Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Face representation attack detection method based on LBP-VAE anomaly detection model

A LBP-VAE, anomaly detection technology, applied in the field of image processing and biosecurity, can solve the problems of small number of pictures, inability to work, and the performance of the binary classification method plummets, achieving strong noise robustness and good generalization. Effect

Active Publication Date: 2020-05-15
SOUTH CHINA UNIV OF TECH
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the small number of pictures in the current live detection data set and the large differences between different types of attack images, the most important thing is that there are many unknown attack types in the actual scene. here comes a big challenge
The current method mainly regards liveness detection as a binary classification task. However, from the above difficulties, the binary classifier learned from the existing small number of attack samples with large intra-class differences will not work in the face of unknown attack types. Existing experiments have shown that the performance of the binary classification method drops sharply in the face of cross-dataset testing, and it is difficult to apply it to actual scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face representation attack detection method based on LBP-VAE anomaly detection model
  • Face representation attack detection method based on LBP-VAE anomaly detection model
  • Face representation attack detection method based on LBP-VAE anomaly detection model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0044] This embodiment discloses a face representation attack detection method based on the LBP-VAE anomaly detection model, such as figure 1 As shown, the face representation attack detection method includes the following steps:

[0045] S1. Construct an LBP-VAE anomaly detection model.

[0046] LBP (Local Binary Pattern) is a powerful texture feature descriptor, which establishes features by comparing the pixel values ​​of a central pixel of the image and its surrounding pixels. Indicates the equivalent LBP feature with a center pixel number of 1 and surrounding pixel points of 8, that is, each time a 3*3 area in the image is taken, and the pixel values ​​​​of the central pixel point and the surrounding 8 pixel points are compared sequentially, using 0 -1 indicates the comparison result, and an 8-bit binary number can be obtained. The formula is described as follows:

[0047]

[0048] Among them, P=8, R=1, r c Represents the pixel value of the center pixel, r n Repre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a face representation attack detection method based on an LBP-VAE anomaly detection model. The method comprises the steps of constructing a LBP-VAE anomaly detection model, obtaining a training sample, wherein the training sample only needs a real sample, extracting LBP features from the training sample to obtain a sample feature vector, taking the feature vector of the training sample as the input of VAE, and training a VAE network to obtain a complete LBP-VAE anomaly detection model, wherein when a human face representation attack sample is input into the model, the output error of the VAE network is very large and will be detected as anomaly due to the fact that sample feature space distribution is different from that of a real sample, and when the real sample isinput into the model, the output error of the VAE network is small, so that two types of samples can be distinguished. The attack detection method disclosed by the invention has good detection performances for different types of face representation attack samples, is strong in noise robustness, and can adapt to different real scenes.

Description

technical field [0001] The invention relates to the technical fields of image processing and biological security, in particular to a face representation attack detection method based on an LBP-VAE anomaly detection model. Background technique [0002] Nowadays, face recognition technology has been applied in all aspects of daily life, such as face attendance system, mobile phone face unlocking, face payment and so on. When the face becomes the key biometric feature in many identification and authentication systems, once a malicious person pretends to be a legitimate user and successfully passes the face recognition system, it will bring unpredictable security accidents and economic losses. Attempts to use legitimate user's face photos, videos and other means to borrow the user's identity through the operation of the face recognition system are called face representation attacks. The method of detecting this type of attack is called face detection. [0003] In human face li...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06K9/46G06K9/62G06N3/08
CPCG06N3/084G06V40/45G06V10/40G06V10/467G06F18/214Y02T10/40
Inventor 傅予力许晓燕谢扬吕玲玲肖芸榕黄汉业向友君
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products