Improving Presentation Attack Detection for ID Cards on Remote
Verification Systems
- URL: http://arxiv.org/abs/2301.09542v1
- Date: Mon, 23 Jan 2023 16:59:26 GMT
- Title: Improving Presentation Attack Detection for ID Cards on Remote
Verification Systems
- Authors: Sebastian Gonzalez, Juan Tapia
- Abstract summary: This paper presents an updated two-stage, end-to-end Presentation Attack Detection method for remote biometric verification systems of ID cards.
Proposal was developed using a database consisting of 190.000 real case Chilean ID card images with the support of a third-party company.
Our method is trained on two convolutional neural networks separately, reaching BPCERtextsubscript100 scores on ID cards attacks of 1.69% and 2.36% respectively.
- Score: 2.0305676256390934
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: In this paper, an updated two-stage, end-to-end Presentation Attack Detection
method for remote biometric verification systems of ID cards, based on
MobileNetV2, is presented. Several presentation attack species such as printed,
display, composite (based on cropped and spliced areas), plastic (PVC), and
synthetic ID card images using different capture sources are used. This
proposal was developed using a database consisting of 190.000 real case Chilean
ID card images with the support of a third-party company. Also, a new framework
called PyPAD, used to estimate multi-class metrics compliant with the ISO/IEC
30107-3 standard was developed, and will be made available for research
purposes. Our method is trained on two convolutional neural networks
separately, reaching BPCER\textsubscript{100} scores on ID cards attacks of
1.69\% and 2.36\% respectively. The two-stage method using both models together
can reach a BPCER\textsubscript{100} score of 0.92\%.
Related papers
- Zero-Shot Segmentation through Prototype-Guidance for Multi-Label Plant Species Identification [0.5249805590164902]
This paper presents an approach developed to address the PlantClef 2025 challenge, which consists of a fine-grained multi-label species identification.<n>Our solution focused on employing class prototypes obtained from the training dataset as a proxy guidance for training a segmentation Vision Transformer (ViT) on the test set images.<n>The proposed approach enabled a domain-adaptation from multi-class identification with individual species, into multi-label classification from high-resolution vegetation plots.
arXiv Detail & Related papers (2025-12-23T01:06:55Z) - Document Screenshot Retrievers are Vulnerable to Pixel Poisoning Attacks [72.4498910775871]
Vision-language model (VLM)-based retrievers leverage document screenshots embedded as vectors to enable effective search and offer a simplified pipeline over traditional text-only methods.
In this study, we propose three pixel poisoning attack methods designed to compromise VLM-based retrievers.
arXiv Detail & Related papers (2025-01-28T12:40:37Z) - Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications [7.287930923353593]
One of the main scenarios is printing morphed images and submitting the respective print in a passport application process.
Small datasets are available to train the MAD algorithm because of privacy concerns.
This paper proposes two different methods based on transfer-transfer for automatically creating digital print/scan face images.
arXiv Detail & Related papers (2024-08-18T17:53:26Z) - AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning [93.77763753231338]
Adversarial Contrastive Prompt Tuning (ACPT) is proposed to fine-tune the CLIP image encoder to extract similar embeddings for any two intermediate adversarial queries.
We show that ACPT can detect 7 state-of-the-art query-based attacks with $>99%$ detection rate within 5 shots.
We also show that ACPT is robust to 3 types of adaptive attacks.
arXiv Detail & Related papers (2024-08-04T09:53:50Z) - View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network [87.36616083812058]
view-decoupled transformer (VDT) is proposed as a simple yet effective framework for aerial-ground person re-identification.
Two major components are designed in VDT to decouple view-related and view-unrelated features.
In addition, we contribute a large-scale AGPReID dataset called CARGO, consisting of five/eight aerial/ground cameras, 5,000 identities, and 108,563 images.
arXiv Detail & Related papers (2024-03-21T16:08:21Z) - Presentation Attack detection using Wavelet Transform and Deep Residual
Neural Net [5.425986555749844]
Biometric substances can be deceived by the imposters in several ways.
