Computer Science ›› 2021, Vol. 48 ›› Issue (2): 330-336.doi: 10.11896/jsjkx.200100020
• Information Security • Previous Articles
SUN Wen-yun1, JIN Zhong2, ZHAO Hai-tao3, CHEN Chang-sheng1
CLC Number:
[1] MENOTTI D,CHIACHIA G,PINTO A,et al.Deep representations for iris,face,and fingerprint spoofing detection[J].IEEE Transactions on Information Forensics and Security,2015,10(4):864-879. [2] REHMAN Y A U,PO L M,LIU M.Deep learning for face anti-spoofing:An end-to-end approach[C]//Signal Processing:Algorithms,Architectures,Arrangements,and Applications.IEEE,2017:195-200. [3] NAGPAL C,DUBEY S R.A Performance Evaluation of Convolutional Neural Networks for Face Anti Spoofing[C]//International Joint Conference on Neural Networks.IEEE,2018. [4] LIU Y,JOURABLOO A,LIU X.Learning deep models for face anti-spoofing:Binary or auxiliary supervision[C]//Conference on Computer Vision and Pattern Recognition.IEEE,2018:389-398. [5] ATOUM Y,LIU Y,JOURABLOO A,et al.Face anti-spoofing using patch and depth-based CNNs[C]//International Joint Conference on Biometrics.IEEE,2017:319-328. [6] GEORGE A,MARCEL S E B.Deep Pixel-wise Binary Supervision for Face Presentation Attack Detection[C]//International Conference on Biometrics.IEEE,2019. [7] SUN W,SONG Y,CHEN C,et al.Face Spoofing Detectionbased on Local Ternary Label Supervision in Fully Convolutio-nal Network[J].IEEE Transactions on Information Forensics and Security,2020,15:3181-3196. [8] JOURABLOO A,LIU Y,LIU X.Face de-spoofing:Anti-spoo-fing via noise modeling[C]//European Conference on Computer Vision.IEEE,2018:290-306. [9] YANG X,LUO W,BAO L,et al.Face Anti-Spoofing ModelMatters,So Does Data[C]//Conference on Computer Vision and Pattern Recognition.IEEE,2019:3507-3516. [10] BOULKENAFET Z,KOMULAINEN J,HADID A.Face Spoofing Detection Using Colour Texture Analysis[J].IEEE Transactions on Information Forensics and Security,2016,11(8):1818-1830. [11] BOULKENAFET Z,KOMULAINEN J,HADID A.Face anti-spoofing based on color texture analysis[C]//Conference on Ima-ge Processing.IEEE,2015:2636-2640. [12] NIKISINS O,MOHAMMADI A,ANJOS A E,et al.On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing[C]//International Confe-rence on Biometrics.IEEE,2018:75-81. [13] WEN D,HAN H,JAIN A K.Face spoof detection with image distortion analysis[J].IEEE Transactions on Information Forensics and Security,2015,10(4):746-761. [14] GALBALLY J,MARCEL S E B,FIERREZ J.Image quality assessment for fake biometric detection:Application to iris,fingerprint,and face recognition[J].IEEE Transactions on Image Processing,2014,23(2):710-724. [15] PATEL K,HAN H,JAIN A K.Secure face unlock:Spoof detection on smartphones[J].IEEE Transactions on Information Forensics and Security,2016,11(10):2268-2283. [16] KUMAR S,SINGH S,KUMAR J.A comparative study on face spoofing attacks[C]//International Conference on Computing,Communication and Automation.IEEE,2017:1104-1108. [17] MUAMMAR H,DRAGOTTI P L.An investigation into alia-sing in images recaptured from an LCD monitor using a digital camera[C]//International Conference on Acoustics,Speech and Signal Processing.IEEE,2013:2242-2246. [18] GARCIA D C,DE QUEIROZ R L.Face-spoofing 2D-detection based on moire-pattern analysis[J].IEEE Transactions on Information Forensics and Security,2015,10(4):778-786. [19] NI R,ZHAO Y,ZHAI X.Recaptured Images Forensics Based On Color Moments and DCT Coefficients Features[J].Journal of Information Hiding and Multimedia Signal Processing,2015,6(2):323-333. [20] MÄÄTTÄ J,HADID A,PIETIKÄINEN M.Face spoofing detection from single images using micro-texture analysis[C]//International Joint Conference on Biometrics.IEEE,2011. [21] PATEL K,HAN H,JAIN A K,et al.Live face video vs.spoof face video:Use of moire patterns to detect replay video attacks[C]//International Conference on Biometrics.IEEE,2015:98-105. [22] LI H,LI W,CAO H,et al.Unsupervised domain adaptation for face anti-spoofing[J].IEEE Transactions on Information Forensics and Security,2018,13(7):1794-1809. [23] ARASHLOO S R,KITTLER J,CHRISTMAS W.Face spoofing detection based on multiple descriptor fusion using multiscale dynamic binarized statistical image features[J].IEEE Transactions on Information Forensics and Security,2015,10(11):2396-2407. [24] YANG J,LEI Z,YI D,et al.Person-specific face antispoofing with subject domain adaptation[J].IEEE