Synthetic Periocular Iris PAI from a Small Set of Near-Infrared-Images
- URL: http://arxiv.org/abs/2107.12014v1
- Date: Mon, 26 Jul 2021 08:07:49 GMT
- Title: Synthetic Periocular Iris PAI from a Small Set of Near-Infrared-Images
- Authors: Jose Maureira, Juan Tapia, Claudia Arellano, Christoph Busch
- Abstract summary: This paper proposes a novel PAI synthetically created (SPI-PAI) using four state-of-the-art GAN algorithms.
The best PAD algorithm reported by the LivDet-2020 competition was tested for us using the synthetic PAI.
Results demonstrated the feasibility of synthetic images to fool presentation attacks detection algorithms.
- Score: 10.337140740056725
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Biometric has been increasing in relevance these days since it can be used
for several applications such as access control for instance. Unfortunately,
with the increased deployment of biometric applications, we observe an increase
of attacks. Therefore, algorithms to detect such attacks (Presentation Attack
Detection (PAD)) have been increasing in relevance. The LivDet-2020 competition
which focuses on Presentation Attacks Detection (PAD) algorithms have shown
still open problems, specially for unknown attacks scenarios. In order to
improve the robustness of biometric systems, it is crucial to improve PAD
methods. This can be achieved by augmenting the number of presentation attack
instruments (PAI) and bona fide images that are used to train such algorithms.
Unfortunately, the capture and creation of presentation attack instruments and
even the capture of bona fide images is sometimes complex to achieve. This
paper proposes a novel PAI synthetically created (SPI-PAI) using four
state-of-the-art GAN algorithms (cGAN, WGAN, WGAN-GP, and StyleGAN2) and a
small set of periocular NIR images. A benchmark between GAN algorithms is
performed using the Frechet Inception Distance (FID) between the generated
images and the original images used for training. The best PAD algorithm
reported by the LivDet-2020 competition was tested for us using the synthetic
PAI which was obtained with the StyleGAN2 algorithm. Surprisingly, The PAD
algorithm was not able to detect the synthetic images as a Presentation Attack,
categorizing all of them as bona fide. Such results demonstrated the
feasibility of synthetic images to fool presentation attacks detection
algorithms and the need for such algorithms to be constantly updated and
trained with a larger number of images and PAI scenarios.
Related papers
- Zero-Shot Detection of AI-Generated Images [54.01282123570917]
We propose a zero-shot entropy-based detector (ZED) to detect AI-generated images.
Inspired by recent works on machine-generated text detection, our idea is to measure how surprising the image under analysis is compared to a model of real images.
ZED achieves an average improvement of more than 3% over the SoTA in terms of accuracy.
arXiv Detail & Related papers (2024-09-24T08:46:13Z) - RIGID: A Training-free and Model-Agnostic Framework for Robust AI-Generated Image Detection [60.960988614701414]
RIGID is a training-free and model-agnostic method for robust AI-generated image detection.
RIGID significantly outperforms existing trainingbased and training-free detectors.
arXiv Detail & Related papers (2024-05-30T14:49:54Z) - GE-AdvGAN: Improving the transferability of adversarial samples by
gradient editing-based adversarial generative model [69.71629949747884]
Adversarial generative models, such as Generative Adversarial Networks (GANs), are widely applied for generating various types of data.
In this work, we propose a novel algorithm named GE-AdvGAN to enhance the transferability of adversarial samples.
arXiv Detail & Related papers (2024-01-11T16:43:16Z) - Secure Information Embedding in Images with Hybrid Firefly Algorithm [2.9182357325967145]
This research introduces a novel steganographic approach for concealing a confidential portable document format (PDF) document within a host image.
The purpose of this search is to accomplish two main goals: increasing the host image's capacity and reducing distortion.
The findings indicate a decrease in image distortion and an accelerated rate of convergence in the search process.
arXiv Detail & Related papers (2023-12-21T01:50:02Z) - Fast Key Points Detection and Matching for Tree-Structured Images [4.929206987094714]
This paper offers a new authentication algorithm based on image matching of nano-resolution visual identifiers with tree-shaped patterns.
The proposed algorithm is applicable to a variety of tree-structured image matching, but our focus is on dendrites, recently-developed visual identifiers.
arXiv Detail & Related papers (2022-11-07T00:22:56Z) - Sparse and Imperceptible Adversarial Attack via a Homotopy Algorithm [93.80082636284922]
Sparse adversarial attacks can fool deep networks (DNNs) by only perturbing a few pixels.
Recent efforts combine it with another l_infty perturbation on magnitudes.
We propose a homotopy algorithm to tackle the sparsity and neural perturbation framework.
arXiv Detail & Related papers (2021-06-10T20:11:36Z) - MixNet for Generalized Face Presentation Attack Detection [63.35297510471997]
We have proposed a deep learning-based network termed as textitMixNet to detect presentation attacks.
The proposed algorithm utilizes state-of-the-art convolutional neural network architectures and learns the feature mapping for each attack category.
arXiv Detail & Related papers (2020-10-25T23:01:13Z) - Anomaly Detection with Convolutional Autoencoders for Fingerprint
Presentation Attack Detection [11.879849130630406]
Presentation attack detection (PAD) methods are used to determine whether samples stem from a bona fide subject or from a presentation attack instrument (PAI)
We propose a new PAD technique based on autoencoders (AEs) trained only on bona fide samples (i.e. one-class) captured in the short wave infrared domain.
arXiv Detail & Related papers (2020-08-18T15:33:41Z) - Efficient detection of adversarial images [2.6249027950824506]
Some or all pixel values of an image are modified by an external attacker, so that the change is almost invisible to the human eye.
This paper first proposes a novel pre-processing technique that facilitates the detection of such modified images.
An adaptive version of this algorithm is proposed where a random number of perturbations are chosen adaptively.
arXiv Detail & Related papers (2020-07-09T05:35:49Z) - Determining Sequence of Image Processing Technique (IPT) to Detect
Adversarial Attacks [4.431353523758957]
We propose an evolutionary approach to automatically determine Image Processing Techniques Sequence (IPTS) for detecting malicious inputs.
A detection framework based on a genetic algorithm (GA) is developed to find the optimal IPTS.
A set of IPTS selected dynamically in testing time which works as a filter for the adversarial attack.
arXiv Detail & Related papers (2020-07-01T08:59:14Z) - The Power of Triply Complementary Priors for Image Compressive Sensing [89.14144796591685]
We propose a joint low-rank deep (LRD) image model, which contains a pair of complementaryly trip priors.
We then propose a novel hybrid plug-and-play framework based on the LRD model for image CS.
To make the optimization tractable, a simple yet effective algorithm is proposed to solve the proposed H-based image CS problem.
arXiv Detail & Related papers (2020-05-16T08:17:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.