计算机科学 ›› 2021, Vol. 48 ›› Issue (4): 316-324.doi: 10.11896/jsjkx.200300128
吴晓丽, 胡伟
WU Xiao-li, HU Wei
摘要: 人脸防伪用于验证被测试者是否为真实活体,是计算机视觉领域的一个研究热点。攻击手段的多样性以及人脸识别主要在嵌入式、移动式等不具备高计算能力的设备上应用,使得快速有效的人脸防伪计算成为具有挑战性的任务。针对该问题,文中提出了一种基于注意力的热点块和显著像素卷积神经网络的方法。其中,热点块机制以对5个热点块的判别来取代对整张人脸的判别,显著降低了计算量,迫使网络模型集中关注更具有鉴别信息的热点块,提高了网络模型的准确率;显著像素方法对输入的人脸图像进行显著像素预测,通过判断显著预测图是否符合人脸的深度特性来鉴别活体与攻击。该方法将热点块与显著像素的结果进行融合,充分发挥了局部特征和全局特征的作用,进一步提升了人脸防伪的效果。与现有方法相比,所提方法在CASIA-MFSD、Replay-Attack以及SiW数据集上都达到了很好的效果。
中图分类号:
[1]MÄÄTTÄ J,HADID A,PIETIKÄINEN M.Face spoofing detection from single images using micro-texture analysis[C]//2011 International Joint Conference on Biometrics(IJCB).2011:1-7. [2]DE FREITAS PEREIRA T,ANJOS A,DE MARTINO J M,et al.LBP-TOP Based Countermeasure against Face Spoofing Attacks[C]//Computer Vision - ACCV 2012 Workshops.Berlin,Heidelberg:Springer,2013:121-132. [3]DE FREITAS PEREIRA T,ANJOS A,DE MARTINO J M,et al.Can face anti-spoofing countermeasures work in a real world scenario?[C]//2013 International Conference on Biometrics(ICB).2013:1-8. [4]KOMULAINEN J,HADID A,PIETIKÄINEN M.Contextbased face anti-spoofing[C]//2013 IEEE Sixth International Conference on Biometrics:Theory,Applications and Systems(BTAS).2013:1-8. [5]YANG J W,LEI Z,LIAO S H,et al.Face liveness detectionwith component dependent descriptor[C]//2013 International Conference on Biometrics(ICB).2013:1-6. [6]PATEL K,HAN H,JAIN A K.Secure Face Unlock:Spoof Detection on Smartphones[J].IEEE Transactions on Information Forensics and Security,2016,11(10):2268-2283. [7]BOULKENAFET Z,KOMULAINEN J,HADID A.Face An-tispoofing Using Speeded-Up Robust Features and Fisher Vector Encoding[J].IEEE Signal Processing Letters,2017,24(2):141-145. [8]BOULKENAFET Z,KOMULAINEN J,HADID A.Face Spoofing Detection Using Colour Texture Analysis[J].IEEE Transactions on Information Forensics and Security,2016,11(8):1818-1830. [9]BOULKENAFET Z,KOMULAINEN J,HADID A.Face anti-spoofing based on color texture analysis[C]//2015 IEEE International Conference on Image Processing(ICIP).2015:2636-2640. [10]LI J W,WANG Y H,TAN T N,et al.Live face detection based on the analysis of Fourier spectra[C]//Biometric Technology for Human Identification.Proceedings of SPIE - The International Society for Optical Engineering,2004,5404:296-303. [11]PAN G,SUN L,WU Z H,et al.Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera[C]//2007 IEEE 11th International Conference on Computer Vision.2007:1-8. [12]SUN L,PAN G,WU Z H,et al.Blinking-Based Live Face Detection Using Conditional Random Fields[C]//Advances in Biometrics.Berlin,Heidelberg:Springer,2007:252-260. [13]KOLLREIDER K,FRONTHALER H,FARAJ M I,et al.Real-Time Face Detection and Motion Analysis With Application in “Liveness” Assessment[J].IEEE Transactions on Information Forensics and Security,2007,2(3):548-558. [14]YANG J,LEI Z,LI S Z.Learn Convolutional Neural Network for Face Anti-Spoofing[J/OL].CoRR,2014,http://arxiv.org/abs/1408.5601. [15]PATEL K,HAN H,JAIN A K.Cross-Database Face An-tispoofing with Robust Feature Representation[C]//Biometric Recognition.Cham:Springer International Publishing,2016:611-619. [16]LI L,FENG X Y,BOULKENAFET Z,et al.An original face anti-spoofing approach using partial convolutional neural network[C]//2016 Sixth International Conference on Image Processing Theory,Tools and Applications(IPTA).2016:1-6. [17]FENG L T,PO L M,LI Y M,et