计算机科学 ›› 2021, Vol. 48 ›› Issue (4): 316-324.doi: 10.11896/jsjkx.200300128

• 信息安全 • 上一篇    下一篇

基于注意力的热点块和显著像素卷积神经网络的人脸防伪方法

吴晓丽, 胡伟   

  1. 北京化工大学信息科学与技术学院 北京100029
  • 收稿日期:2020-06-24 出版日期:2021-04-15 发布日期:2021-04-09
  • 通讯作者: 胡伟(huwei@mail.buct.edu.cn)

Attention-based Hot Block and Saliency Pixel Convolutional Neural Network Method for Face Anti-spoofing

WU Xiao-li, HU Wei   

  1. College of Information Science and Technology,Beijing University of Chemical Technology,Beijing 100029,China
  • Received:2020-06-24 Online:2021-04-15 Published:2021-04-09
  • About author:WU Xiao-li,born in 1995,postgraduate.Her main research interests include face anti-spoofing and deep learning.(xlwu@mail.buct.edu.cn)
    HU Wei,born in 1979,Ph.D,associate professor.His main research interests include face recognition,real-time global illumination rendering,image editing,image recognition and multiple-projector based tiled display.

摘要: 人脸防伪用于验证被测试者是否为真实活体,是计算机视觉领域的一个研究热点。攻击手段的多样性以及人脸识别主要在嵌入式、移动式等不具备高计算能力的设备上应用,使得快速有效的人脸防伪计算成为具有挑战性的任务。针对该问题,文中提出了一种基于注意力的热点块和显著像素卷积神经网络的方法。其中,热点块机制以对5个热点块的判别来取代对整张人脸的判别,显著降低了计算量,迫使网络模型集中关注更具有鉴别信息的热点块,提高了网络模型的准确率;显著像素方法对输入的人脸图像进行显著像素预测,通过判断显著预测图是否符合人脸的深度特性来鉴别活体与攻击。该方法将热点块与显著像素的结果进行融合,充分发挥了局部特征和全局特征的作用,进一步提升了人脸防伪的效果。与现有方法相比,所提方法在CASIA-MFSD、Replay-Attack以及SiW数据集上都达到了很好的效果。

关键词: 活体检测, 卷积神经网络, 热点块, 人脸防伪, 显著像素, 注意力机制

Abstract: Face anti-spoofing is used to verify whether the testee is a real person.The diversity of attack methods and the application of face recognition on various embedded and mobile devices with low computing capabilities have made face anti-spoofing a very challenging task.Aiming at face anti-spoofing,an attention-based hot block and saliency pixel convolutional neural network method is proposed.The hot block method replaces the discrimination of the entire face with the determination of 5 hot blocks,which not only reduces the amount of calculation,but also forces the network to focus on hot spots with more discerning information,so as to improve the accuracy of the network.On the other hand,the saliency pixel method performs saliency pixel prediction on the input face image to determine whether the saliency prediction map meets depth characteristics of the face to identify the liveness and the attack.This method fuses the results of hot blocks and saliency pixels to give full play to the role of local features and global features,and further enhances the effect of face anti-spoofing.Compared with existing methods,the proposed method has achieved good results on CASIA-MFSD,Replay-Attack and SiW datasets.

Key words: Attention mechanism, Convolutional neural network, Face anti-spoofing, Hot block, Liveness detection, Saliency pixel

中图分类号: 

