Anomaly Detection-Based Unknown Face Presentation Attack Detection

07/11/2020
by   Yashasvi Baweja, et al.
3

Anomaly detection-based spoof attack detection is a recent development in face Presentation Attack Detection (fPAD), where a spoof detector is learned using only non-attacked images of users. These detectors are of practical importance as they are shown to generalize well to new attack types. In this paper, we present a deep-learning solution for anomaly detection-based spoof attack detection where both classifier and feature representations are learned together end-to-end. First, we introduce a pseudo-negative class during training in the absence of attacked images. The pseudo-negative class is modeled using a Gaussian distribution whose mean is calculated by a weighted running mean. Secondly, we use pairwise confusion loss to further regularize the training process. The proposed approach benefits from the representation learning power of the CNNs and learns better features for fPAD task as shown in our ablation study. We perform extensive experiments on four publicly available datasets: Replay-Attack, Rose-Youtu, OULU-NPU and Spoof in Wild to show the effectiveness of the proposed approach over the previous methods. Code is available at: <https://github.com/yashasvi97/IJCB2020_anomaly>

READ FULL TEXT
research
07/02/2018

Client-Specific Anomaly Detection for Face Presentation Attack Detection

The one-class anomaly detection approach has previously been found to be...
research
12/09/2021

Transfer learning using deep neural networks for Ear Presentation Attack Detection: New Database for PAD

Ear recognition system has been widely studied whereas there are just a ...
research
04/17/2019

Deep Anomaly Detection for Generalized Face Anti-Spoofing

Face recognition has achieved unprecedented results, surpassing human ca...
research
03/01/2023

Multimodal Industrial Anomaly Detection via Hybrid Fusion

2D-based Industrial Anomaly Detection has been widely discussed, however...
research
02/26/2023

Learning Pairwise Interaction for Generalizable DeepFake Detection

A fast-paced development of DeepFake generation techniques challenge the...
research
04/22/2021

An End-to-End Computer Vision Methodology for Quantitative Metallography

Metallography is crucial for a proper assessment of material's propertie...
research
12/19/2022

UAVCAN Dataset Description

We collected attack data from unmanned vehicles using the UAVCAN protoco...

Please sign up or login with your details

Forgot password? Click here to reset