2020
DOI: 10.48550/arxiv.2007.02157
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Face Anti-Spoofing with Human Material Perception

Abstract: Face anti-spoofing (FAS) plays a vital role in securing the face recognition systems from presentation attacks. Most existing FAS methods capture various cues (e.g., texture, depth and reflection) to distinguish the live faces from the spoofing faces. All these cues are based on the discrepancy among physical materials (e.g., skin, glass, paper and silicone). In this paper we rephrase face anti-spoofing as a material recognition problem and combine it with classical human material perception [1], intending to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 64 publications
0
8
0
Order By: Relevance
“…Most works [7], [19], [47], [48] treat FAS as a binary classification supervised by simple binary cross-entropy loss. In contrast, pseudo depth labels [6], [9], reflection maps [5], [49], and binary mask label [19] are utilized as auxiliary supervision signals as the pixel-wise guidance is able to learn more detailed information. On the other hand, according to the dynamic discrepancy [13], [14] between live and spoofing faces, several video level methods are presented to exploit the dynamic spatio-temporal [8], [13], [50], [51] or rPPG [6], [52], [53] features for PAD.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most works [7], [19], [47], [48] treat FAS as a binary classification supervised by simple binary cross-entropy loss. In contrast, pseudo depth labels [6], [9], reflection maps [5], [49], and binary mask label [19] are utilized as auxiliary supervision signals as the pixel-wise guidance is able to learn more detailed information. On the other hand, according to the dynamic discrepancy [13], [14] between live and spoofing faces, several video level methods are presented to exploit the dynamic spatio-temporal [8], [13], [50], [51] or rPPG [6], [52], [53] features for PAD.…”
Section: Related Workmentioning
confidence: 99%
“…In the past few years, both traditional [1], [2], [3] and deep learning-based [4], [5], [6], [7], [8], [9], [10] methods have shown effectiveness for presentation attack detection (PAD). On one hand, some classical local descriptors (e.g., local binary pattern (LBP) [11] and histogram of gradient (HOG) [2]) are robust for describing the detailed invariant information (e.g., color texture, moiré pattern and noise artifacts) from spoofing faces.…”
Section: Introductionmentioning
confidence: 99%
“…Based on auxiliary information, some methods regularized features from the perspective of disentanglement [30,15]. Some methods put forward specific convolution operators to extract spoof cues, such as CDCN [28], BCN [25], DC-CDN [27], etc. To achieve improvements in cross-testing, [21,5,20,12] adopted the strategy of domain generalization, meta-learning and few-shot learning.…”
Section: Related Workmentioning
confidence: 99%
“…Based on auxiliary information, the method [23,48] regularized features from the perspective of disentanglement. Some methods [43,44] put forward specific convolution operators to extract spoof cues, such as CDCN [45], BCN [40]. The above methods got high performance under the intra-dataset setting, where the testing data comes from a similar distribution of training data.…”
Section: Related Work 21 Face Anti-spoofingmentioning
confidence: 99%