人脸反欺诈检测的当前进展

多模态数据集中的概述:

Kim et al. [22] aim to distinguish between the facial skin and mask materials by exploiting their reflectance.
Kose et al. [27] propose a 2D+3D face mask attacks dataset
to study the effects of mask attacks, but the realted dataset
is not public. 3DMAD [14] is the first publicly available 3D
masks dataset, which is recorded using Microsoft Kinect
sensor and consists of the Depth and RGB modalities. Another multi-modal face PAD dataset is Msspoof [8] that contains visible (VIS) and near-infrared (NIR) images of real
accesses and printed spoofing attacks with ≤ 21 objects.

Face anti-spoofing has been studied for decades. Some
previous work [35, 42, 24, 1] attempt to detect the evidence
of liveness (i.e., eye-blinking). Another works are based
on contextual [36, 25] and [43, 12, 21] information. To
improve the robustness to illumination variation, some algorithms adopt HSV and YCbCr color space [3, 4], and
Fourier spectrum [28]. All fo these methods use handcrafted features, such as LBP [34, 7, 47, 32], HoG [47, 32,
39] and GLCM [39]. They are fast enough and have relatively satisfactory performance only on small public face
spoof datasets with poor generalizability.
Some fusion methods are propposed to obtain a more
general countermeasure effective against a variation of attack types. Tronci et al. [41] propose a linear fusion at
a frame and video level combination between static and
video analysis. Schwartz et al. [39] introduce feature level
fusion by using Partial Least Squares (PLS) regression
based on a set of low-level feature descriptors. Some other
works [10, 26] obtain an effective fusion scheme by measuring the level of independence of two anti-counterfeiting systems. However, these fusion methods focus on score or feature level, not modality level, due to the lack of multi-modal
datasets. It is urgent to propose a multi-modal dataset.
Recently, CNN-based methods [15, 29, 37, 46, 31, 19]
are presented in face PAD community. They treat face PAD
as a binary classification problem and achieve remarkable
improvements in the intra-testing. Liu et al. [31] design
a novel network architecture to leverage two auxiliary information (the Depth map and rPPG signal) as supervision with the goals of improved generalization. Amin et
al. [19] introduce a new perspective for solving the face
anti-spoofing by inversely decomposing a spoof face into
the live face and the spoof noise pattern. However, they
exhibit a poor generalization ability during the cross-testing
due to the over-fitting to training data. This problem has still
not been solved, even if some works [29, 37] adopt transfer learning to train the CNN model from ImageNet [13].
These works bring us the insight that we need to collect a
larger PAD dataset.

 