  • TP183
[1]MÄÄTTÄ J,HADID A,PIETIKÄINEN M.Face spoofing detection from single images using micro-texture analysis[C]//2011 International Joint Conference on Biometrics(IJCB).2011:1-7.
[2]DE FREITAS PEREIRA T,ANJOS A,DE MARTINO J M,et al.LBP-TOP Based Countermeasure against Face Spoofing Attacks[C]//Computer Vision - ACCV 2012 Workshops.Berlin,Heidelberg:Springer,2013:121-132.
[3]DE FREITAS PEREIRA T,ANJOS A,DE MARTINO J M,et al.Can face anti-spoofing countermeasures work in a real world scenario?[C]//2013 International Conference on Biometrics(ICB).2013:1-8.
[4]KOMULAINEN J,HADID A,PIETIKÄINEN M.Contextbased face anti-spoofing[C]//2013 IEEE Sixth International Conference on Biometrics:Theory,Applications and Systems(BTAS).2013:1-8.
[5]YANG J W,LEI Z,LIAO S H,et al.Face liveness detectionwith component dependent descriptor[C]//2013 International Conference on Biometrics(ICB).2013:1-6.
[6]PATEL K,HAN H,JAIN A K.Secure Face Unlock:Spoof Detection on Smartphones[J].IEEE Transactions on Information Forensics and Security,2016,11(10):2268-2283.
[7]BOULKENAFET Z,KOMULAINEN J,HADID A.Face An-tispoofing Using Speeded-Up Robust Features and Fisher Vector Encoding[J].IEEE Signal Processing Letters,2017,24(2):141-145.
[8]BOULKENAFET Z,KOMULAINEN J,HADID A.Face Spoofing Detection Using Colour Texture Analysis[J].IEEE Transactions on Information Forensics and Security,2016,11(8):1818-1830.
[9]BOULKENAFET Z,KOMULAINEN J,HADID A.Face anti-spoofing based on color texture analysis[C]//2015 IEEE International Conference on Image Processing(ICIP).2015:2636-2640.
[10]LI J W,WANG Y H,TAN T N,et al.Live face detection based on the analysis of Fourier spectra[C]//Biometric Technology for Human Identification.Proceedings of SPIE - The International Society for Optical Engineering,2004,5404:296-303.
[11]PAN G,SUN L,WU Z H,et al.Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera[C]//2007 IEEE 11th International Conference on Computer Vision.2007:1-8.
[12]SUN L,PAN G,WU Z H,et al.Blinking-Based Live Face Detection Using Conditional Random Fields[C]//Advances in Biometrics.Berlin,Heidelberg:Springer,2007:252-260.
[13]KOLLREIDER K,FRONTHALER H,FARAJ M I,et al.Real-Time Face Detection and Motion Analysis With Application in “Liveness” Assessment[J].IEEE Transactions on Information Forensics and Security,2007,2(3):548-558.
[14]YANG J,LEI Z,LI S Z.Learn Convolutional Neural Network for Face Anti-Spoofing[J/OL].CoRR,2014,http://arxiv.org/abs/1408.5601.
[15]PATEL K,HAN H,JAIN A K.Cross-Database Face An-tispoofing with Robust Feature Representation[C]//Biometric Recognition.Cham:Springer International Publishing,2016:611-619.
[16]LI L,FENG X Y,BOULKENAFET Z,et al.An original face anti-spoofing approach using partial convolutional neural network[C]//2016 Sixth International Conference on Image Processing Theory,Tools and Applications(IPTA).2016:1-6.
[17]FENG L T,PO L M,LI Y M,et al.Integration of image quality and motion cues for face anti-spoofing:A neural network approach[J].Journal of Visual Communication and Image Representation,2016,38:451-460.
[18]ATOUM Y,LIU Y J,JOURABLOO A,et al.Face anti-spoofing using patch and depth-based CNNs[C]//2017 IEEE International Joint Conference on Biometrics(IJCB).2017:319-328.
