MToFNet: Object Anti-Spoofing with Mobile Time-of-Flight Data
- URL: http://arxiv.org/abs/2110.04066v1
- Date: Wed, 6 Oct 2021 05:24:33 GMT
- Title: MToFNet: Object Anti-Spoofing with Mobile Time-of-Flight Data
- Authors: Yonghyun Jeong, Doyeon Kim, Jaehyeon Lee, Minki Hong, Solbi Hwang,
Jongwon Choi
- Abstract summary: In online markets, sellers can maliciously recapture others' images on display screens to utilize as spoof images.
We propose an anti-spoofing method using the paired images and depth maps provided by the mobile camera with a Time-of-Fight sensor.
We build a novel representation model composed of two embedding models, which can be trained without considering the recaptured images.
- Score: 9.632104433799256
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In online markets, sellers can maliciously recapture others' images on
display screens to utilize as spoof images, which can be challenging to
distinguish in human eyes. To prevent such harm, we propose an anti-spoofing
method using the paired rgb images and depth maps provided by the mobile camera
with a Time-of-Fight sensor. When images are recaptured on display screens,
various patterns differing by the screens as known as the moir\'e patterns can
be also captured in spoof images. These patterns lead the anti-spoofing model
to be overfitted and unable to detect spoof images recaptured on unseen media.
To avoid the issue, we build a novel representation model composed of two
embedding models, which can be trained without considering the recaptured
images. Also, we newly introduce mToF dataset, the largest and most diverse
object anti-spoofing dataset, and the first to utilize ToF data. Experimental
results confirm that our model achieves robust generalization even across
unseen domains.
Related papers
- ForensicsSAM: Toward Robust and Unified Image Forgery Detection and Localization Resisting to Adversarial Attack [56.0056378072843]
We show that highly transferable adversarial images can be crafted solely via the upstream model.<n>We propose ForensicsSAM, a unified IFDL framework with built-in adversarial robustness.
arXiv Detail & Related papers (2025-08-10T16:03:44Z) - Image Demoiréing Using Dual Camera Fusion on Mobile Phones [58.39212652291496]
We propose to utilize Dual Camera fusion for Image Demoir'eing (DCID), ie, using the ultra-wide-angle (UW) image to assist the moir'e removal of wide-angle (W) image.<n>In particular, we propose an efficient DCID method, where a lightweight UW image encoder is integrated into an existing demoir'eing network.
arXiv Detail & Related papers (2025-06-10T02:20:37Z) - IMPRESS: Evaluating the Resilience of Imperceptible Perturbations
Against Unauthorized Data Usage in Diffusion-Based Generative AI [52.90082445349903]
Diffusion-based image generation models can create artistic images that mimic the style of an artist or maliciously edit the original images for fake content.
Several attempts have been made to protect the original images from such unauthorized data usage by adding imperceptible perturbations.
In this work, we introduce a purification perturbation platform, named IMPRESS, to evaluate the effectiveness of imperceptible perturbations as a protective measure.
arXiv Detail & Related papers (2023-10-30T03:33:41Z) - DIAGNOSIS: Detecting Unauthorized Data Usages in Text-to-image Diffusion Models [79.71665540122498]
We propose a method for detecting unauthorized data usage by planting the injected content into the protected dataset.
Specifically, we modify the protected images by adding unique contents on these images using stealthy image warping functions.
By analyzing whether the model has memorized the injected content, we can detect models that had illegally utilized the unauthorized data.
arXiv Detail & Related papers (2023-07-06T16:27:39Z) - Mask and Restore: Blind Backdoor Defense at Test Time with Masked
Autoencoder [57.739693628523]
We propose a framework for blind backdoor defense with Masked AutoEncoder (BDMAE)
BDMAE detects possible triggers in the token space using image structural similarity and label consistency between the test image and MAE restorations.
Our approach is blind to the model restorations, trigger patterns and image benignity.
arXiv Detail & Related papers (2023-03-27T19:23:33Z) - Generative Model-Based Attack on Learnable Image Encryption for
Privacy-Preserving Deep Learning [14.505867475659276]
We propose a novel generative model-based attack on learnable image encryption methods proposed for privacy-preserving deep learning.
We use two state-of-the-art generative models: a StyleGAN-based model and latent diffusion-based one.
Results show that images reconstructed by the proposed method have perceptual similarities to plain images.
arXiv Detail & Related papers (2023-03-09T05:00:17Z) - Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing
Models [13.057451851710924]
Face anti-spoofing aims to discriminate the spoofing face images (e.g., printed photos) from live ones.
Previous works conducted adversarial attack methods to evaluate the face anti-spoofing performance.
We propose a novel framework to expose the fine-grained adversarial vulnerability of the face anti-spoofing models.
arXiv Detail & Related papers (2022-05-30T04:56:33Z) - Federated Test-Time Adaptive Face Presentation Attack Detection with
Dual-Phase Privacy Preservation [100.69458267888962]
Face presentation attack detection (fPAD) plays a critical role in the modern face recognition pipeline.
Due to legal and privacy issues, training data (real face images and spoof images) are not allowed to be directly shared between different data sources.
We propose a Federated Test-Time Adaptive Face Presentation Attack Detection with Dual-Phase Privacy Preservation framework.
arXiv Detail & Related papers (2021-10-25T02:51:05Z) - Dual Manifold Adversarial Robustness: Defense against Lp and non-Lp
Adversarial Attacks [154.31827097264264]
Adversarial training is a popular defense strategy against attack threat models with bounded Lp norms.
We propose Dual Manifold Adversarial Training (DMAT) where adversarial perturbations in both latent and image spaces are used in robustifying the model.
Our DMAT improves performance on normal images, and achieves comparable robustness to the standard adversarial training against Lp attacks.
arXiv Detail & Related papers (2020-09-05T06:00:28Z) - Wavelet-Based Dual-Branch Network for Image Demoireing [148.91145614517015]
We design a wavelet-based dual-branch network (WDNet) with a spatial attention mechanism for image demoireing.
Our network removes moire patterns in the wavelet domain to separate the frequencies of moire patterns from the image content.
Experiments demonstrate the effectiveness of our method, and we further show that WDNet generalizes to removing moire artifacts on non-screen images.
arXiv Detail & Related papers (2020-07-14T16:44:30Z) - Noise Modeling, Synthesis and Classification for Generic Object
Anti-Spoofing [26.530310468430038]
We tackle the problem of Generic Object Anti-Spoofing (GOAS) for the first time.
One significant cue to detect these attacks is the noise patterns introduced by the capture sensors and spoof mediums.
We propose a GAN-based architecture to synthesize and identify the noise patterns from seen and unseen medium/sensor combinations.
arXiv Detail & Related papers (2020-03-29T14:52:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.