8. Acknowledgements
This work has been partially supported by Science
and Technology Development Fund of Macau (Grant No.
0025/2018/A1), by the Chinese National Natural Science
Foundation Projects #61502491, #61876179, by the Spanish project TIN2016-74946-P (MINECO/FEDER, UE) and
CERCA Programme / Generalitat de Catalunya. We gratefully acknowledge Surfing Technology Beijing co., Ltd
(www.surfing.ai) to capture and provide us this high quality
dataset for this research, and also acknowledge the support
of NVIDIA Corporation with the donation of the GPU used
for this research.
References
[1] S. Bharadwaj, T. I. Dhamecha, M. Vatsa, and R. Singh. Computationally efficient face spoofing detection with motion
magnification. In CVPR, pages 105–110, 2013. 3, 8
[2] S. Bhattacharjee, A. Mohammadi, and S. Marcel. Spoofing
deep face recognition with custom silicone masks. 2018. 1,
2
[3] Z. Boulkenafet, J. Komulainen, and A. Hadid. Face spoofing
detection using colour texture analysis. TIFS, 11(8):1818–
1830, 2016. 1, 3
[4] Z. Boulkenafet, J. Komulainen, and A. Hadid. Face antispoofing using speeded-up robust features and fisher vector
encoding. SPL, 24(2):141–145, 2017. 1, 3
[5] Z. Boulkenafet, J. Komulainen, L. Li, X. Feng, and A. Hadid.
Oulu-npu: A mobile face presentation attack database with
real-world variations. In FG, pages 612–618, 2017. 2
[6] I. Chingovska, A. Anjos, and S. Marcel. On the effectiveness
of local binary patterns in face anti-spoofing. In BIOSIG,
2012. 2, 8
[7] I. Chingovska, A. Anjos, and S. Marcel. On the effectiveness
of local binary patterns in face anti-spoofing. In BIOSIG,
2012. 3
[8] I. Chingovska, N. Erdogmus, A. Anjos, and S. Marcel.
Face recognition systems under spoofing attacks. In Face
Recognition Across the Imaging Spectrum, pages 165–194.
Springer, 2016. 2
[9] A. Costa-Pazo, S. Bhattacharjee, E. Vazquez-Fernandez,
and S. Marcel. The replay-mobile face presentation-attack
database. In BIOSIG, pages 1–7, 2016. 2
[10] T. de Freitas Pereira, A. Anjos, J. M. De Martino, and S. Marcel. Can face anti-spoofing countermeasures work in a real
world scenario? In ICB, pages 1–8, 2013. 3
[11] T. de Freitas Pereira, A. Anjos, J. M. De Martino, and S. Marcel. Can face anti-spoofing countermeasures work in a real
world scenario? In ICB, pages 1–8, 2013. 8
[12] M. De Marsico, M. Nappi, D. Riccio, and J.-L. Dugelay.
Moving face spoofing detection via 3d projective invariants.
In ICB, pages 73–78, 2012. 3
[13] J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. FeiFei. Imagenet: A large-scale hierarchical image database. In
CVPR, pages 248–255, 2009. 1, 3
[14] N. Erdogmus and S. Marcel. Spoofing in 2d face recognition
with 3d masks and anti-spoofing with kinect. In BTAS, pages
1–6, 2014. 2
[15] L. Feng, L.-M. Po, Y. Li, X. Xu, F. Yuan, T. C.-H. Cheung,
and K.-W. Cheung. Integration of image quality and motion
cues for face anti-spoofing: A neural network approach. JVCIR, 38:451–460, 2016. 3
[16] Y. Feng, F. Wu, X. Shao, Y. Wang, and X. Zhou. Joint 3d
face reconstruction and dense alignment with position map
regression network. In ECCV, 2018. 4
[17] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning
for image recognition. In CVPR, pages 770–778, 2016. 5
[18] J. Hu, L. Shen, and G. Sun. Squeeze-and-excitation networks. In CVPR, 2018. 5
[19] A. Jourabloo, Y. Liu, and X. Liu. Face de-spoofing:
Anti-spoofing via noise modeling. arXiv preprint
arXiv:1807.09968, 2018. 1, 2, 3
[20] I. Kemelmacher-Shlizerman, S. M. Seitz, D. Miller, and
E. Brossard. The megaface benchmark: 1 million faces for
recognition at scale. In CVPR, pages 4873–4882, 2016. 8
[21] S. Kim, S. Yu, K. Kim, Y. Ban, and S. Lee. Face liveness
detection using variable focusing. In ICB, pages 1–6, 2013.
3
[22] Y. Kim, J. Na, S. Yoon, and J. Yi. Masked fake face detection using radiance measurements. JOSA A, 26(4):760–766,
2009. 2
[23] D. E. King. Dlib-ml: A machine learning toolkit. JMLR,
10:1755–1758, 2009. 4
[24] K. Kollreider, H. Fronthaler, and J. Bigun. Verifying liveness
