Two-Stage Face Detection and Anti-spoofing

被引:0
作者
Nurnoby, M. Faisal [1 ]
El-Alfy, El-Sayed M. [1 ,2 ]
机构
[1] King Fahd Univ Petr & Minerals, Informat & Comp Sci Dept, Coll Comp & Math, Dhahran, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Fellow SDAIA KFUPM Joint Res Ctr Artificial Intel, Interdisciplinary Res Ctr Intelligent Secure Syst, Dhahran, Saudi Arabia
来源
ADVANCES IN VISUAL COMPUTING, ISVC 2023, PT I | 2023年 / 14361卷
关键词
Presentation attack; Biometric authentication; Face recognition; Face anti-spoofing; Deep learning; Vision Transformer; IMAGE;
D O I
10.1007/978-3-031-47969-4_35
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Face recognition is a widely used biometric technique that has received a lot of attention. It is used to establish and verify the user's identity, and subsequently grant access for authorized users to restricted places and electronic devices. However, one of the challenges is face spoofing or presentation attack allowing fraudsters who attempt to impersonate a targeted victim by fabricating his/her facial biometric data, e.g., by presenting a photograph, a video, or a mask of the targeted person. Several approaches have been proposed to counteract face spoofing known as face anti-spoofing techniques. This paper's major goals are to examine pertinent literature, and develop and evaluate a two-stage approach for face detection and anti-spoofing. In the first stage, a multi-task cascaded convolutional neural network is used to detect the face region, and in the second stage, a multi-head attention-based transformer is used to detect spoofed faces. On two benchmarking datasets, a number of experiments are carried out and examined to assess the proposed solution. The results are encouraging, with a very high accuracy, which encourages further research in this direction to build more robust face authentication systems.
引用
收藏
页码:445 / 455
页数:11
相关论文
共 22 条
  • [1] A Unified Model for Face Matching and Presentation Attack Detection using an Ensemble of Vision Transformer Features
    Al-Refai, Rouqaiah
    Nandakumar, Karthik
    [J]. 2023 IEEE/CVF WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION WORKSHOPS (WACVW), 2023, : 662 - 671
  • [2] Anjos A, 2011, IEEE INT JOINT C BIO, P1
  • [3] Atoum Y, 2017, 2017 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB), P319, DOI 10.1109/BTAS.2017.8272713
  • [4] Face Presentation Attack Detection Using Deep Background Subtraction
    Benlamoudi, Azeddine
    Bekhouche, Salah Eddine
    Korichi, Maarouf
    Bensid, Khaled
    Ouahabi, Abdeldjalil
    Hadid, Abdenour
    Taleb-Ahmed, Abdelmalik
    [J]. SENSORS, 2022, 22 (10)
  • [5] Face Spoofing Detection Using Colour Texture Analysis
    Boulkenafet, Zinelabidine
    Komulainen, Jukka
    Hadid, Abdenour
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1818 - 1830
  • [6] Boulkenafet Z, 2015, IEEE IMAGE PROC, P2636, DOI 10.1109/ICIP.2015.7351280
  • [7] Bresan R., 2019, arXiv, DOI 10.48550/arXiv.1902.02845
  • [8] Dosovitskiy A, 2021, Arxiv, DOI [arXiv:2010.11929, DOI 10.48550/ARXIV.2010.11929]
  • [9] Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition
    Galbally, Javier
    Marcel, Sebastien
    Fierrez, Julian
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2014, 23 (02) : 710 - 724
  • [10] George A., 2021, Deep Learning-Based Face Analytics, P269, DOI DOI 10.1007/978-3-030-74697-113