Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
139 tokens/sec
GPT-4o
47 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection (2404.12680v1)

Published 19 Apr 2024 in cs.CV and cs.CR

Abstract: Facial biometrics are an essential components of smartphones to ensure reliable and trustworthy authentication. However, face biometric systems are vulnerable to Presentation Attacks (PAs), and the availability of more sophisticated presentation attack instruments such as 3D silicone face masks will allow attackers to deceive face recognition systems easily. In this work, we propose a novel Presentation Attack Detection (PAD) algorithm based on 3D point clouds captured using the frontal camera of a smartphone to detect presentation attacks. The proposed PAD algorithm, VoxAtnNet, processes 3D point clouds to obtain voxelization to preserve the spatial structure. Then, the voxelized 3D samples were trained using the novel convolutional attention network to detect PAs on the smartphone. Extensive experiments were carried out on the newly constructed 3D face point cloud dataset comprising bona fide and two different 3D PAIs (3D silicone face mask and wrap photo mask), resulting in 3480 samples. The performance of the proposed method was compared with existing methods to benchmark the detection performance using three different evaluation protocols. The experimental results demonstrate the improved performance of the proposed method in detecting both known and unknown face presentation attacks.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (38)
  1. SmartPhone Market. https://www.biometricupdate.com/202001/biometric-facial-recognition-hardware-present-in-90-of-smartphones-by-2024, 2020.
  2. SmartPhone Spoofing. https://press.which.co.uk/whichpressreleases/smartphones-have-face-recognition-that-can-be-easily-spoofed-with-2d-photo-which-finds/, 2020.
  3. Face anti-spoofing using patch and depth-based cnns. In IJCB, pages 319–328. IEEE, 2017.
  4. Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Processing Letters, 24(2):141–145, 2016.
  5. Face spoofing detection using colour texture analysis. TIFS, 11(8):1818–1830, 2016.
  6. Face-spoofing 2d-detection based on moiré-pattern analysis. IEEE transactions on information forensics and security, 10(4):778–786, 2015.
  7. A. George and S. Marcel. Deep pixel-wise binary supervision for face presentation attack detection. In ICB, pages 1–8. IEEE, 2019.
  8. Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE Transactions on Information Forensics and Security, 15:42–55, 2019.
  9. Ldcformer: Incorporating learnable descriptive convolution to vision transformer for face anti-spoofing. In 2023 IEEE International Conference on Image Processing (ICIP), pages 121–125, 2023.
  10. ISO/IEC JTC1 SC37 Biometrics. ISO/IEC 30107-3. Information Technology - Biometric presentation attack detection - Part 3: Testing and Reporting. International Organization for Standardization, 2017.
  11. Cloudnet: A lidar-based face anti-spoofing model that is robust against light variation. IEEE Access, 11:16984–16993, 2023.
  12. Taming self-supervised learning for presentation attack detection: De-folding and de-mixing. IEEE Transactions on Neural Networks and Learning Systems, pages 1–12, 2023.
  13. 3dpc-net: 3d point cloud network for face anti-spoofing. In 2020 IEEE International Joint Conference on Biometrics (IJCB), pages 1–8. IEEE, 2020.
  14. Contrastive context-aware learning for 3d high-fidelity mask face presentation attack detection. IEEE Transactions on Information Forensics and Security, 17:2497–2507, 2022.
  15. Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In CVPR, pages 389–398, 2018.
  16. Face spoofing detection from single images using micro-texture analysis. In IJCB, pages 1–7. IEEE, 2011.
  17. Face spoofing detection from single images using texture and local shape analysis. IET biometrics, 1(1):3–10, 2012.
  18. D. Maturana and S. Scherer. 3d convolutional neural networks for landing zone detection from lidar. In 2015 IEEE international conference on robotics and automation (ICRA), pages 3471–3478. IEEE, 2015.
  19. D. Maturana and S. Scherer. Voxnet: A 3d convolutional neural network for real-time object recognition. In 2015 IEEE/RSJ international conference on intelligent robots and systems (IROS), pages 922–928. IEEE, 2015.
  20. Masked autoencoders for point cloud self-supervised learning. In European conference on computer vision, pages 604–621. Springer, 2022.
  21. Secure face unlock: Spoof detection on smartphones. TIFS, 11(10):2268–2283, 2016.
  22. Pointnet: Deep learning on point sets for 3d classification and segmentation. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 652–660, 2017.
  23. Pointnet++: Deep hierarchical feature learning on point sets in a metric space. Advances in neural information processing systems, 30, 2017.
  24. R. Raghavendra and C. Busch. Presentation attack detection algorithm for face and iris biometrics. In 2014 22nd European signal processing conference (EUSIPCO), pages 1387–1391. IEEE, 2014.
  25. R. Ramachandra and C. Busch. Presentation attack detection methods for face recognition systems: A comprehensive survey. CSUR, 50(1):1–37, 2017.
  26. Face presentation attack detection using multi-classifier fusion of off-the-shelf deep features. In Computer Vision and Image Processing: 4th International Conference, CVIP 2019, Jaipur, India, September 27–29, 2019, Revised Selected Papers, Part II 4, pages 49–61. Springer, 2020.
  27. Multi-adversarial discriminative deep domain generalization for face presentation attack detection. In CVPR, pages 10023–10031, 2019.
  28. Regularized fine-grained meta face anti-spoofing. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 34, pages 11974–11981, 2020.
  29. Danet: Dynamic attention to spoof patterns for face anti-spoofing. In 2022 26th International Conference on Pattern Recognition (ICPR), pages 1929–1936. IEEE, 2022.
  30. Cross-domain face presentation attack detection via multi-domain disentangled representation learning. In CVPR, pages 6678–6687, 2020.
  31. Multi-modal face presentation attack detection via spatial and channel attentions. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, pages 0–0, 2019.
  32. Deep spatial gradient and temporal depth learning for face anti-spoofing. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 5042–5051, 2020.
  33. Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601, 2014.
  34. Salience-aware face presentation attack detection via deep reinforcement learning. IEEE Transactions on Information Forensics and Security, 17:413–427, 2021.
  35. Transrppg: Remote photoplethysmography transformer for 3d mask face presentation attack detection. IEEE Signal Processing Letters, 28:1290–1294, 2021.
  36. Deep learning for face anti-spoofing: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2022.
  37. Effective presentation attack detection driven by face related task. In 17th European Conference of Computer Vision (ECCV), pages 408–423. Springer, 2022.
  38. Effective presentation attack detection driven by face related task. In European Conference on Computer Vision, pages 408–423. Springer, 2022.

Summary

We haven't generated a summary for this paper yet.