Texture and Depth Feature Enhancement Based Two-Stream Face Presentation Attack Detection Method

被引:0
|
作者
Sun R. [1 ,2 ]
Feng H. [1 ,2 ]
Sun Q. [1 ,2 ]
Shan X. [1 ,2 ]
Zhang X. [1 ]
机构
[1] School of Computer Science and Information Engineering, Hefei University of Technology, Hefei
[2] Anhui Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei
来源
Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence | 2023年 / 36卷 / 03期
基金
中国国家自然科学基金;
关键词
Center Edge Loss; Face Anti-Spoofing; Feature Enhancement; Generative Adversarial Network; Presentation Attack Detection;
D O I
10.16451/j.cnki.issn1003-6059.202303004
中图分类号
学科分类号
摘要
Face presentation attack is a technology using photos, videos and other media to present faces in front of cameras to spoof face recognition systems. Most of the existing face presentation attack detection methods apply depth feature for supervised classification, while ignoring the effective fine-grained information and the correlation between depth information and texture information. Therefore, a texture and depth feature enhancement based two-stream face presentation attack detection method is proposed. One end of the network extracts the facial texture features with a more robust deception texture pattern than the original convolution network through the central differential convolution network. The other end of the network generates the depth information of the depth map through generative adversarial network to improve the robustness to the appearance changes and image quality differences. In the feature enhancement module, a central edge loss is designed to fuse and enhance two types of complementary features. The experimental results on 4 datasets show that the proposed method achieves superior performance in both intra-data set and cross-data set tests. © 2023 Journal of Pattern Recognition and Artificial Intelligence. All rights reserved.
引用
收藏
页码:242 / 251
页数:9
相关论文
共 41 条
  • [1] HADID A., Face Biometrics Under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions, Proc of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 113-118, (2014)
  • [2] KOSE N, DUGELAY J L., On the Vulnerability of Face Recognition Systems to Spoofing Mask Attacks, Proc of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2357-2361, (2013)
  • [3] CHINGOVSKA I, ANJOS A, MARCEL S., On the Effectiveness of Local Binary Patterns in Face Anti-Spoofing, Proc of the International Conference of Biometrics Special Interest Group, pp. 1-7, (2012)
  • [4] BOULKENAFET Z, KOMULAINEN J, HADID A., Face Antispoofing Using Speeded-Up Robust Features and Fisher Vector Encoding, IEEE Signal Processing Letters, 24, 2, pp. 141-145, (2017)
  • [5] GALBALLY J, MARCEL S, FIERREZ J., Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition, IEEE Transactions on Image Processing, 23, 2, pp. 710-724, (2014)
  • [6] PATEL K, HAN H, JAIN A K, Et al., Secure Face Unlock: Spoof Detection on Smartphones, IEEE Transactions on Information Forensics and Security, 11, 10, pp. 2268-2283, (2016)
  • [7] WEN D, HAN H, JAIN A K, Et al., Face Spoof Detection with Image Distortion Analysis, IEEE Transactions on Information Forensics and Security, 10, 4, pp. 746-761, (2015)
  • [8] M魧魧TT魧 J, HADID A, PIETIK魧INEN M., Face Spoofing Detection from Single Images Using Micro-Texture Analysis, Proc of the IEEE International Joint Conference on Biometrics, (2011)
  • [9] GAN J Y, ZHAI Y K, XIANG L, Et al., Spatial-Temporal Texture Cascaded Feature Method for Face Liveness Detection, Pattern Recognition and Artificial Intelligence, 32, 2, pp. 117-123, (2019)
  • [10] YANG J W, LEI Z, LI S Z., Learn Convolutional Neural Network for Face Anti-Spoofing