al.Integration of image quality and motion cues for face anti-spoofing:A neural network approach[J].Journal of Visual Communication and Image Representation,2016,38:451-460. [18]ATOUM Y,LIU Y J,JOURABLOO A,et al.Face anti-spoofing using patch and depth-based CNNs[C]//2017 IEEE International Joint Conference on Biometrics(IJCB).2017:319-328. [19]JOURABLOO A,LIU Y J,LIU X M.Face De-spoofing:Anti-spoofing via Noise Modeling[C]//Computer Vision - ECCV 2018.Cham:Springer International Publishing,2018:297-315. [20]LIU Y J,STEHOUWER J,JOURABLOO A,et al.Deep Tree Learning for Zero-Shot Face Anti-Spoofing[C]//2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).2019:4675-4684. [21]XU Z Q,LI S,DENG W D.Learning temporal features using LSTM-CNN architecture for face anti-spoofing[C]//2015 3rd IAPR Asian Conference on Pattern Recognition(ACPR).2015:141-145. [22]YANG X,LUO W H,BAO L C,et al.Face Anti-Spoofing:Mo-del Matters,so Does Data[C]//2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).2019:3502-3511. [23]LIU Y J,JOURABLOO A,LIU X M.Learning Deep Models for Face Anti-Spoofing:Binary or Auxiliary Supervision[C]//2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.2018:389-398. [24]ZHANG S F,WANG X B,LIU A J,et al.A Dataset and Benchmark for Large-Scale Multi-Modal Face Anti-Spoofing[C]//2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).2019:919-928. [25]ZHANG X Y,ZHOU X Y,LIN M X,et al.ShuffleNet:An Extremely Efficient Convolutional Neural Network for Mobile Devices[C]//2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.2018:6848-6856. [26]LIU J J,HOU Q B,CHENG M M,et al.A Simple Pooling-Based Design for Real-Time Salient Object Detection[C]//2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).2019:3912-3921. [27]ZHANG Z W,YAN J J,LIU S F,et al.A face anti-spoofing database with diverse attacks[C]//2012 5th IAPR International Conference on Biometrics(ICB).2012:26-31. [28]CHINGOVSKA I,ANJOS A,MARCEL S.On the effectiveness of local binary patterns in face anti-spoofing[C]//2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group(BIOSIG).2012:1-7. [29]FENG Y,WU F,SHAO X H,et al.Joint 3D Face Reconstruction and Dense Alignment with Position Map Regression Network[C]//Computer Vision - ECCV 2018.Cham:Springer International Publishing,2018:557-574. [30]WU X,HE R,SUN Z N,et al.A Light CNN for Deep Face Representation With Noisy Labels[J].IEEE Transactions on Information Forensics and Security,2018,13(11):2884-2896. [31]WANG Z Z,ZHAO C X,QIN Y X,et al.Exploiting temporal and depth information for multi-frame face anti-spoofing[J/OL].CoRR,2018,http://arxiv.org/abs/1811.05118. [32]SIDDIQUI T A,BHARADWAJ S,DHAMECHA T I,et al.Face anti-spoofing with multifeature videolet aggregation[C]//2016 23rd International Conference on Pattern Recognition(ICPR).2016:1035-1040. [33]AGARWAL A,SINGH R,VATSA M.Face anti-spoofing using Haralick features[C]//2016 IEEE 8th International Conference on Biometrics Theory,Applications and Systems(BTAS).2016:1-6. [34]PATEL K,HAN H,JAIN A K,et al.Live face video vs.spoof face video:Use of moiré patterns to detect replay video attacks[C]//2015 International Conference on Biometrics(ICB).2015:98-105. [35]ARASHLOO S R,KITTLER J,CHRISTMAS W.An Anomaly Detection Approach to Face Spoofing Detection:A New Formulation and Evaluation Protocol[J].IEEE Access,2017,5:13868-13882. [36]BOULKENAFET