A Face Anti-Spoofing Detection with Multi-Modal CNN Enhanced by ResNet
Face Anti-Spoofing Detection
DOI:
https://doi.org/10.56714/bjrs.50.1.7Keywords:
Face anti-spoofing, face recognition, multi-modal, PAD, CNN, ResNet-50Abstract
The growing prevalence of face recognition technology in various applications, including mobile devices, access control, and financial transactions, highlights its importance. However, the vulnerability of face recognition systems to attacks has been demonstrated, underscoring the necessity of addressing potential weaknesses that attackers may exploit. The paper delves into face presentation attack detection (PAD) within biometric systems, which is crucial for ensuring the reliability and security of face recognition algorithms. To address this issue, the paper proposes a method for face presentation attack detection using ResNet-50 in conjunction with multi-modal data, incorporating RGB, depth, infrared (IR), and thermal channels. The method explores diverse strategies to combine results from each modality, investigating various fusion techniques such as majority voting, weighted voting, average pooling, and a stacking classifier. The system has been tested on the WMCA dataset. It exhibits strong performance compared to existing methods, notably achieving an impressive ACER ratio of 0.087% with the stacking classifier. This approach proves effective by consolidating multiple modalities without requiring individual scenario-specific models, indicating promise for real-world applications
Downloads
References
A. Kadhim, S. Al-Darraji, “Face Recognition System Against Adversarial Attack Using Convolutional Neural Network.,” Iraqi Journal for Electrical & Electronic Engineering, vol. 18, no. 1, 2022. Doi:https://doi.org/10.37917/ijeee.18.1.1.
M. A. Mohammed, M. A. Hussain, Z. A. Oraibi, Z. A. Abduljabbar, V. O. Nyangaresi, “Secure Content Based Image Retrieval System Using Deep Learning,” J. Basrah Res.(Sci.), vol. 49, no. 2, pp. 94–111, 2023. Doi:https://doi.org/10.56714/bjrs.49.2.9.
P. J. Phillips et al., “Face recognition accuracy of forensic examiners, superrecognizers, and face recognition algorithms,” Proceedings of the National Academy of Sciences, vol. 115, no. 24, pp. 6171–6176, 2018. Doi:https://doi.org/10.1073/pnas.1721355115.
W. Liu, X. Wei, T. Lei, X. Wang, H. Meng, A. K. Nandi, “Data-fusion-based two-stage cascade framework for multimodality face anti-spoofing,” IEEE Trans Cogn Dev Syst, vol. 14, no. 2, pp. 672–683, 2021. Doi:https://doi.org/10.1109/TCDS.2021.3064679.
A. George, Z. Mostaani, D. Geissenbuhler, O. Nikisins, A. Anjos, S. Marcel, “Biometric face presentation attack detection with multi-channel convolutional neural network,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 42–55, 2019. Doi:https://doi.org/10.1109/TIFS.2019.2916652.
I. Z. Mukti, D. Biswas, “Transfer learning based plant diseases detection using ResNet50,” in 2019 4th International conference on electrical information and communication technology (EICT), IEEE, 2019, pp. 1–6. Doi: https://doi.org/10.1109/EICT48899.2019.9068805.
A. Denisova, “An improved simple feature set for face presentation attack detection,” in Proc. 2022 WSCG Computer Science Research Notes conf.,pp. 16-23. Doi:http://hdl.handle.net/11025/49574.
Y. Zheng, E. A. Essock, “A local-coloring method for night-vision colorization utilizing image analysis and fusion,” Information Fusion, vol. 9, no. 2, pp. 186–199, 2008.Doi:https://doi.org/10.1016/j.inffus.2007.02.002.
J. Kittler, M. Hatef, R. P. W. Duin, J. Matas, “On consolidating classifiers,” IEEE Trans Pattern Anal Mach Intell, vol. 20, no. 3, pp. 226–239, 1998. Doi: https://doi.org/10.1109/34.667881.
L. Kuncheva, “Combining pattern classifiers methods and algorithms. john wiley&sons,” Inc. Publication, Hoboken, 2004. Doi: https://doi.org/10.1198/tech.2005.s320.
D. H. Wolpert, “Stacked generalization,” Neural networks, vol. 5, no. 2, pp. 241–259, 1992.Doi:https://doi.org/10.1016/S0893-6080(05)80023-1.
