Improved Detection of Face Presentation Attacks Using Image
Decomposition
- URL: http://arxiv.org/abs/2103.12201v1
- Date: Mon, 22 Mar 2021 22:15:17 GMT
- Title: Improved Detection of Face Presentation Attacks Using Image
Decomposition
- Authors: Shlok Kumar Mishra and Kuntal Sengupta and Max Horowitz-Gelb and
Wen-Sheng Chu and Sofien Bouaziz and David Jacobs
- Abstract summary: Presentation attack detection (PAD) is a critical component in secure face authentication.
We present a PAD algorithm to distinguish face spoofs generated by a photograph of a subject from live images.
- Score: 11.883919370014
- License: http://creativecommons.org/publicdomain/zero/1.0/
- Abstract: Presentation attack detection (PAD) is a critical component in secure face
authentication. We present a PAD algorithm to distinguish face spoofs generated
by a photograph of a subject from live images. Our method uses an image
decomposition network to extract albedo and normal. The domain gap between the
real and spoof face images leads to easily identifiable differences, especially
between the recovered albedo maps. We enhance this domain gap by retraining
existing methods using supervised contrastive loss. We present empirical and
theoretical analysis that demonstrates that the contrast and lighting effects
can play a significant role in PAD; these show up particularly in the recovered
albedo. Finally, we demonstrate that by combining all of these methods we
achieve state-of-the-art results on datasets such as CelebA-Spoof, OULU and
CASIA-SURF.
Related papers
- DA-HFNet: Progressive Fine-Grained Forgery Image Detection and Localization Based on Dual Attention [12.36906630199689]
We construct a DA-HFNet forged image dataset guided by text or image-assisted GAN and Diffusion model.
Our goal is to utilize a hierarchical progressive network to capture forged artifacts at different scales for detection and localization.
arXiv Detail & Related papers (2024-06-03T16:13:33Z) - Modeling Spoof Noise by De-spoofing Diffusion and its Application in
Face Anti-spoofing [40.82039387208269]
We present a pioneering attempt to employ diffusion models to denoise a spoof image and restore the genuine image.
The difference between these two images is considered as the spoof noise, which can serve as a discriminative cue for face anti-spoofing.
arXiv Detail & Related papers (2024-01-16T10:54:37Z) - Building an Invisible Shield for Your Portrait against Deepfakes [34.65356811439098]
We propose a novel framework - Integrity Encryptor, aiming to protect portraits in a proactive strategy.
Our methodology involves covertly encoding messages that are closely associated with key facial attributes into authentic images.
The modified facial attributes serve as a mean of detecting manipulated images through a comparison of the decoded messages.
arXiv Detail & Related papers (2023-05-22T10:01:28Z) - Learning Facial Liveness Representation for Domain Generalized Face
Anti-spoofing [25.07432145233952]
Face anti-spoofing (FAS) aims at distinguishing face spoof attacks from the authentic ones.
It is not practical to assume that the type of spoof attacks would be known in advance.
We propose a deep learning model for addressing the aforementioned domain-generalized face anti-spoofing task.
arXiv Detail & Related papers (2022-08-16T16:13:24Z) - LTT-GAN: Looking Through Turbulence by Inverting GANs [86.25869403782957]
We propose the first turbulence mitigation method that makes use of visual priors encapsulated by a well-trained GAN.
Based on the visual priors, we propose to learn to preserve the identity of restored images on a periodic contextual distance.
Our method significantly outperforms prior art in both the visual quality and face verification accuracy of restored results.
arXiv Detail & Related papers (2021-12-04T16:42:13Z) - Dual Spoof Disentanglement Generation for Face Anti-spoofing with Depth
Uncertainty Learning [54.15303628138665]
Face anti-spoofing (FAS) plays a vital role in preventing face recognition systems from presentation attacks.
Existing face anti-spoofing datasets lack diversity due to the insufficient identity and insignificant variance.
We propose Dual Spoof Disentanglement Generation framework to tackle this challenge by "anti-spoofing via generation"
arXiv Detail & Related papers (2021-12-01T15:36:59Z) - Unsupervised Compound Domain Adaptation for Face Anti-Spoofing [74.6122128643823]
We address the problem of face anti-spoofing which aims to make the face verification systems robust in the real world settings.
We propose a memory augmentation method for adapting the source model to the target domain in a domain aware manner.
The proposed method successfully adapts to the compound target domain consisting multiple new spoof types.
arXiv Detail & Related papers (2021-05-18T12:08:07Z) - Robust Face-Swap Detection Based on 3D Facial Shape Information [59.32489266682952]
Face-swap images and videos have attracted more and more malicious attackers to discredit some key figures.
Previous pixel-level artifacts based detection techniques always focus on some unclear patterns but ignore some available semantic clues.
We propose a biometric information based method to fully exploit the appearance and shape feature for face-swap detection of key figures.
arXiv Detail & Related papers (2021-04-28T09:35:48Z) - Face Anti-Spoofing Via Disentangled Representation Learning [90.90512800361742]
Face anti-spoofing is crucial to security of face recognition systems.
We propose a novel perspective of face anti-spoofing that disentangles the liveness features and content features from images.
arXiv Detail & Related papers (2020-08-19T03:54:23Z) - Face Anti-Spoofing by Learning Polarization Cues in a Real-World
Scenario [50.36920272392624]
Face anti-spoofing is the key to preventing security breaches in biometric recognition applications.
Deep learning method using RGB and infrared images demands a large amount of training data for new attacks.
We present a face anti-spoofing method in a real-world scenario by automatic learning the physical characteristics in polarization images of a real face.
arXiv Detail & Related papers (2020-03-18T03:04:03Z) - Detecting Patch Adversarial Attacks with Image Residuals [9.169947558498535]
A discriminator is trained to distinguish between clean and adversarial samples.
We show that the obtained residuals act as a digital fingerprint for adversarial attacks.
Results show that the proposed detection method generalizes to previously unseen, stronger attacks.
arXiv Detail & Related papers (2020-02-28T01:28:22Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.