项目作者: ee09115

项目描述 :
Cork/Face Presentation Attack Detection
高级语言: Python
项目地址: git://github.com/ee09115/spoofing_detection.git
创建时间: 2018-02-05T18:55:17Z
项目社区:https://github.com/ee09115/spoofing_detection

开源协议:

下载


Presentation Attack Detection

Overview

This repository is dedicated to the image-based Presentation Attack Detection - PAD - systems in two different domains: (i) cork and (ii) face PAD. The proposed PAD system relies on the combination of two different color spaces and uses only a single frame to distinguish from a bona fide image and an image attack, see Fig. 1.



Fig. 1 - General flowchart for the developed image-based PAD system.

Contents

Results














MethodPrint-attackReplay-attack
EER(%)HTER(%)EER(%)HTER(%)
YCRCB+LUV+ETC [1] 1.33 0.00 0.00756 0.5954
YCRCB+LUV+SVM [1] 0.00 1.76 4.30 7.86

Cork Spoofing Detection



Face Spoofing Detection




Demonstrative results of the proposed face PAD system - YCRCB+LUV+ETC. The classification model used in this test was trained using the training set of the Replay-Attack database.

How to cite

If you use any part of this work please cite [1]:

  1. @InProceedings{10.1007/978-3-030-05288-1_15,
  2. author="Costa, Valter
  3. and Sousa, Armando
  4. and Reis, Ana",
  5. editor="Barneva, Reneta P.
  6. and Brimkov, Valentin E.
  7. and Tavares, Jo{\~a}o Manuel R.S.",
  8. title="Image-Based Object Spoofing Detection",
  9. booktitle="Combinatorial Image Analysis",
  10. year="2018",
  11. publisher="Springer International Publishing",
  12. address="Cham",
  13. pages="189--201",
  14. abstract="Using 2D images in authentication systems raises the question of spoof attacks: is it possible to deceive an authentication system using fake models possessing identical visual properties of the genuine one? In this work, an anti-spoofing method approach for a wine anti-counterfeiting system is presented. The proposed method relies in two different color spaces: CIE L*u*v* and {\$}{\$}YC{\_}rC{\_}b{\$}{\$}, to distinguish between a genuine instance and a spoof attack. To evaluate the proposed strategy, two databases were used: a private database, with photos/2D attacks of cork stoppers, created for this work; and the public Replay-Attack database that is used for face spoofing detection methods testing. The results on the private database show that the anti-spoofing approach is able to distinguish with high accuracy a real photo from an attack. Regarding the public database, the results were obtained with existing methods, as the best HTER results using a single frame approach.",
  15. isbn="978-3-030-05288-1"
  16. }