Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230400022-7.doi: 10.11896/jsjkx.230400022
• Information Security • Previous Articles Next Articles
WANG Chundong, LI Quan, FU Haoran, HAO Qingbo
CLC Number:
[1]YAO Y J,MA X C,GONG W,et al.In the era of face authenti-cation,is your“face” still safe[J].Policy Research & Exploration,2017(23):28-29. [2]LIU S Y.Criminal regulation of cracking face recognition and authentication from the perspective of cooperative crime[J].Journal of Henan University of Economics and Law,2021,36(4):41-51. [3]JIANG F L,LIU P C,ZHOU X D.A review on face anti-spoofing[J].Acta Automatica Sinica,2021,47(8):1799-1821. [4]GALBALLY J,MARCEL S.Face anti-spoofing based on general image quality assessment[C]//2014 22nd International Conference on Pattern Recognition.IEEE,2014:1173-1178. [5]MA Y K,WU L F,JIAN M,et al.Algorithm to generateadversarial examples for face-spoofing detection[J].Journal of Software,2019,30(2):469-480. [6]ZHANG B,TONDI B,BARNI M.Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability[J].Computer Vision and Image Understanding,2020,197-198:102988. [7]MIAO J.Risk challenge and regulatory research of face recognition facing “easy to crack”[J].Journal of Information Security Research,2021,7(10):984. [8]SABOUR S,FROSST N,HINTON G E.Dynamic routing between capsules[C]//Proc.of 31st Conference on Neural Information Processing Systems(NIPS).MIT Press,2017:3859-3869. [9]SINGH A K,JOSHI P,NANDI G C.Face recognition with liveness detection using eye and mouth movement[C]//2014 International Conference on Signal Propagation and Computer Technology(ICSPCT 2014).IEEE,2014:592-597. [10]MA Y X,TAN L,DONG X,et al.Interactive livenessdetection algorithm for VTM[J].Computer Engineering,2019,45(3):256-261. [11]ZHANG J,ZHANG N N.Research on interactive face detection based on optimized feature extraction[J].Computer Engineering and Applications,2019,55(13):193-200. [12]MÄÄTTÄ J,HADID A,PIETIKÄINEN M.Face spoofing detection from single images using micro-texture analysis[C]//2011 International Joint Conference on Biometrics(IJCB).IEEE,2011:1-7. [13]BOULKENAFET Z,KOMULAINEN J,HADID A.Face anti-spoofing based on color texture analysis[C]//2015 IEEE International Conference on Image Processing(ICIP).IEEE,2015:2636-2640. [14]FENG J,DONG Z Y,LIU T T,et al.Face anti-spoofingliveness detection combining DQ_ CoALBP with LPQ descriptors[J].Computer Engineering and Applications,2022,58(14):134-143. [15]ZHOU J,SHU K,ZHAO D,et al.Domain adaptation based person-specific face anti-spoofing using color texture features[C]//Proceedings of the 2020 5th International Conference on Machine Learning Technologies.2020:79-85. [16]SHU X,TANG H,HUANG S.Face spoofing detection based on chromatic ED-LBP texture feature[J].Multimedia Systems,2021,27:161-176. [17]ZHOU J,SHU K,LIU P,et al.Face anti-spoofing based on dynamic color texture analysis using local directional number pattern[C]//2020 25th International Conference on Pattern Recognition(ICPR).IEEE,2021:4221-4228. [18]ZHANG L B,PENG F,QIN L,et al.Face spoofing detectionbased on color texture Markov feature and support vector machine recursive feature elimination[J].Journal of Visual Communication and Image Representation,2018,51:56-69. [19]SHU X,TANG H,YANG X B,et al.Research on face anti-spoofing algorithm based on DQ_LBP[J].Journal of Computer Research and Development,2020,057():1508-1521. [20]DANIEL N,ANITHA A.Texture and quality analysis for face spoofing detection[J].Computers & Electrical Engineering,2021,94(1):107293. [21]CHANG H H,YEH C H.Face anti-spoofing detection based on multi-scale image quality assessment[J].Image and Vision Computing,2022,121:104428. [22]WEN D,HAN H,JAIN A K.Face spoof detection with image distortion analysis[J].IEEE Transactions on Information Forensics & Security,2015,10(4):746-761. [23]ZHANG S,WANG X,LIU A,et al.A dataset and benchmark for large-scale multi-modal face anti-spoofing[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2019:919-928. [24]ZHANG P,ZOU F,WU Z,et al.FeatherNets:Convolutionalneural networks as light as feather for face anti-spoofing[C]//2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops(CVPRW).IEEE,2019. [25]SHEN T,HUANG Y.FaceBagNet:Bag-of-local-features model for multi-modal face anti-spoofing[C]//The IEEE Conference on Computer Vision and Pattern Recognition Workshops(CVPRW 2019).IEEE,2019. [26]PADNEVYCH R,SEMEDO D,CARMO D,et al.Improvingface liveness detection robustness with deep convolutional generative adversarial networks[C]//2022 30th European Signal Processing Conference(EUSIPCO).IEEE,2022. [27]LI X,WU W,LI T,et al.Face face liveness detection based on parallel CNN[J].Journal of Physics:Conference Series,2020,1549(4):042069. [28]SHEKHAR S,PATEL A,HALOI M,et al.An ensemble model for face liveness detection[EB/OL].