Z,KOMULAINEN J,LI L,et al.OULU-NPU:A Mobile Face Presentation Attack Database with Real-World Variations[C]//2017 12th IEEE International Confe-rence on Automatic Face & Gesture Recognition(FG 2017).2017:612-618. [37]XIONG F,ABDALMAGEED W.Unknown Presentation Attack Detection with Face RGB Images[C]//2018 IEEE 9th International Conference on Biometrics Theory,Applications and Systems(BTAS).2018:1-9. [38]ISO/IEC JTC 1/SC 37.Information technology-Biometric pre-sentation attack detection:ISO/IEC 30107-1[S].Online Browsing Platform,2016. |
[1] | 饶志双, 贾真, 张凡, 李天瑞. 基于Key-Value关联记忆网络的知识图谱问答方法 Key-Value Relational Memory Networks for Question Answering over Knowledge Graph 计算机科学, 2022, 49(9): 202-207. https://doi.org/10.11896/jsjkx.220300277 |
[2] | 周芳泉, 成卫青. 基于全局增强图神经网络的序列推荐 Sequence Recommendation Based on Global Enhanced Graph Neural Network 计算机科学, 2022, 49(9): 55-63. https://doi.org/10.11896/jsjkx.210700085 |
[3] | 戴禹, 许林峰. 基于文本行匹配的跨图文本阅读方法 Cross-image Text Reading Method Based on Text Line Matching 计算机科学, 2022, 49(9): 139-145. https://doi.org/10.11896/jsjkx.220600032 |
[4] | 周乐员, 张剑华, 袁甜甜, 陈胜勇. 多层注意力机制融合的序列到序列中国连续手语识别和翻译 Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion 计算机科学, 2022, 49(9): 155-161. https://doi.org/10.11896/jsjkx.210800026 |
[5] | 熊丽琴, 曹雷, 赖俊, 陈希亮. 基于值分解的多智能体深度强化学习综述 Overview of Multi-agent Deep Reinforcement Learning Based on Value Factorization 计算机科学, 2022, 49(9): 172-182. https://doi.org/10.11896/jsjkx.210800112 |
[6] | 李宗民, 张玉鹏, 刘玉杰, 李华. 基于可变形图卷积的点云表征学习 Deformable Graph Convolutional Networks Based Point Cloud Representation Learning 计算机科学, 2022, 49(8): 273-278. https://doi.org/10.11896/jsjkx.210900023 |
[7] | 姜梦函, 李邵梅, 郑洪浩, 张建朋. 基于改进位置编码的谣言检测模型 Rumor Detection Model Based on Improved Position Embedding 计算机科学, 2022, 49(8): 330-335. https://doi.org/10.11896/jsjkx.210600046 |
[8] | 汪鸣, 彭舰, 黄飞虎. 基于多时间尺度时空图网络的交通流量预测模型 Multi-time Scale Spatial-Temporal Graph Neural Network for Traffic Flow Prediction 计算机科学, 2022, 49(8): 40-48. https://doi.org/10.11896/jsjkx.220100188 |
[9] | 陈泳全, 姜瑛. 基于卷积神经网络的APP用户行为分析方法 Analysis Method of APP User Behavior Based on Convolutional Neural Network 计算机科学, 2022, 49(8): 78-85. https://doi.org/10.11896/jsjkx.210700121 |
[10] | 朱承璋, 黄嘉儿, 肖亚龙, 王晗, 邹北骥. 基于注意力机制的医学影像深度哈希检索算法 Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism 计算机科学, 2022, 49(8): 113-119. https://doi.org/10.11896/jsjkx.210700153 |
[11] | 孙奇, 吉根林, 张杰. 基于非局部注意力生成对抗网络的视频异常事件检测方法 Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection 计算机科学, 2022, 49(8): 172-177. https://doi.org/10.11896/jsjkx.210600061 |
[12] | 檀莹莹, 王俊丽, 张超波. 基于图卷积神经网络的文本分类方法研究综述 Review of Text Classification Methods Based on Graph Convolutional Network 计算机科学, 2022, 49(8): 205-216. https://doi.org/10.11896/jsjkx.210800064 |
[13] | 闫佳丹, 贾彩燕. 基于双图神经网络信息融合的文本分类方法 Text Classification Method Based on Information Fusion of Dual-graph Neural Network 计算机科学, 2022, 49(8): 230-236. https://doi.org/10.11896/jsjkx.210600042 |
[14] | 金方焱, 王秀利. 融合RACNN和BiLSTM的金融领域事件隐式因果关系抽取 Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM 计算机科学, 2022, 49(7): 179-186. https://doi.org/10.11896/jsjkx.210500190 |
[15] | 熊罗庚, 郑尚, 邹海涛, 于化龙, 高尚. 融合双向门控循环单元和注意力机制的软件自承认技术债识别方法 Software Self-admitted Technical Debt Identification with Bidirectional Gate Recurrent Unit and Attention Mechanism 计算机科学, 2022, 49(7): 212-219. https://doi.org/10.11896/jsjkx.210500075 |
|