Javascript must be enabled to continue!
Effect of Facial Shape Information Reflected on Learned Features in Face Spoofing Detection
View through CrossRef
<p>Face recognition is a convenient and non-contact biometric method used widely for secure personal authentication. However, the face is an exposed body part, and face spoofing attacks, which compromise the security of systems that use face recognition for authentication, are frequently reported. Previous face spoofing attack detection studies proposed texture-analysis-based methods using handcrafted features or learned features to prevent spoofing attacks. However, it is unclear whether spoofing attack images reflect the face distortion resulting from failing to reflect the three-dimensional structure of a real face. To resolve this problem, we compared and analyzed the face spoofing attack detection performances of two typical convolutional neural network models, namely ResNet-18 and DenseNet-121. CASIA-FASD, Replay-Attack, and PR-FSAD were used as the training data. The classification performance of the model was evaluated based on four protocols. DenseNet-121 exhibited better performance in most scenarios. DenseNet-121 reflected facial shape information well by uniformly applying the learned features of both the initial and final layers during training. It is expected that this study will support the realization of spoofing technology with enhanced security.</p>
<p> </p>
Journal of Internet Technology
Title: Effect of Facial Shape Information Reflected on Learned Features in Face Spoofing Detection
Description:
<p>Face recognition is a convenient and non-contact biometric method used widely for secure personal authentication.
However, the face is an exposed body part, and face spoofing attacks, which compromise the security of systems that use face recognition for authentication, are frequently reported.
Previous face spoofing attack detection studies proposed texture-analysis-based methods using handcrafted features or learned features to prevent spoofing attacks.
However, it is unclear whether spoofing attack images reflect the face distortion resulting from failing to reflect the three-dimensional structure of a real face.
To resolve this problem, we compared and analyzed the face spoofing attack detection performances of two typical convolutional neural network models, namely ResNet-18 and DenseNet-121.
CASIA-FASD, Replay-Attack, and PR-FSAD were used as the training data.
The classification performance of the model was evaluated based on four protocols.
DenseNet-121 exhibited better performance in most scenarios.
DenseNet-121 reflected facial shape information well by uniformly applying the learned features of both the initial and final layers during training.
It is expected that this study will support the realization of spoofing technology with enhanced security.
</p>
<p> </p>.
Related Results
Joint Spoofing Detection Algorithm Based on Dual Control Charts and Robust Estimation
Joint Spoofing Detection Algorithm Based on Dual Control Charts and Robust Estimation
To address the issue that existing GNSS spoofing detection methods are not suitable for intermittent minor spoofing detection and spoofing duration identification, this paper theor...
Visual/Inertial/GNSS Integrated Navigation System under GNSS Spoofing Attack
Visual/Inertial/GNSS Integrated Navigation System under GNSS Spoofing Attack
Visual/Inertial/GNSS (VIG) integrated navigation and positioning systems are widely used in unmanned vehicles and other systems. This VIG system is vulnerable to of GNSS spoofing a...
Detection of Spoofing Used Against the GNSS-Like Underwater Navigation Systems
Detection of Spoofing Used Against the GNSS-Like Underwater Navigation Systems
The purpose of the work is an underwater positioning safety study that used the GNSS-like underwater navigation systems. In the process of research, we used the methods of software...
GNSS Spoofing Detection Based on Coupled Visual/Inertial/GNSS Navigation System
GNSS Spoofing Detection Based on Coupled Visual/Inertial/GNSS Navigation System
Spoofing attacks are one of the severest threats for global navigation satellite systems (GNSSs). This kind of attack can damage the navigation systems of unmanned air vehicles (UA...
Percepção da Estética Facial em Relação ao Tratamento Ortodôntico: Revisão de Literatura
Percepção da Estética Facial em Relação ao Tratamento Ortodôntico: Revisão de Literatura
A preocupação com a percepção dos pacientes em relação à estética facial evidencia uma mudança de paradigma uma vez que durante o planejamento ortodôntico cada vez mais a opinião d...
Analysis of Facial Phenotype Based on Facial Index Classification Using Cone-beam Computer Tomography in the Saudi Population
Analysis of Facial Phenotype Based on Facial Index Classification Using Cone-beam Computer Tomography in the Saudi Population
Aim: To provide normative values of facial height, width, and facial index, and determine the distribution of facial phenotypes among adults in Saudi Arabia.
Methods: The sample c...
Rehabilitation Surgery for Peripheral Facial Nerve Injury after Facial Trauma
Rehabilitation Surgery for Peripheral Facial Nerve Injury after Facial Trauma
Abstract
Introduction Facial trauma can cause damage to the facial nerve, which can have negative effects on function, aesthetics, and quality of life if left untreated.
...
COMPARISON OF MIME THERAPY AND MOTOR IMAGERY TECHNIQUE ON FACIAL DISABILITY IN BELL’S PALSY
COMPARISON OF MIME THERAPY AND MOTOR IMAGERY TECHNIQUE ON FACIAL DISABILITY IN BELL’S PALSY
Background:
Bell’s palsy affects facial motor functions, facial symmetry, and also results in facial disability as well as facial synkinesis. Mime therapy and motor imagery techni...

