A Novel Active Solution for Two-Dimensional Face Presentation Attack
Detection
- URL: http://arxiv.org/abs/2212.06958v1
- Date: Wed, 14 Dec 2022 00:30:09 GMT
- Title: A Novel Active Solution for Two-Dimensional Face Presentation Attack
Detection
- Authors: Matineh Pooshideh
- Abstract summary: We study state-of-the-art to cover the challenges and solutions related to presentation attack detection.
A presentation attack is an attempt to present a non-live face, such as a photo, video, mask, and makeup, to the camera.
We introduce an efficient active presentation attack detection approach that overcomes weaknesses in the existing literature.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Identity authentication is the process of verifying one's identity. There are
several identity authentication methods, among which biometric authentication
is of utmost importance. Facial recognition is a sort of biometric
authentication with various applications, such as unlocking mobile phones and
accessing bank accounts. However, presentation attacks pose the greatest threat
to facial recognition. A presentation attack is an attempt to present a
non-live face, such as a photo, video, mask, and makeup, to the camera.
Presentation attack detection is a countermeasure that attempts to identify
between a genuine user and a presentation attack. Several industries, such as
financial services, healthcare, and education, use biometric authentication
services on various devices. This illustrates the significance of presentation
attack detection as the verification step. In this paper, we study
state-of-the-art to cover the challenges and solutions related to presentation
attack detection in a single place. We identify and classify different
presentation attack types and identify the state-of-the-art methods that could
be used to detect each of them. We compare the state-of-the-art literature
regarding attack types, evaluation metrics, accuracy, and datasets and discuss
research and industry challenges of presentation attack detection. Most
presentation attack detection approaches rely on extensive data training and
quality, making them difficult to implement. We introduce an efficient active
presentation attack detection approach that overcomes weaknesses in the
existing literature. The proposed approach does not require training data, is
CPU-light, can process low-quality images, has been tested with users of
various ages and is shown to be user-friendly and highly robust to
2-dimensional presentation attacks.
Related papers
- Time-Aware Face Anti-Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning [50.79277723970418]
imitation attacks can lead to erroneous identification and subsequent authentication of attackers.
Similar to face recognition, imitation attacks can also be detected with Machine Learning.
We propose a novel approach that promises high classification accuracy by combining previously unused features with time-aware deep learning strategies.
arXiv Detail & Related papers (2024-08-27T07:26:10Z) - Exploring Decision-based Black-box Attacks on Face Forgery Detection [53.181920529225906]
Face forgery generation technologies generate vivid faces, which have raised public concerns about security and privacy.
Although face forgery detection has successfully distinguished fake faces, recent studies have demonstrated that face forgery detectors are very vulnerable to adversarial examples.
arXiv Detail & Related papers (2023-10-18T14:49:54Z) - Face Presentation Attack Detection [59.05779913403134]
Face recognition technology has been widely used in daily interactive applications such as checking-in and mobile payment.
However, its vulnerability to presentation attacks (PAs) limits its reliable use in ultra-secure applicational scenarios.
arXiv Detail & Related papers (2022-12-07T14:51:17Z) - Attacking Face Recognition with T-shirts: Database, Vulnerability
Assessment and Detection [0.0]
We propose a new T-shirt Face Presentation Attack database of 1,608 T-shirt attacks using 100 unique presentation attack instruments.
We show that this type of attack can compromise the security of face recognition systems and that some state-of-the-art attack detection mechanisms fail to robustly generalize to the new attacks.
arXiv Detail & Related papers (2022-11-14T14:11:23Z) - An Ensemble Model for Face Liveness Detection [2.322052136673525]
We present a passive method to detect face presentation attack using an ensemble deep learning technique.
We propose an ensemble method where multiple features of the face and background regions are learned to predict whether the user is a bonafide or an attacker.
arXiv Detail & Related papers (2022-01-19T12:43:39Z) - Introduction to Presentation Attack Detection in Face Biometrics and
Recent Advances [21.674697346594158]
The next pages present the different presentation attacks that a face recognition system can confront.
We make an introduction of the current status of face recognition, its level of deployment, and its challenges.
We review different types of presentation attack methods, from simpler to more complex ones, and in which cases they could be effective.
arXiv Detail & Related papers (2021-11-23T11:19:22Z) - Federated Test-Time Adaptive Face Presentation Attack Detection with
Dual-Phase Privacy Preservation [100.69458267888962]
Face presentation attack detection (fPAD) plays a critical role in the modern face recognition pipeline.
Due to legal and privacy issues, training data (real face images and spoof images) are not allowed to be directly shared between different data sources.
We propose a Federated Test-Time Adaptive Face Presentation Attack Detection with Dual-Phase Privacy Preservation framework.
arXiv Detail & Related papers (2021-10-25T02:51:05Z) - Differential Anomaly Detection for Facial Images [15.54185745912878]
Identity attacks pose a big security threat as they can be used to gain unauthorised access and spread misinformation.
Most algorithms for detecting identity attacks generalise poorly to attack types that are unknown at training time.
We introduce a differential anomaly detection framework in which deep face embeddings are first extracted from pairs of images.
arXiv Detail & Related papers (2021-10-07T13:45:13Z) - Robust Physical-World Attacks on Face Recognition [52.403564953848544]
Face recognition has been greatly facilitated by the development of deep neural networks (DNNs)
Recent studies have shown that DNNs are very vulnerable to adversarial examples, raising serious concerns on the security of real-world face recognition.
We study sticker-based physical attacks on face recognition for better understanding its adversarial robustness.
arXiv Detail & Related papers (2021-09-20T06:49:52Z) - MixNet for Generalized Face Presentation Attack Detection [63.35297510471997]
We have proposed a deep learning-based network termed as textitMixNet to detect presentation attacks.
The proposed algorithm utilizes state-of-the-art convolutional neural network architectures and learns the feature mapping for each attack category.
arXiv Detail & Related papers (2020-10-25T23:01:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.