Can Your Face Detector Do Anti-spoofing? Face Presentation Attack
Detection with a Multi-Channel Face Detector
- URL: http://arxiv.org/abs/2006.16836v2
- Date: Wed, 29 Jul 2020 09:14:54 GMT
- Title: Can Your Face Detector Do Anti-spoofing? Face Presentation Attack
Detection with a Multi-Channel Face Detector
- Authors: Anjith George and Sebastien Marcel
- Abstract summary: We reformulate the task of the face detector to detect real faces, thus eliminating the threat of presentation attacks.
The proposed system can be used as a live-face detector obviating the need for a separate presentation attack detection module.
We have evaluated our approach in the multi-channel WMCA dataset containing a wide variety of attacks to show the effectiveness of the proposed framework.
- Score: 7.665392786787577
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In a typical face recognition pipeline, the task of the face detector is to
localize the face region. However, the face detector localizes regions that
look like a face, irrespective of the liveliness of the face, which makes the
entire system susceptible to presentation attacks. In this work, we try to
reformulate the task of the face detector to detect real faces, thus
eliminating the threat of presentation attacks. While this task could be
challenging with visible spectrum images alone, we leverage the multi-channel
information available from off the shelf devices (such as color, depth, and
infrared channels) to design a multi-channel face detector. The proposed system
can be used as a live-face detector obviating the need for a separate
presentation attack detection module, making the system reliable in practice
without any additional computational overhead. The main idea is to leverage a
single-stage object detection framework, with a joint representation obtained
from different channels for the PAD task. We have evaluated our approach in the
multi-channel WMCA dataset containing a wide variety of attacks to show the
effectiveness of the proposed framework.
Related papers
- Learning Expressive And Generalizable Motion Features For Face Forgery
Detection [52.54404879581527]
We propose an effective sequence-based forgery detection framework based on an existing video classification method.
To make the motion features more expressive for manipulation detection, we propose an alternative motion consistency block.
We make a general video classification network achieve promising results on three popular face forgery datasets.
arXiv Detail & Related papers (2024-03-08T09:25:48Z) - SHIELD : An Evaluation Benchmark for Face Spoofing and Forgery Detection
with Multimodal Large Language Models [63.946809247201905]
We introduce a new benchmark, namely SHIELD, to evaluate the ability of MLLMs on face spoofing and forgery detection.
We design true/false and multiple-choice questions to evaluate multimodal face data in these two face security tasks.
The results indicate that MLLMs hold substantial potential in the face security domain.
arXiv Detail & Related papers (2024-02-06T17:31:36Z) - Exploring Decision-based Black-box Attacks on Face Forgery Detection [53.181920529225906]
Face forgery generation technologies generate vivid faces, which have raised public concerns about security and privacy.
Although face forgery detection has successfully distinguished fake faces, recent studies have demonstrated that face forgery detectors are very vulnerable to adversarial examples.
arXiv Detail & Related papers (2023-10-18T14:49:54Z) - COMICS: End-to-end Bi-grained Contrastive Learning for Multi-face Forgery Detection [56.7599217711363]
Face forgery recognition methods can only process one face at a time.
Most face forgery recognition methods can only process one face at a time.
We propose COMICS, an end-to-end framework for multi-face forgery detection.
arXiv Detail & Related papers (2023-08-03T03:37:13Z) - Watch Out for the Confusing Faces: Detecting Face Swapping with the
Probability Distribution of Face Identification Models [37.49012763328351]
We propose a novel face swapping detection approach based on face identification probability distributions.
IdP_FSD is specially designed for detecting swapped faces whose identities belong to a finite set.
IdP_FSD exploits face swapping's common nature that the identity of swapped face combines that of two faces involved in swapping.
arXiv Detail & Related papers (2023-03-23T09:33:10Z) - Exploring Depth Information for Face Manipulation Detection [25.01910127502075]
We propose a Face Depth Map Transformer (FDMT) to estimate the face depth map patch by patch from a RGB face image.
The estimated face depth map is then considered as auxiliary information to be integrated with the backbone features.
arXiv Detail & Related papers (2022-12-29T09:00:22Z) - Exploring Frequency Adversarial Attacks for Face Forgery Detection [59.10415109589605]
We propose a frequency adversarial attack method against face forgery detectors.
Inspired by the idea of meta-learning, we also propose a hybrid adversarial attack that performs attacks in both the spatial and frequency domains.
arXiv Detail & Related papers (2022-03-29T15:34:13Z) - Understanding Cross Domain Presentation Attack Detection for Visible
Face Recognition [6.383297609254719]
Face signatures, including size, shape, texture, skin tone, eye color, appearance, and scars/marks, are widely used as discriminative, biometric information for access control.
presentation attacks on facial recognition systems have become increasingly sophisticated.
We propose a method that exploits information from infrared imagery during training to increase the discriminability of visible-based presentation attack detection systems.
arXiv Detail & Related papers (2021-11-03T22:25:45Z) - Representative Forgery Mining for Fake Face Detection [52.896286647898386]
We propose an attention-based data augmentation framework to guide detector refine and enlarge its attention.
Our method tracks and occludes the Top-N sensitive facial regions, encouraging the detector to mine deeper into the regions ignored before for more representative forgery.
arXiv Detail & Related papers (2021-04-14T03:24:19Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.