Modeling Spoof Noise by De-spoofing Diffusion and its Application in
Face Anti-spoofing
- URL: http://arxiv.org/abs/2401.08275v1
- Date: Tue, 16 Jan 2024 10:54:37 GMT
- Title: Modeling Spoof Noise by De-spoofing Diffusion and its Application in
Face Anti-spoofing
- Authors: Bin Zhang, Xiangyu Zhu, Xiaoyu Zhang, Zhen Lei
- Abstract summary: We present a pioneering attempt to employ diffusion models to denoise a spoof image and restore the genuine image.
The difference between these two images is considered as the spoof noise, which can serve as a discriminative cue for face anti-spoofing.
- Score: 40.82039387208269
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Face anti-spoofing is crucial for ensuring the security and reliability of
face recognition systems. Several existing face anti-spoofing methods utilize
GAN-like networks to detect presentation attacks by estimating the noise
pattern of a spoof image and recovering the corresponding genuine image. But
GAN's limited face appearance space results in the denoised faces cannot cover
the full data distribution of genuine faces, thereby undermining the
generalization performance of such methods. In this work, we present a
pioneering attempt to employ diffusion models to denoise a spoof image and
restore the genuine image. The difference between these two images is
considered as the spoof noise, which can serve as a discriminative cue for face
anti-spoofing. We evaluate our proposed method on several intra-testing and
inter-testing protocols, where the experimental results showcase the
effectiveness of our method in achieving competitive performance in terms of
both accuracy and generalization.
Related papers
- Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent
Diffusion Model [61.53213964333474]
We propose a unified framework Adv-Diffusion that can generate imperceptible adversarial identity perturbations in the latent space but not the raw pixel space.
Specifically, we propose the identity-sensitive conditioned diffusion generative model to generate semantic perturbations in the surroundings.
The designed adaptive strength-based adversarial perturbation algorithm can ensure both attack transferability and stealthiness.
arXiv Detail & Related papers (2023-12-18T15:25:23Z) - Learning Facial Liveness Representation for Domain Generalized Face
Anti-spoofing [25.07432145233952]
Face anti-spoofing (FAS) aims at distinguishing face spoof attacks from the authentic ones.
It is not practical to assume that the type of spoof attacks would be known in advance.
We propose a deep learning model for addressing the aforementioned domain-generalized face anti-spoofing task.
arXiv Detail & Related papers (2022-08-16T16:13:24Z) - A Novel Face-Anti Spoofing Neural Network Model For Face Recognition And
Detection [0.0]
Face Recognition (FR) systems are being used in a variety of applications, including road crossings, banking, and mobile banking.
The widespread use of FR systems has raised concerns about the safety of face biometrics against spoofing attacks.
This research proposes a face-anti-spoofing neural network model that outperforms existing models and has an efficiency of 0.89 percent.
arXiv Detail & Related papers (2022-05-14T05:14:48Z) - Dual Spoof Disentanglement Generation for Face Anti-spoofing with Depth
Uncertainty Learning [54.15303628138665]
Face anti-spoofing (FAS) plays a vital role in preventing face recognition systems from presentation attacks.
Existing face anti-spoofing datasets lack diversity due to the insufficient identity and insignificant variance.
We propose Dual Spoof Disentanglement Generation framework to tackle this challenge by "anti-spoofing via generation"
arXiv Detail & Related papers (2021-12-01T15:36:59Z) - Improved Detection of Face Presentation Attacks Using Image
Decomposition [11.883919370014]
Presentation attack detection (PAD) is a critical component in secure face authentication.
We present a PAD algorithm to distinguish face spoofs generated by a photograph of a subject from live images.
arXiv Detail & Related papers (2021-03-22T22:15:17Z) - Suppressing Spoof-irrelevant Factors for Domain-agnostic Face
Anti-spoofing [13.833241949666325]
Face anti-spoofing aims to prevent false authentications of face recognition systems.
We propose a novel method called Doubly Adversarial Suppression Network (DASN) for domain-agnostic face anti-spoofing.
arXiv Detail & Related papers (2020-12-02T15:27:19Z) - DeepFake Detection Based on the Discrepancy Between the Face and its
Context [94.47879216590813]
We propose a method for detecting face swapping and other identity manipulations in single images.
Our approach involves two networks: (i) a face identification network that considers the face region bounded by a tight semantic segmentation, and (ii) a context recognition network that considers the face context.
We describe a method which uses the recognition signals from our two networks to detect such discrepancies.
Our method achieves state of the art results on the FaceForensics++, Celeb-DF-v2, and DFDC benchmarks for face manipulation detection, and even generalizes to detect fakes produced by unseen methods.
arXiv Detail & Related papers (2020-08-27T17:04:46Z) - Face Anti-Spoofing Via Disentangled Representation Learning [90.90512800361742]
Face anti-spoofing is crucial to security of face recognition systems.
We propose a novel perspective of face anti-spoofing that disentangles the liveness features and content features from images.
arXiv Detail & Related papers (2020-08-19T03:54:23Z) - Face Anti-Spoofing by Learning Polarization Cues in a Real-World
Scenario [50.36920272392624]
Face anti-spoofing is the key to preventing security breaches in biometric recognition applications.
Deep learning method using RGB and infrared images demands a large amount of training data for new attacks.
We present a face anti-spoofing method in a real-world scenario by automatic learning the physical characteristics in polarization images of a real face.
arXiv Detail & Related papers (2020-03-18T03:04:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.