X. Tan, Y. Li, J. Liu, L. Jiang, “Face liveness detection from a single image with sparse low rank bilinear discriminative model,” in Computer Vision–ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part VI 11, Springer, 2010, pp. 504–517. Doi: https://doi.org/10.1007/978-3-642-15567-3_37.
Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, S. Z. Li, “A face antispoofing database with diverse attacks,” in 2012 5th IAPR international conference on Biometrics (ICB), IEEE, 2012, pp. 26–31. Doi: https://doi.org/10.1109/ICB.2012.6199754.
Z. Boulkenafet, J. Komulainen, L. Li, X. Feng, A. Hadid, “OULU-NPU: A mobile face presentation attack database with real-world variations,” in 2017 12th IEEE international conference on automatic face & gesture recognition (FG 2017), 2017, pp. 612–618. Doi:https://doi.org/10.1109/FG.2017.77.
W. R. Almeida et al., “Detecting face presentation attacks in mobile devices with a patch-based CNN and a sensor-aware loss function,” PLoS One, vol. 15, no. 9, p. e0238058, 2020.Doi:https://doi.org/10.1371/journal.pone.0238058.
A. Liu et al., “Contrastive context-aware learning for 3d high-fidelity mask face presentation attack detection,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2497–2507, 2022. Doi: https://doi.org/10.1109/TIFS.2022.3188149.
M. Fang, M. Huber, N. Damer, “Synthaspoof: Developing face presentation attack detection based on privacy-friendly synthetic data,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023, pp. 1061–1070.
O. Nikisins, A. Mohammadi, A. Anjos, S. Marcel, “On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing,” in 2018 International Conference on Biometrics (ICB), IEEE, 2018, pp. 75–81.Doi:https://doi.org/10.1109/ICB2018.2018.00022.
E. Nesli, S. Marcel, “Spoofing in 2d face recognition with 3d masks and anti-spoofing with kinect,” in IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS’13), 2013, pp. 1–8. Doi: https://doi.org/10.1109/BTAS.2013.6712688.
A. Liu, Z. Tan, J. Wan, S. Escalera, G. Guo, S. Z. Li, “Casia-surf cefa: A benchmark for multi-modal cross-ethnicity face anti-spoofing,” in Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2021, pp. 1179–1187.
I. Chingovska, N. Erdogmus, A. Anjos, S. Marcel, “Face recognition systems under spoofing attacks,” Face Recognition Across the Imaging Spectrum, pp. 165–194, 2016.Doi:https://doi.org/10.1007/978-3-319-28501-6_8.
S. Bhattacharjee, A. Mohammadi, S. Marcel, “Spoofing deep face recognition with custom silicone masks,” in 2018 IEEE 9th international conference on biometrics theory, applications and systems (BTAS), IEEE, 2018, pp. 1–7. Doi: https://doi.org/10.1109/BTAS.2018.8698550.
K. Zhang, Z. Zhang, Z. Li, Y. Qiao, “Joint face detection and alignment using multitask cascaded convolutional networks,” IEEE Signal Process Lett, vol. 23, no. 10, pp. 1499–1503, 2016.Doi:https://doi.org/10.1109/LSP.2016.2603342.
H. S. Mahmood, S. Al-Darraji, “A Multi-Modal Convolutional Neural Network for Face Anti-Spoofing Detection,” Iraqi Journal for Electrical and Electronic Engineering, 2024.
I. Standard, “Information technology–biometric presentation attack detection–part 3: testing and reporting,” International Organization for Standardization: Geneva, Switzerland, 2017.Doi:https://doi.org/10.1145/3038924.
H. Wu, F. J. Meng, “Review on evaluation criteria of machine learning based on big data,” in Journal of Physics: Conference Series, IOP Publishing, 2020, p. 052026.Doi:https://doi.org/10.1088/1742-6596/1486/5/052026.
K. Erubaar Ewald, L. Zeng, Z. Yao, C. B. Mawuli, H. Sani Abubakar, A. Victor, “Applying CNN With Extracted Facial Patches Using 3 Modalities To Detect 3d Face Spoof,” 2020.Doi:https://doi.org/10.1109/ICCWAMTIP51612.2020.9317329/20/$31.00.
X. Wu, R. He, Z. Sun, T. Tan, “A light CNN for deep face representation with noisy labels,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 11, pp. 2884–2896, Nov 2018. Doi: https://doi.org/10.1109/TIFS.2018.2833032.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 J. Basrah Res. (Sci.)
This work is licensed under a Creative Commons Attribution 4.0 International License.