The bio-metric images, especially the iris and face, are vulnerable to different presentation attacks.
This research applies deep learning approaches to mitigate presentation attacks in a biometric access control system.
arXiv Detail & Related papers (2023-11-23T20:21:49Z) - An Open Patch Generator based Fingerprint Presentation Attack Detection
using Generative Adversarial Network [3.5558308387389626]
Presentation Attack (PA) or spoofing is one of the threats caused by presenting a spoof of a genuine fingerprint to the sensor of Automatic Fingerprint Recognition Systems (AFRS)
This paper proposes a CNN based technique that uses a Generative Adversarial Network (GAN) to augment the dataset with spoof samples generated from the proposed Open Patch Generator (OPG)
An overall accuracy of 96.20%, 94.97%, and 92.90% has been achieved on the LivDet 2015, 2017, and 2019 databases, respectively under the LivDet protocol scenarios.
arXiv Detail & Related papers (2023-06-06T10:52:06Z) - MoSFPAD: An end-to-end Ensemble of MobileNet and Support Vector
Classifier for Fingerprint Presentation Attack Detection [2.733700237741334]
This paper proposes a novel endtoend model to detect fingerprint attacks.
The proposed model incorporates MobileNet as a feature extractor and a Support Vector as a classifier.
The performance of the proposed model is compared with state-of-the-art methods.
arXiv Detail & Related papers (2023-03-02T18:27:48Z) - Towards an Efficient Semantic Segmentation Method of ID Cards for
Verification Systems [8.820032281861227]
This work proposes a method for removing the background using semantic segmentation of ID Cards.
Two Deep Learning approaches were explored, based on MobileUNet and DenseNet10.
The proposed methods are lightweight enough to be used in real-time operation on mobile devices.
arXiv Detail & Related papers (2021-11-24T19:54:17Z) - Unsupervised Pretraining for Object Detection by Patch Reidentification [72.75287435882798]
Unsupervised representation learning achieves promising performances in pre-training representations for object detectors.
This work proposes a simple yet effective representation learning method for object detection, named patch re-identification (Re-ID)
Our method significantly outperforms its counterparts on COCO in all settings, such as different training iterations and data percentages.
arXiv Detail & Related papers (2021-03-08T15:13:59Z) - Camera-aware Proxies for Unsupervised Person Re-Identification [60.26031011794513]
This paper tackles the purely unsupervised person re-identification (Re-ID) problem that requires no annotations.
We propose to split each single cluster into multiple proxies and each proxy represents the instances coming from the same camera.
Based on the camera-aware proxies, we design both intra- and inter-camera contrastive learning components for our Re-ID model.
arXiv Detail & Related papers (2020-12-19T12:37:04Z) - Anomaly Detection with Convolutional Autoencoders for Fingerprint
Presentation Attack Detection [11.879849130630406]
Presentation attack detection (PAD) methods are used to determine whether samples stem from a bona fide subject or from a presentation attack instrument (PAI)
We propose a new PAD technique based on autoencoders (AEs) trained only on bona fide samples (i.e. one-class) captured in the short wave infrared domain.
arXiv Detail & Related papers (2020-08-18T15:33:41Z) - Anomaly Detection-Based Unknown Face Presentation Attack Detection [74.4918294453537]
Anomaly detection-based spoof attack detection is a recent development in face Presentation Attack Detection.
In this paper, we present a deep-learning solution for anomaly detection-based spoof attack detection.
The proposed approach benefits from the representation learning power of the CNNs and learns better features for fPAD task.
arXiv Detail & Related papers (2020-07-11T21:20:55Z) - Towards Precise Intra-camera Supervised Person Re-identification [54.86892428155225]
Intra-camera supervision (ICS) for person re-identification (Re-ID) assumes that identity labels are independently annotated within each camera view.
Lack of inter-camera labels makes the ICS Re-ID problem much more challenging than the fully supervised counterpart.
Our approach performs even comparable to state-of-the-art fully supervised methods in two of the datasets.
arXiv Detail & Related papers (2020-02-12T11:56:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.