论文标题

对多通道生物特征识别表现攻击检测的全面评估

A Comprehensive Evaluation on Multi-channel Biometric Face Presentation Attack Detection

论文作者

George, Anjith, Geissbuhler, David, Marcel, Sebastien

论文摘要

反对演示攻击的脆弱性是破坏面部识别系统广泛部署的关键问题。尽管演示攻击检测(PAD)系统试图解决这个问题,但缺乏概括和鲁棒性仍然是一个主要问题。几项工作表明,使用多通道垫系统可以减轻这种漏洞,并导致更健壮的系统。但是,有多种通道可用于PAD系统,例如RGB,近红外,短波红外,深度和热传感器。拥有大量传感器会增加系统的成本,因此在选择模式时需要了解不同传感器对各种攻击的性能。在这项工作中,我们进行了一项全面的研究,以了解各种成像方式对PAD的有效性。这些研究是在多通道垫数据集上进行的,该数据集采用14种不同的感应方式收集,考虑到2D,3D和部分攻击。我们使用了基于多渠道卷积网络的体系结构,该体系结构使用像素二进制监督。该模型已通过渠道的不同组合进行评估,以及各种具有挑战性和未知攻击方案的不同图像质量。结果揭示了有趣的趋势,并可以充当传感器选择的指针,以确保关键的呈现攻击检测系统。复制结果的源代码和协议已公开提供,使得将此工作扩展到其他体系结构成为可能。

The vulnerability against presentation attacks is a crucial problem undermining the wide-deployment of face recognition systems. Though presentation attack detection (PAD) systems try to address this problem, the lack of generalization and robustness continues to be a major concern. Several works have shown that using multi-channel PAD systems could alleviate this vulnerability and result in more robust systems. However, there is a wide selection of channels available for a PAD system such as RGB, Near Infrared, Shortwave Infrared, Depth, and Thermal sensors. Having a lot of sensors increases the cost of the system, and therefore an understanding of the performance of different sensors against a wide variety of attacks is necessary while selecting the modalities. In this work, we perform a comprehensive study to understand the effectiveness of various imaging modalities for PAD. The studies are performed on a multi-channel PAD dataset, collected with 14 different sensing modalities considering a wide range of 2D, 3D, and partial attacks. We used the multi-channel convolutional network-based architecture, which uses pixel-wise binary supervision. The model has been evaluated with different combinations of channels, and different image qualities on a variety of challenging known and unknown attack protocols. The results reveal interesting trends and can act as pointers for sensor selection for safety-critical presentation attack detection systems. The source codes and protocols to reproduce the results are made available publicly making it possible to extend this work to other architectures.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源