APPLYING CNN WITH EXTRACTED FACIAL PATCHES USING 3 MODALITIES TO DETECT 3D FACE SPOOF

被引:0
作者
Ewald, Kuupole Erubaar [1 ]
Zeng, Liaoyuan [1 ]
Yao, Zheng [1 ]
Mawuli, Cobbinah Bernard [1 ]
Abubakar, Hassan Sani [1 ]
Victor, Agbesi [1 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Peoples R China
来源
2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP) | 2020年
关键词
Face Spoofing; Patch-Based CNN; Depth-Based CNN; Fusion-Based CNN;
D O I
10.1109/ICCWAMTIP51612.2020.9317329
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an era of smart technology where the human face is used for authentication because its fast and convenient but not every technology introduced is 100% credible. Face spoofing has rendered this technology vulnerable because of the damage it can cause when its security is breached. 3D face spoof has emerged and complicated facial recognition systems. Although, sophisticated improvement over the years have been made to reduce the impact of 3D face spoofing, a robust solution that can change the facial recognition sensors from being fooled are still studied and been researched on. In this paper, we proposed a (Convolutional Neural Network, CNN) architecture focused on Fusion-based approach, Depth and Patch-based (Convolutional Neural Network, CNN) by extracting from the human facial images, the facial features and complete detail hints. Our tests were carried out on CASIA-SURF dataset consisting of 3 modalities: Color, Depth and (Infrared, IR).
引用
收藏
页码:216 / 221
页数:6
相关论文
共 22 条
  • [1] The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras
    Albakri, Ghazel
    Alghowinem, Sharifa
    [J]. SENSORS, 2019, 19 (08)
  • [2] [Anonymous], 2010, Facial Recognition Technology: A Survey of Policy and Implementation Issues
  • [3] [Anonymous], 2019, ARXIV180308375V2 CSN
  • [4] Atoum Y, 2017, 2017 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB), P319, DOI 10.1109/BTAS.2017.8272713
  • [5] Berry J, 2001, CRC FOR P S, P1
  • [6] Bottou L., 2012, Lecture Notes in Computer Science, V2nd, P421, DOI [DOI 10.1007/978-3-642-35289-8_25, DOI 10.1007/978-3-642-35289-8-25]
  • [7] da Silva Pinto A., 2012, 2012 XXV SIBGRAPI - Conference on Graphics, Patterns and Images (SIBGRAPI 2012), P221, DOI 10.1109/SIBGRAPI.2012.38
  • [8] Dai J, 2016, PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), P1796, DOI 10.1109/ICIT.2016.7475036
  • [9] Ghofrani A., 2019, ARXIV PREPRINT ARXIV
  • [10] Hardt M., 2015, ARXIV PREPRINT ARXIV