File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/s00371-020-01849-x
- Scopus: eid_2-s2.0-85084827359
- WOS: WOS:000533063400001
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Understanding deep face anti-spoofing: from the perspective of data
Title | Understanding deep face anti-spoofing: from the perspective of data |
---|---|
Authors | |
Keywords | Face anti-spoofing Biometrics Image adjustment Image processing |
Issue Date | 2021 |
Publisher | Springer Verlag. The Journal's web site is located at http://link.springer.de/link/service/journals/00371/index.htm |
Citation | The Visual Computer, 2021, v. 37 n. 5, p. 1015-1028 How to Cite? |
Abstract | Face biometrics systems are increasingly used by many business applications, which can be vulnerable to malicious attacks, leading to serious consequences. How to effectively detect spoofing faces is a critical problem. Traditional methods rely on handcraft features to distinguish real faces from fraud ones, but it is difficult for feature descriptors to handle all attack variations. More recently, in order to overcome the limitation of traditional methods, newly emerging CNN-based approaches were proposed, most of which, if not all, carefully design different network architectures. To make CNN-related approaches effective, data and learning strategies are both indispensable. In this paper, instead of focusing on network design, we explore more from the perspective of data. We present that appropriate nonlinear adjustment and hair geometry can amplify the contrast between real faces and attacks. Given our exploration, a simple convolutional neural network can solve the face anti-spoofing problem under different attack scenarios and achieve state-of-the-art performance on well-known face anti-spoofing benchmarks. |
Persistent Identifier | http://hdl.handle.net/10722/309352 |
ISSN | 2023 Impact Factor: 3.0 2023 SCImago Journal Rankings: 0.778 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sun, Y | - |
dc.contributor.author | Xiong, H | - |
dc.contributor.author | Yiu, SM | - |
dc.date.accessioned | 2021-12-29T02:13:53Z | - |
dc.date.available | 2021-12-29T02:13:53Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | The Visual Computer, 2021, v. 37 n. 5, p. 1015-1028 | - |
dc.identifier.issn | 0178-2789 | - |
dc.identifier.uri | http://hdl.handle.net/10722/309352 | - |
dc.description.abstract | Face biometrics systems are increasingly used by many business applications, which can be vulnerable to malicious attacks, leading to serious consequences. How to effectively detect spoofing faces is a critical problem. Traditional methods rely on handcraft features to distinguish real faces from fraud ones, but it is difficult for feature descriptors to handle all attack variations. More recently, in order to overcome the limitation of traditional methods, newly emerging CNN-based approaches were proposed, most of which, if not all, carefully design different network architectures. To make CNN-related approaches effective, data and learning strategies are both indispensable. In this paper, instead of focusing on network design, we explore more from the perspective of data. We present that appropriate nonlinear adjustment and hair geometry can amplify the contrast between real faces and attacks. Given our exploration, a simple convolutional neural network can solve the face anti-spoofing problem under different attack scenarios and achieve state-of-the-art performance on well-known face anti-spoofing benchmarks. | - |
dc.language | eng | - |
dc.publisher | Springer Verlag. The Journal's web site is located at http://link.springer.de/link/service/journals/00371/index.htm | - |
dc.relation.ispartof | The Visual Computer | - |
dc.subject | Face anti-spoofing | - |
dc.subject | Biometrics | - |
dc.subject | Image adjustment | - |
dc.subject | Image processing | - |
dc.title | Understanding deep face anti-spoofing: from the perspective of data | - |
dc.type | Article | - |
dc.identifier.email | Sun, Y: yjsun@cs.hku.hk | - |
dc.identifier.email | Xiong, H: hxiong@hku.hk | - |
dc.identifier.email | Yiu, SM: smyiu@cs.hku.hk | - |
dc.identifier.authority | Sun, Y=rp02880 | - |
dc.identifier.authority | Yiu, SM=rp00207 | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/s00371-020-01849-x | - |
dc.identifier.scopus | eid_2-s2.0-85084827359 | - |
dc.identifier.hkuros | 331230 | - |
dc.identifier.volume | 37 | - |
dc.identifier.issue | 5 | - |
dc.identifier.spage | 1015 | - |
dc.identifier.epage | 1028 | - |
dc.identifier.isi | WOS:000533063400001 | - |
dc.publisher.place | Germany | - |