Deep Learning based Image classification for Automated Face Spoofing Detection using Machine Learning: Convolutional Neural Network

被引:0
作者
Kumar, Biresh [1 ]
Manisha, Kumari [1 ]
Sinha, Anurag [2 ]
Kumar, Abhishek [3 ]
Kumar, Jeevan [4 ]
机构
[1] Amity Univ, Amity Inst Informat Technol, Ranchi, Bihar, India
[2] IGNOU, Sch Comp & Informat Sci, New Delhi, India
[3] Jharkhand Univ Technol, Comp Sci & Engn, Ranchi, Bihar, India
[4] RVSCET, RVS Coll Engn & Technol, Jamshedpur, Bihar, India
来源
2024 2ND WORLD CONFERENCE ON COMMUNICATION & COMPUTING, WCONF 2024 | 2024年
关键词
Face Spoofing; Image Classifying; Face Recognition; Computer Vision; Deep Learning;
D O I
10.1109/WCONF61366.2024.10692150
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Facial recognition technology has gained widespread use in various applications, raising concerns about the weakness of frameworks to confront mocking assaults. This study presents an implementation of face spoofing detection using machine learning techniques. The exploration utilizes a far-reaching system that envelops data combination, preprocessing, incorporate extraction, and model readiness. A diverse dataset comprising genuine and spoofed facial images, representing various spoofing techniques, is utilized. Feature extraction leverages Convolutional Brain Organizations (CNNs) to catch discriminative facial elements. The selected machine learning model is trained and fine-tuned, with a focus on achieving robustness against evolving spoofing methods. The evaluation of the implemented system involves rigorous testing on a separate dataset, utilizing estimations like precision, exactness, survey, and F1-score. The study investigates post-processing techniques and considerations for real-time deployment, ensuring practical applicability is done by the method convolutional neural network (CNN). Cross-approval is performed to evaluate the model's speculation capacities, and the deployment phase explores integration into real-world scenarios. Ethical considerations, user feedback, and compliance with data privacy regulations are integral components of the study.
引用
收藏
页数:8
相关论文
共 18 条
[1]   A Review Unveiling Various Machine Learning Algorithms Adopted for Biohydrogen Productions from Microalgae [J].
Ahmad Sobri, Mohamad Zulfadhli ;
Redhwan, Alya ;
Ameen, Fuad ;
Lim, Jun Wei ;
Liew, Chin Seng ;
Mong, Guo Ren ;
Daud, Hanita ;
Sokkalingam, Rajalingam ;
Ho, Chii-Dong ;
Usman, Anwar ;
Nagaraju, D. H. ;
Rao, Pasupuleti Visweswara .
FERMENTATION-BASEL, 2023, 9 (03)
[2]  
Bao W., 2019, IEEE Access, V7
[3]   Face Spoofing Detection Using Colour Texture Analysis [J].
Boulkenafet, Zinelabidine ;
Komulainen, Jukka ;
Hadid, Abdenour .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) :1818-1830
[4]   OULU-NPU: A mobile face presentation attack database with real-world variations [J].
Boulkenafet, Zinelabinde ;
Komulainen, Jukka ;
Li, Lei ;
Feng, Xiaoyi ;
Hadid, Abdenour .
2017 12TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG 2017), 2017, :612-618
[5]  
Damer N., 2019, IEEE Access, V7, P78916
[6]  
Hu Q., 2020, IEEE Transactions on Information Forensics and Security, V12, P2130
[7]  
Hu Q., 2020, IEEE Access, V8
[8]  
Korshunov P., 2021, IEEE Transactions on Information Forensics and Security, V16, P1745
[9]  
Li Z., 2014, IEEE Transactions on Image Processing, V26, P2567
[10]   Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision [J].
Liu, Yaojie ;
Jourabloo, Amin ;
Liu, Xiaoming .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :389-398