[19]JOURABLOO A,LIU Y J,LIU X M.Face De-spoofing:Anti-spoofing via Noise Modeling[C]//Computer Vision - ECCV 2018.Cham:Springer International Publishing,2018:297-315.
[20]LIU Y J,STEHOUWER J,JOURABLOO A,et al.Deep Tree Learning for Zero-Shot Face Anti-Spoofing[C]//2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).2019:4675-4684.
[21]XU Z Q,LI S,DENG W D.Learning temporal features using LSTM-CNN architecture for face anti-spoofing[C]//2015 3rd IAPR Asian Conference on Pattern Recognition(ACPR).2015:141-145.
[22]YANG X,LUO W H,BAO L C,et al.Face Anti-Spoofing:Mo-del Matters,so Does Data[C]//2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).2019:3502-3511.
[23]LIU Y J,JOURABLOO A,LIU X M.Learning Deep Models for Face Anti-Spoofing:Binary or Auxiliary Supervision[C]//2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.2018:389-398.
[24]ZHANG S F,WANG X B,LIU A J,et al.A Dataset and Benchmark for Large-Scale Multi-Modal Face Anti-Spoofing[C]//2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).2019:919-928.
[25]ZHANG X Y,ZHOU X Y,LIN M X,et al.ShuffleNet:An Extremely Efficient Convolutional Neural Network for Mobile Devices[C]//2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.2018:6848-6856.
[26]LIU J J,HOU Q B,CHENG M M,et al.A Simple Pooling-Based Design for Real-Time Salient Object Detection[C]//2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).2019:3912-3921.
[27]ZHANG Z W,YAN J J,LIU S F,et al.A face anti-spoofing database with diverse attacks[C]//2012 5th IAPR International Conference on Biometrics(ICB).2012:26-31.
[28]CHINGOVSKA I,ANJOS A,MARCEL S.On the effectiveness of local binary patterns in face anti-spoofing[C]//2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group(BIOSIG).2012:1-7.
[29]FENG Y,WU F,SHAO X H,et al.Joint 3D Face Reconstruction and Dense Alignment with Position Map Regression Network[C]//Computer Vision - ECCV 2018.Cham:Springer International Publishing,2018:557-574.
[30]WU X,HE R,SUN Z N,et al.A Light CNN for Deep Face Representation With Noisy Labels[J].IEEE Transactions on Information Forensics and Security,2018,13(11):2884-2896.
[31]WANG Z Z,ZHAO C X,QIN Y X,et al.Exploiting temporal and depth information for multi-frame face anti-spoofing[J/OL].CoRR,2018,http://arxiv.org/abs/1811.05118.
[32]SIDDIQUI T A,BHARADWAJ S,DHAMECHA T I,et al.Face anti-spoofing with multifeature videolet aggregation[C]//2016 23rd International Conference on Pattern Recognition(ICPR).2016:1035-1040.
[33]AGARWAL A,SINGH R,VATSA M.Face anti-spoofing using Haralick features[C]//2016 IEEE 8th International Conference on Biometrics Theory,Applications and Systems(BTAS).2016:1-6.
[34]PATEL K,HAN H,JAIN A K,et al.Live face video vs.spoof face video:Use of moiré patterns to detect replay video attacks[C]//2015 International Conference on Biometrics(ICB).2015:98-105.
[35]ARASHLOO S R,KITTLER J,CHRISTMAS W.An Anomaly Detection Approach to Face Spoofing Detection:A New Formulation and Evaluation Protocol[J].IEEE Access,2017,5:13868-13882.
[36]BOULKENAFET Z,KOMULAINEN J,LI L,et al.OULU-NPU:A Mobile Face Presentation Attack Database with Real-World Variations[C]//2017 12th IEEE International Confe-rence on Automatic Face & Gesture Recognition(FG 2017).2017:612-618.