by multiple experts in face biometrics. In CVPRW, pages 1–
6, 2008. 3
[25] J. Komulainen, A. Hadid, and M. Pietikainen. Context based
face anti-spoofing. In BTAS, pages 1–8, 2013. 3
[26] J. Komulainen, A. Hadid, M. Pietikainen, A. Anjos, and ¨
S. Marcel. Complementary countermeasures for detecting
scenic face spoofing attacks. In ICB, pages 1–7, 2013. 3
[27] N. Kose and J.-L. Dugelay. Countermeasure for the protection of face recognition systems against mask attacks. In FG,
pages 1–6, 2013. 2
[28] J. Li, Y. Wang, T. Tan, and A. K. Jain. Live face detection
based on the analysis of fourier spectra. Biometric Technology for Human Identification, 5404:296–304, 2004. 3
[29] L. Li, X. Feng, Z. Boulkenafet, Z. Xia, M. Li, and A. Hadid. An original face anti-spoofing approach using partial
convolutional neural network. In IPTA, pages 1–6, 2016. 3
[30] W. Liu, Y. Wen, Z. Yu, M. Li, B. Raj, and L. Song.
Sphereface: Deep hypersphere embedding for face recognition. In CVPR, 2017. 2, 8
[31] Y. Liu, A. Jourabloo, and X. Liu. Learning deep models
for face anti-spoofing: Binary or auxiliary supervision. In
CVPR, pages 389–398, 2018. 1, 2, 3, 5, 7, 8
[32] J. Maatta, A. Hadid, and M. Pietikainen. Face spoofing
detection from single images using texture and local shape
analysis. IET biometrics, 1(1):3–10, 2012. 3
[33] A. Mohammadi, S. Bhattacharjee, and S. Marcel. Deeply
vulnerable: a study of the robustness of face recognition to
presentation attacks. IET Biometrics, 7(1):15–26, 2017. 1
[34] T. Ojala, M. Pietikainen, and T. Maenpaa. Multiresolution
gray-scale and rotation invariant texture classification with
local binary patterns. TPAMI, 24(7):971–987, 2002. 3
[35] G. Pan, L. Sun, Z. Wu, and S. Lao. Eyeblink-based antispoofing in face recognition from a generic webcamera. In
ICCV, pages 1–8, 2007. 3
[36] G. Pan, L. Sun, Z. Wu, and Y. Wang. Monocular camerabased face liveness detection by combining eyeblink and
scene context. Telecommunication Systems, pages 215–225,
2011. 3
[37] K. Patel, H. Han, and A. K. Jain. Secure face unlock: Spoof
detection on smartphones. TIFS, 11(10):2268–2283, 2016. 3
[38] A. Pinto, H. Pedrini, W. R. Schwartz, and A. Rocha. Face
spoofing detection through visual codebooks of spectral temporal cubes. TIP, 24(12):4726–4740, 2015. 8
[39] W. R. Schwartz, A. Rocha, and H. Pedrini. Face spoofing
detection through partial least squares and low-level descriptors. In IJCB, pages 1–8, 2011. 3
[40] C. Sun, A. Shrivastava, S. Singh, and A. Gupta. Revisiting
unreasonable effectiveness of data in deep learning era. In
ICCV, pages 843–852, 2017. 6
[41] R. Tronci, D. Muntoni, G. Fadda, M. Pili, N. Sirena, G. Murgia, M. Ristori, S. Ricerche, and F. Roli. Fusion of multiple
clues for photo-attack detection in face recognition systems.
In IJCB, pages 1–6, 2011. 3
[42] L. Wang, X. Ding, and C. Fang. Face live detection method
based on physiological motion analysis. Tsinghua Science &
Technology, 14(6):685–690, 2009. 3
[43] T. Wang, J. Yang, Z. Lei, S. Liao, and S. Z. Li. Face liveness
detection using 3d structure recovered from a single camera.
In ICB, pages 1–6, 2013. 3
[44] Z. Wang, C. Zhao, Y. Qin, Q. Zhou, and Z. Lei. Exploiting
temporal and depth information for multi-frame face antispoofing. arXiv preprint arXiv:1811.05118, 2018. 7, 8
[45] D. Wen, H. Han, and A. K. Jain. Face spoof detection with
image distortion analysis. TIFS, 10(4):746–761, 2015. 1, 2
[46] J. Yang, Z. Lei, and S. Z. Li. Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601,
2014. 3, 8
[47] J. Yang, Z. Lei, S. Liao, and S. Z. Li. Face liveness detection
with component dependent descriptor. In ICB, volume 1,
page 2, 2013. 3
[48] D. Yi, Z. Lei, S. Liao, and S. Z. Li. Learning face representation from scratch. arXiv preprint arXiv:1411.7923, 2014.
1
[49] Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, and S. Z. Li. A face
antispoofing database with diverse attacks. In ICB, pages
26–31, 2012. 2,
 

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值