Javascript must be enabled to continue!
Effect of Facial Shape Information Reflected on Learned Features in Face Spoofing Detection
View through CrossRef
<p>Face recognition is a convenient and non-contact biometric method used widely for secure personal authentication. However, the face is an exposed body part, and face spoofing attacks, which compromise the security of systems that use face recognition for authentication, are frequently reported. Previous face spoofing attack detection studies proposed texture-analysis-based methods using handcrafted features or learned features to prevent spoofing attacks. However, it is unclear whether spoofing attack images reflect the face distortion resulting from failing to reflect the three-dimensional structure of a real face. To resolve this problem, we compared and analyzed the face spoofing attack detection performances of two typical convolutional neural network models, namely ResNet-18 and DenseNet-121. CASIA-FASD, Replay-Attack, and PR-FSAD were used as the training data. The classification performance of the model was evaluated based on four protocols. DenseNet-121 exhibited better performance in most scenarios. DenseNet-121 reflected facial shape information well by uniformly applying the learned features of both the initial and final layers during training. It is expected that this study will support the realization of spoofing technology with enhanced security.</p>
<p> </p>
Journal of Internet Technology
Title: Effect of Facial Shape Information Reflected on Learned Features in Face Spoofing Detection
Description:
<p>Face recognition is a convenient and non-contact biometric method used widely for secure personal authentication.
However, the face is an exposed body part, and face spoofing attacks, which compromise the security of systems that use face recognition for authentication, are frequently reported.
Previous face spoofing attack detection studies proposed texture-analysis-based methods using handcrafted features or learned features to prevent spoofing attacks.
However, it is unclear whether spoofing attack images reflect the face distortion resulting from failing to reflect the three-dimensional structure of a real face.
To resolve this problem, we compared and analyzed the face spoofing attack detection performances of two typical convolutional neural network models, namely ResNet-18 and DenseNet-121.
CASIA-FASD, Replay-Attack, and PR-FSAD were used as the training data.
The classification performance of the model was evaluated based on four protocols.
DenseNet-121 exhibited better performance in most scenarios.
DenseNet-121 reflected facial shape information well by uniformly applying the learned features of both the initial and final layers during training.
It is expected that this study will support the realization of spoofing technology with enhanced security.
</p>
<p> </p>.
Related Results
Joint Spoofing Detection Algorithm Based on Dual Control Charts and Robust Estimation
Joint Spoofing Detection Algorithm Based on Dual Control Charts and Robust Estimation
To address the issue that existing GNSS spoofing detection methods are not suitable for intermittent minor spoofing detection and spoofing duration identification, this paper theor...
Spoofing attack recognition for GNSS-based train positioning using a BO-LightGBM method
Spoofing attack recognition for GNSS-based train positioning using a BO-LightGBM method
Trustworthy positioning is critical in the operational control and management of trains. For a train positioning system (TPS) based on a global navigation satellite system (GNSS), ...
Detection of Spoofing Used Against the GNSS-Like Underwater Navigation Systems
Detection of Spoofing Used Against the GNSS-Like Underwater Navigation Systems
The purpose of the work is an underwater positioning safety study that used the GNSS-like underwater navigation systems. In the process of research, we used the methods of software...
GNSS Spoofing Detection Based on Coupled Visual/Inertial/GNSS Navigation System
GNSS Spoofing Detection Based on Coupled Visual/Inertial/GNSS Navigation System
Spoofing attacks are one of the severest threats for global navigation satellite systems (GNSSs). This kind of attack can damage the navigation systems of unmanned air vehicles (UA...
The Effects of Facial Expressions on Face Biometric System’s Reliability
The Effects of Facial Expressions on Face Biometric System’s Reliability
The human mood has a temporary effect on the face shape due to the movement of its muscles. Happiness, sadness, fear, anger, and other emotional conditions may affect the face biom...
Percepção da Estética Facial em Relação ao Tratamento Ortodôntico: Revisão de Literatura
Percepção da Estética Facial em Relação ao Tratamento Ortodôntico: Revisão de Literatura
A preocupação com a percepção dos pacientes em relação à estética facial evidencia uma mudança de paradigma uma vez que durante o planejamento ortodôntico cada vez mais a opinião d...
Analysis of Facial Phenotype Based on Facial Index Classification Using Cone-beam Computer Tomography in the Saudi Population
Analysis of Facial Phenotype Based on Facial Index Classification Using Cone-beam Computer Tomography in the Saudi Population
Aim: To provide normative values of facial height, width, and facial index, and determine the distribution of facial phenotypes among adults in Saudi Arabia.
Methods: The sample c...
Spoofify: A Hybrid Anti-Spoofing Facial Recognition System
Spoofify: A Hybrid Anti-Spoofing Facial Recognition System
AbstractFacial recognition systems have gained widespread adoption as replacements for conventional authenti- cation methods due to their robustness, offering bet- ter security com...