[37]XIONG F,ABDALMAGEED W.Unknown Presentation Attack Detection with Face RGB Images[C]//2018 IEEE 9th International Conference on Biometrics Theory,Applications and Systems(BTAS).2018:1-9.
[38]ISO/IEC JTC 1/SC 37.Information technology-Biometric pre-sentation attack detection:ISO/IEC 30107-1[S].Online Browsing Platform,2016.
[1] 饶志双, 贾真, 张凡, 李天瑞.
基于Key-Value关联记忆网络的知识图谱问答方法
Key-Value Relational Memory Networks for Question Answering over Knowledge Graph
计算机科学, 2022, 49(9): 202-207. https://doi.org/10.11896/jsjkx.220300277
[2] 周芳泉, 成卫青.
基于全局增强图神经网络的序列推荐
Sequence Recommendation Based on Global Enhanced Graph Neural Network
计算机科学, 2022, 49(9): 55-63. https://doi.org/10.11896/jsjkx.210700085
[3] 戴禹, 许林峰.
基于文本行匹配的跨图文本阅读方法
Cross-image Text Reading Method Based on Text Line Matching
计算机科学, 2022, 49(9): 139-145. https://doi.org/10.11896/jsjkx.220600032
[4] 周乐员, 张剑华, 袁甜甜, 陈胜勇.
多层注意力机制融合的序列到序列中国连续手语识别和翻译
Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion
计算机科学, 2022, 49(9): 155-161. https://doi.org/10.11896/jsjkx.210800026
[5] 熊丽琴, 曹雷, 赖俊, 陈希亮.
基于值分解的多智能体深度强化学习综述
Overview of Multi-agent Deep Reinforcement Learning Based on Value Factorization
计算机科学, 2022, 49(9): 172-182. https://doi.org/10.11896/jsjkx.210800112
[6] 李宗民, 张玉鹏, 刘玉杰, 李华.
基于可变形图卷积的点云表征学习
Deformable Graph Convolutional Networks Based Point Cloud Representation Learning
计算机科学, 2022, 49(8): 273-278. https://doi.org/10.11896/jsjkx.210900023
[7] 姜梦函, 李邵梅, 郑洪浩, 张建朋.
基于改进位置编码的谣言检测模型
Rumor Detection Model Based on Improved Position Embedding
计算机科学, 2022, 49(8): 330-335. https://doi.org/10.11896/jsjkx.210600046
[8] 汪鸣, 彭舰, 黄飞虎.
基于多时间尺度时空图网络的交通流量预测模型
Multi-time Scale Spatial-Temporal Graph Neural Network for Traffic Flow Prediction
计算机科学, 2022, 49(8): 40-48. https://doi.org/10.11896/jsjkx.220100188
[9] 陈泳全, 姜瑛.
基于卷积神经网络的APP用户行为分析方法
Analysis Method of APP User Behavior Based on Convolutional Neural Network
计算机科学, 2022, 49(8): 78-85. https://doi.org/10.11896/jsjkx.210700121
[10] 朱承璋, 黄嘉儿, 肖亚龙, 王晗, 邹北骥.
基于注意力机制的医学影像深度哈希检索算法
Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism
计算机科学, 2022, 49(8): 113-119. https://doi.org/10.11896/jsjkx.210700153
[11] 孙奇, 吉根林, 张杰.
基于非局部注意力生成对抗网络的视频异常事件检测方法
Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection
计算机科学, 2022, 49(8): 172-177. https://doi.org/10.11896/jsjkx.210600061
[12] 檀莹莹, 王俊丽, 张超波.
基于图卷积神经网络的文本分类方法研究综述
Review of Text Classification Methods Based on Graph Convolutional Network
计算机科学, 2022, 49(8): 205-216. https://doi.org/10.11896/jsjkx.210800064
[13] 闫佳丹, 贾彩燕.
基于双图神经网络信息融合的文本分类方法
Text Classification Method Based on Information Fusion of Dual-graph Neural Network
计算机科学, 2022, 49(8): 230-236. https://doi.org/10.11896/jsjkx.210600042
[14] 金方焱, 王秀利.
融合RACNN和BiLSTM的金融领域事件隐式因果关系抽取
Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM
计算机科学, 2022, 49(7): 179-186. https://doi.org/10.11896/jsjkx.210500190
[15] 熊罗庚, 郑尚, 邹海涛, 于化龙, 高尚.
融合双向门控循环单元和注意力机制的软件自承认技术债识别方法
Software Self-admitted Technical Debt Identification with Bidirectional Gate Recurrent Unit and Attention Mechanism
计算机科学, 2022, 49(7): 212-219. https://doi.org/10.11896/jsjkx.210500075
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!