Face spoof detection using feature map superposition and CNN

Fei Gu, Zhihua Xia, Jianwei Fei, Chengsheng Yuan, Qiang Zhang
{"title":"Face spoof detection using feature map superposition and CNN","authors":"Fei Gu, Zhihua Xia, Jianwei Fei, Chengsheng Yuan, Qiang Zhang","doi":"10.1504/ijcse.2020.10029396","DOIUrl":null,"url":null,"abstract":"Face biometrics have been widely applied for user authentication systems in many practical scenarios, but the security of these systems can be jeopardised by presenting photos or replays of the legitimate user. To deal with such threat, many handcraft features extracted from face images or videos were used to detect spoof faces. These methods mainly analysed either illumination differences, colour differences or textures differences, but did not fusion these features together to further improve detection performance. Thus in this paper, we propose a novel face spoof detection method based on various feature maps and convolution neural network for photo and replay attacks. Specifically, both facial contour and specularly reflected features are considered, and proposed network is task oriented designed, e.g., its depth and width, and specific convolutional parameters of each layer are chosen for optimal accuracy and efficiency. A remarkable performance through plenty of experiments on multiple datasets shows that our method can defend not only photo attack, but also replay attack with a very low error probability.","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Comput. Sci. Eng.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijcse.2020.10029396","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Face biometrics have been widely applied for user authentication systems in many practical scenarios, but the security of these systems can be jeopardised by presenting photos or replays of the legitimate user. To deal with such threat, many handcraft features extracted from face images or videos were used to detect spoof faces. These methods mainly analysed either illumination differences, colour differences or textures differences, but did not fusion these features together to further improve detection performance. Thus in this paper, we propose a novel face spoof detection method based on various feature maps and convolution neural network for photo and replay attacks. Specifically, both facial contour and specularly reflected features are considered, and proposed network is task oriented designed, e.g., its depth and width, and specific convolutional parameters of each layer are chosen for optimal accuracy and efficiency. A remarkable performance through plenty of experiments on multiple datasets shows that our method can defend not only photo attack, but also replay attack with a very low error probability.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于特征映射叠加和CNN的人脸欺骗检测
人脸生物识别技术在许多实际场景中被广泛应用于用户身份验证系统,但这些系统的安全性可能会因呈现合法用户的照片或重播而受到威胁。为了应对这种威胁,从人脸图像或视频中提取许多手工特征来检测恶搞人脸。这些方法主要分析光照差异、颜色差异或纹理差异,但没有将这些特征融合在一起以进一步提高检测性能。因此,在本文中,我们提出了一种基于各种特征映射和卷积神经网络的人脸欺骗检测方法,用于照片和重播攻击。具体而言,考虑了面部轮廓和镜面反射特征,并设计了面向任务的网络,如深度和宽度,以及每层特定的卷积参数的选择,以获得最佳的精度和效率。在多个数据集上的大量实验表明,我们的方法不仅可以防御照片攻击,而且可以以极低的错误概率防御重播攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
ECC-based lightweight mutual authentication protocol for fog enabled IoT system using three-way authentication procedure Gene selection and classification combining information gain ratio with fruit fly optimisation algorithm for single-cell RNA-seq data Attitude control of an unmanned patrol helicopter based on an optimised spiking neural membrane system for use in coal mines CEMP-IR: a novel location aware cache invalidation and replacement policy Prediction of consumer preference for the bottom of the pyramid using EEG-based deep model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1