MToFNet: Object Anti-Spoofing with Mobile Time-of-Flight Data

10/06/2021
by   Yonghyun Jeong, et al.
0

In online markets, sellers can maliciously recapture others' images on display screens to utilize as spoof images, which can be challenging to distinguish in human eyes. To prevent such harm, we propose an anti-spoofing method using the paired rgb images and depth maps provided by the mobile camera with a Time-of-Fight sensor. When images are recaptured on display screens, various patterns differing by the screens as known as the moiré patterns can be also captured in spoof images. These patterns lead the anti-spoofing model to be overfitted and unable to detect spoof images recaptured on unseen media. To avoid the issue, we build a novel representation model composed of two embedding models, which can be trained without considering the recaptured images. Also, we newly introduce mToF dataset, the largest and most diverse object anti-spoofing dataset, and the first to utilize ToF data. Experimental results confirm that our model achieves robust generalization even across unseen domains.

READ FULL TEXT

page 1

page 4

page 8

research
03/29/2020

Noise Modeling, Synthesis and Classification for Generic Object Anti-Spoofing

Using printed photograph and replaying videos of biometric modalities, s...
research
06/29/2020

Creating Artificial Modalities to Solve RGB Liveness

Special cameras that provide useful features for face anti-spoofing are ...
research
04/04/2022

Anti-Spoofing Using Transfer Learning with Variational Information Bottleneck

Recent advances in sophisticated synthetic speech generated from text-to...
research
08/18/2023

Robust Audio Anti-Spoofing with Fusion-Reconstruction Learning on Multi-Order Spectrograms

Robust audio anti-spoofing has been increasingly challenging due to the ...
research
04/12/2019

KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures

Email breaches are commonplace, and they expose a wealth of personal, bu...
research
06/15/2021

Spoofing Generalization: When Can't You Trust Proprietary Models?

In this work, we study the computational complexity of determining wheth...
research
06/18/2020

Use of in-the-wild images for anomaly detection in face anti-spoofing

The traditional approach to face anti-spoofing sees it as a binary class...

Please sign up or login with your details

Forgot password? Click here to reset