论文标题
对多通道生物特征识别表现攻击检测的全面评估
A Comprehensive Evaluation on Multi-channel Biometric Face Presentation Attack Detection
论文作者
论文摘要
反对演示攻击的脆弱性是破坏面部识别系统广泛部署的关键问题。尽管演示攻击检测(PAD)系统试图解决这个问题,但缺乏概括和鲁棒性仍然是一个主要问题。几项工作表明,使用多通道垫系统可以减轻这种漏洞,并导致更健壮的系统。但是,有多种通道可用于PAD系统,例如RGB,近红外,短波红外,深度和热传感器。拥有大量传感器会增加系统的成本,因此在选择模式时需要了解不同传感器对各种攻击的性能。在这项工作中,我们进行了一项全面的研究,以了解各种成像方式对PAD的有效性。这些研究是在多通道垫数据集上进行的,该数据集采用14种不同的感应方式收集,考虑到2D,3D和部分攻击。我们使用了基于多渠道卷积网络的体系结构,该体系结构使用像素二进制监督。该模型已通过渠道的不同组合进行评估,以及各种具有挑战性和未知攻击方案的不同图像质量。结果揭示了有趣的趋势,并可以充当传感器选择的指针,以确保关键的呈现攻击检测系统。复制结果的源代码和协议已公开提供,使得将此工作扩展到其他体系结构成为可能。
The vulnerability against presentation attacks is a crucial problem undermining the wide-deployment of face recognition systems. Though presentation attack detection (PAD) systems try to address this problem, the lack of generalization and robustness continues to be a major concern. Several works have shown that using multi-channel PAD systems could alleviate this vulnerability and result in more robust systems. However, there is a wide selection of channels available for a PAD system such as RGB, Near Infrared, Shortwave Infrared, Depth, and Thermal sensors. Having a lot of sensors increases the cost of the system, and therefore an understanding of the performance of different sensors against a wide variety of attacks is necessary while selecting the modalities. In this work, we perform a comprehensive study to understand the effectiveness of various imaging modalities for PAD. The studies are performed on a multi-channel PAD dataset, collected with 14 different sensing modalities considering a wide range of 2D, 3D, and partial attacks. We used the multi-channel convolutional network-based architecture, which uses pixel-wise binary supervision. The model has been evaluated with different combinations of channels, and different image qualities on a variety of challenging known and unknown attack protocols. The results reveal interesting trends and can act as pointers for sensor selection for safety-critical presentation attack detection systems. The source codes and protocols to reproduce the results are made available publicly making it possible to extend this work to other architectures.