(2022-01-19)[2023-02-17].https://arxiv.org/abs/2201.08901. [29]YU Z,WAN J,QIN Y,et al.NAS-FAS:Static-dynamic central difference network search for face anti-spoofing[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2020,43(9):3005-3023. [30]AKHTAR N,MIAN A.Threat of adversarial attacks on deep learning in computer vision:A survey[D].Ithaca:Cornell University,2018. [31]FROSST N,SABOUR S,HINTON G.DARCCC:Detecting adversaries by reconstruction from class conditional capsules[EB/OL].(2018-11-16)[2023-02-17].https://arxiv.org/abs/1811.06969. [32]QIN Y,FROSST N,SABOUR S,et al.Detecting and diagnosingadversarial images with class-conditional capsule reconstructions[C]//International Conference on Learning Representations.2020. [33]QIN Y,FROSST N,RAFFEL C,et al.Deflecting adversarial attacks[EB/OL].(2020-02-18)[2023-02-17].https://arxiv.org/abs/2002.07405. [34]LAND E.Lightness and retinex theory[J].Journal of the Optical Society of America,1971,61(1):1-11. [35]HOWARD A G,ZHU M,CHEN B,et al.MobileNets:Efficient convolutional neural net-works for mobile vision applications[EB/OL].(2017-04-17)[2023-02-17].https://arxiv.org/abs/1704.04861. [36]KURAKIN A,GOODFELLOW I,BENGIO S,et al.Adversarial machine learning at scale[EB/OL].(2017-02-11)[2023-02-17].https://arxiv.org/abs/1611.01236. [37]SU J,VARGAS D V,KOUICHI S.One pixel attack for fooling deep neural networks[J].IEEE Transactions on Evolutionary Computation,2019,23(5):828-841. [38]LUO W,LI Y,URTASUN R,et al.Under-standing the effective receptive field in deep convo-lutional neural networks[C]//Proceedings of the 30th International Conference on Neural Information Processing Systems.2016:4905-4913. [39]YU Z,ZHAO C,WANG Z,et al.Searching central differenceconvolutional networks for face anti-spoofing[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:5295-5305. |
[1] | LI Kun, GUO Wei, ZHANG Fan, DU Jiayu, YANG Meiyue. Adversarial Malware Generation Method Based on Genetic Algorithm [J]. Computer Science, 2023, 50(7): 325-331. |
[2] | ZHAO Zitian, ZHAN Wenhan, DUAN Hancong, WU Yue. Study on Adversarial Robustness of Deep Learning Models Based on SVD [J]. Computer Science, 2023, 50(10): 362-368. |
[3] | WU Zi-bin, YAN Qiao. Projected Gradient Descent Algorithm with Momentum [J]. Computer Science, 2022, 49(6A): 178-183. |
[4] | SHEN Chao, HE Xi-ping. Face Anti-spoofing Algorithm Based on Texture Feature Enhancement and Light Neural Network [J]. Computer Science, 2022, 49(6A): 390-396. |
[5] | ZHAO Zheng-peng, LI Jun-gang, PU Yuan-yuan. Low-light Image Enhancement Based on Retinex Theory by Convolutional Neural Network [J]. Computer Science, 2022, 49(6): 199-209. |
[6] | CHEN Meng-xuan, ZHANG Zhen-yong, JI Shou-ling, WEI Gui-yi, SHAO Jun. Survey of Research Progress on Adversarial Examples in Images [J]. Computer Science, 2022, 49(2): 92-106. |
[7] | YANG Hao, YAN Qiao. Adversarial Character CAPTCHA Generation Method Based on Differential Evolution Algorithm [J]. Computer Science, 2022, 49(11A): 211100074-5. |
[8] | WANG Yi-han, HAO Shi-jie, HAN Xu, HONG Ri-chang. Low-light Image Enhancement Model with Low Rank Approximation [J]. Computer Science, 2022, 49(1): 187-193. |
[9] | WANG Chao, WEI Xiang-lin, TIAN Qing, JIAO Xiang, WEI Nan, DUAN Qiang. Feature Gradient-based Adversarial Attack on Modulation Recognition-oriented Deep Neural Networks [J]. Computer Science, 2021, 48(7): 25-32. |
[10] | ZHUO Ya-qian, OU Bo. Face Anti-spoofing Algorithm for Noisy Environment [J]. Computer Science, 2021, 48(6A): 443-447. |
[11] | WU Xiao-li, HU Wei. Attention-based Hot Block and Saliency Pixel Convolutional Neural Network Method for Face Anti-spoofing [J]. Computer Science, 2021, 48(4): 316-324. |
[12] | TONG Xin, WANG Bin-jun, WANG Run-zheng, PAN Xiao-qin. Survey on Adversarial Sample of Deep Learning Towards Natural Language Processing [J]. Computer Science, 2021, 48(1): 258-267. |
[13] | LIU Yang, ZHANG Jie, ZHANG Hui. Study and Application of Improved Retinex Algorithm in Image Defogging [J]. Computer Science, 2018, 45(6A): 242-243. |
[14] | ZHAO Jun-hui, WU Yu-feng, HU Kun-rong and PU Bin. Color Image Enhancement Algorithm Based on Lab Color Space and Tone Mapping [J]. Computer Science, 2018, 45(2): 297-300. |
[15] | ZHANG Xiang, WANG Wei, XIAO Di. Improved Image Enhancemengt Algorithm Based on Multi-scale Retinex with Chromaticity Preservation [J]. Computer Science, 2018, 45(10): 246-249. |
|