Deep patch‐wise supervision for presentation attack detection
Abstract Face recognition systems have been widely deployed in various applications, such as online banking and mobile payment. However, these systems are vulnerable to face presentation attacks, which are created by people who obtain biometric data covertly from a person or through hacked systems....
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2022-09-01
|
Series: | IET Biometrics |
Subjects: | |
Online Access: | https://doi.org/10.1049/bme2.12091 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832546655059050496 |
---|---|
author | Alperen Kantarcı Hasan Dertli Hazım Kemal Ekenel |
author_facet | Alperen Kantarcı Hasan Dertli Hazım Kemal Ekenel |
author_sort | Alperen Kantarcı |
collection | DOAJ |
description | Abstract Face recognition systems have been widely deployed in various applications, such as online banking and mobile payment. However, these systems are vulnerable to face presentation attacks, which are created by people who obtain biometric data covertly from a person or through hacked systems. In order to detect these attacks, convolutional neural networks (CNN)‐based systems have gained significant popularity recently. CNN‐based systems perform very well on intra‐data set experiments, yet they fail to generalise to the data sets that they have not been trained on. This indicates that they tend to memorise data set‐specific spoof traces. To mitigate this problem, the authors propose a Deep Patch‐wise Supervision Presentation Attack Detection (DPS‐PAD) model approach that combines pixel‐wise binary supervision with patch‐based CNN. The authors’ experiments show that the proposed patch‐based method forces the model not to memorise the background information or data set‐specific traces. The authors extensively tested the proposed method on widely used PAD data sets—Replay‐Mobile and OULU‐NPU—and on a real‐world data set that has been collected for real‐world PAD use cases. The proposed approach is found to be superior on challenging experimental setups. Namely, it achieves higher performance on OULU‐NPU protocol 3, 4 and on inter‐data set real‐world experiments. |
format | Article |
id | doaj-art-378316e5c7bb41a8bd0ee25c7145f7fc |
institution | Kabale University |
issn | 2047-4938 2047-4946 |
language | English |
publishDate | 2022-09-01 |
publisher | Wiley |
record_format | Article |
series | IET Biometrics |
spelling | doaj-art-378316e5c7bb41a8bd0ee25c7145f7fc2025-02-03T06:47:36ZengWileyIET Biometrics2047-49382047-49462022-09-0111539640610.1049/bme2.12091Deep patch‐wise supervision for presentation attack detectionAlperen Kantarcı0Hasan Dertli1Hazım Kemal Ekenel2Department of Computer Engineering Istanbul Technical University Istanbul TurkeySodec Technologies Istanbul TurkeyDepartment of Computer Engineering Istanbul Technical University Istanbul TurkeyAbstract Face recognition systems have been widely deployed in various applications, such as online banking and mobile payment. However, these systems are vulnerable to face presentation attacks, which are created by people who obtain biometric data covertly from a person or through hacked systems. In order to detect these attacks, convolutional neural networks (CNN)‐based systems have gained significant popularity recently. CNN‐based systems perform very well on intra‐data set experiments, yet they fail to generalise to the data sets that they have not been trained on. This indicates that they tend to memorise data set‐specific spoof traces. To mitigate this problem, the authors propose a Deep Patch‐wise Supervision Presentation Attack Detection (DPS‐PAD) model approach that combines pixel‐wise binary supervision with patch‐based CNN. The authors’ experiments show that the proposed patch‐based method forces the model not to memorise the background information or data set‐specific traces. The authors extensively tested the proposed method on widely used PAD data sets—Replay‐Mobile and OULU‐NPU—and on a real‐world data set that has been collected for real‐world PAD use cases. The proposed approach is found to be superior on challenging experimental setups. Namely, it achieves higher performance on OULU‐NPU protocol 3, 4 and on inter‐data set real‐world experiments.https://doi.org/10.1049/bme2.12091convolutional neural networksface antispoofingpresentation attack detectionreal‐world dataset |
spellingShingle | Alperen Kantarcı Hasan Dertli Hazım Kemal Ekenel Deep patch‐wise supervision for presentation attack detection IET Biometrics convolutional neural networks face antispoofing presentation attack detection real‐world dataset |
title | Deep patch‐wise supervision for presentation attack detection |
title_full | Deep patch‐wise supervision for presentation attack detection |
title_fullStr | Deep patch‐wise supervision for presentation attack detection |
title_full_unstemmed | Deep patch‐wise supervision for presentation attack detection |
title_short | Deep patch‐wise supervision for presentation attack detection |
title_sort | deep patch wise supervision for presentation attack detection |
topic | convolutional neural networks face antispoofing presentation attack detection real‐world dataset |
url | https://doi.org/10.1049/bme2.12091 |
work_keys_str_mv | AT alperenkantarcı deeppatchwisesupervisionforpresentationattackdetection AT hasandertli deeppatchwisesupervisionforpresentationattackdetection AT hazımkemalekenel deeppatchwisesupervisionforpresentationattackdetection |