Transactions on Information Forensics and Security,2015,10(4):797-809. [25] DE FREITAS PEREIRA T,KOMULAINEN J,ANJOS A E,et al.Face liveness detection using dynamic texture[J].EURASIP Journal on Image and Video Processing,2014,2014(1):2. [26] SIMONYAN K,ZISSERMAN A.Two-stream convolutionalnetworks for action recognition in videos[C]//International Conference on Neural Information Processing Systems.NeurIPS Foundation,2014:568-576. [27] SUN W,ZHAO H,JIN Z.3D convolutional neural networks for facial expression classification[C]//Asian Conference on Computer Vision.AFCV,2016:528-543. [28] SUN W,ZHAO H,JIN Z.A facial expression recognition method based on ensemble of 3D convolutional neural networks[J].Neural Computing and Applications,2019,31(7):2795-2812. [29] YIN W,MING Y,TIAN L.A face anti-spoofing method based on optical flow field[C]//International Conference on Signal Processing.IEEE,2016:1333-1337. [30] PINTO A,PEDRINI H,SCHWARTZ W R,et al.Face spoofing detection through visual codebooks of spectral temporal cubes[J].IEEE Transactions on Image Processing,2015,24(12):4726-4740. [31] DE MARSICO M,NAPPI M,RICCIO D,et al.Moving facespoofing detection via 3D projective invariants[C]//Internatio-nal Conference on Biometrics.IEEE,2012:73-78. [32] SIMONYAN K,ZISSERMAN A.Very deep convolutional networks for large-scale image recognition[J].arXiv:1409.1556,2014. [33] DAUMÉ H I.Frustratingly easy domain adaptation[J].arXiv:0907.1815,2009. [34] BOUSMALIS K,TRIGEORGIS G,SILBERMAN N,et al.Domain separation networks[C]//International Conference on Neural Information Processing Systems.NeurIPS Foundation,2016:343-351. [35] ZHANG Z,YAN J,LIU S,et al.A face antispoofing database with diverse attacks[C]//IAPR International Conference on Biometrics.IEEE,2012:26-31. [36] CHINGOVSKA I,ANJOS A E,MARCEL S E B.On the Effectiveness of Local Binary Patterns in Face Anti-spoofing[C]//International Conference of Biometrics.IEEE,2012. [37] BOULKENAFET Z,KOMULAINEN J,LI L,et al.OULU-NPU:A mobile face presentation attack database with real-world variations[C]//International Conference on Automatic Face & Gesture Recognition.IEEE,2017. [38] HE H,GARCIA E A.Learning from imbalanced data[J].IEEE Transactions on Knowledge & Data Engineering,2008(9):1263-1284. [39] DE FREITAS PEREIRA T,ANJOS A E,DE MARTINO J E M,et al.Can face anti-spoofing countermeasures work in a real world scenario?[C]//International Conference on Biometrics.IEEE,2013. [40] BHARADWAJ S,DHAMECHA T I,VATSA M,et al.Computationally efficient face spoofing detection with motion magnification[C]//Conference on Computer Vision and Pattern Recognition.IEEE,2013:105-110. [41] YANG J,LEI Z,LI S Z.Learn convolutional neural network for face anti-spoofing[J].arXiv:1408.5601,2014. [42] BOULKENAFET Z,KOMULAINEN J,AKHTAR Z,et al.A competition on generalized software-based face presentation attack detection in mobile scenarios[C]//International Joint Conference on Biometrics.IEEE,2017:688-696. [43] LIN C,LIAO Z,ZHOU P,et al.Live Face Verification withMultiple Instantialized Local Homographic Parameterization[C]//International Joint Conference on Artificial Intelligence.IJCAI Organization,2018:814-820. |
[1] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[2] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[3] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[4] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[5] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[6] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[7] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[8] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[9] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[10] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[11] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[12] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
[13] | ZHU Wen-tao, LAN Xian-chao, LUO Huan-lin, YUE Bing, WANG Yang. Remote Sensing Aircraft Target Detection Based on Improved Faster R-CNN [J]. Computer Science, 2022, 49(6A): 378-383. |
[14] | WANG Jian-ming, CHEN Xiang-yu, YANG Zi-zhong, SHI Chen-yang, ZHANG Yu-hang, QIAN Zheng-kun. Influence of Different Data Augmentation Methods on Model Recognition Accuracy [J]. Computer Science, 2022, 49(6A): 418-423. |
[15] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
|