photographs and their predictions, and face verification of real or spoofs in an image. We have proposed the model using publicly available challenging CASIA dataset. Wrap photo, cut photo, and electronic screen are three numerous varieties of images that capture real people’s faces. The input video split into picture frames in this step. Experimental results demonstrated that proposed approached outperforms similar approaches by showed a 99.12 percentage of real detection accuracy and a 98.20 percentage of spoof detection accuracy. The results of the experiments demonstrate that our proposed detection system indicates a higher results of detection rate rather than earlier used techniques.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用深度学习设计人脸欺骗检测
近年来,人脸识别在各种生物识别系统中越来越受欢迎。因此,这一领域取得了重大进展。然而,鉴于大量研究表明面部识别系统容易受到包括欺骗攻击在内的许多威胁,此类系统的安全性可能是最重要的问题。当使用生物识别系统来识别未经授权的用户时,欺骗是指通过使用各种方法向传感对象显示原始生物特征属性的假版本来欺骗系统使其认为未经授权的用户是真实的交易的能力。许多现有的反欺骗技术可以保护人脸欺骗。本研究提出了一种简单高效的Resnet18卷积神经网络(CNN)模型架构,它比其他手工制作、机器学习和预训练的模型更有益,并且产生更高的准确性。该系统有三个步骤,即分析可能的特征增强,加载照片及其预测,以及对图像中的真实或欺骗进行人脸验证。我们使用公开的具有挑战性的CASIA数据集提出了该模型。包裹照片、切割照片和电子屏幕是三种不同的图像,捕捉真实的人的脸。在这一步中,输入的视频被分割成图片帧。实验结果表明,该方法的真实检测准确率为99.12%,欺骗检测准确率为98.20%,优于同类方法。实验结果表明,我们提出的检测系统比以前使用的技术具有更高的检测率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Generative Adversarial Networks (GANs) Video Framework: A Systematic Literature Review A Novel Decentralized Coordination Control Scheme for the Complex Transactive Energy Prosumers Biometric Electroencephalogram Based Random Number Generator Seasonal Impact on the Storage Capacity Sizing in a Renewable Energy System Under the Condition of Safe Operation Investigation of Optimum Phase Change Material for PV Panels in Malaysian Climatic Conditions
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1