Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Face spoofing detection method and system based on multi-scale illumination invariance textural features

A texture feature and deception detection technology, applied in the field of face deception detection, can solve the problems of generalization performance and computational complexity limitations, algorithm generalization performance degradation, threats to the application of face recognition systems, etc.

Pending Publication Date: 2021-03-30
SOUTH CHINA UNIV OF TECH +1
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These face spoofing attacks are not only low in cost but also can deceive the system, seriously affecting and threatening the application of face recognition systems
[0003] In related research, texture features such as LBP, HoG, SIFT, and SURF are not only relatively rough in texture details but also easily affected by lighting and scenes; the calculation of detection algorithms based on physiological features such as depth maps and rppg signals (facial blood vessel beating signals) is complex non-illumination features such as MSR (multi-scale retinal features) and reflectance maps cannot retain rich deception traces and textures; existing methods generally have large limitations in generalization performance and computational complexity
[0004] The existing face anti-spoofing detection algorithm can achieve a good detection effect in the library, but the generalization performance of the algorithm will be seriously reduced when the illumination and environment change greatly; in addition, the face recognition system is widely used in embedded terminals , mobile devices and monitoring devices, it is difficult to meet the high storage and high computing requirements of existing face anti-spoofing detection algorithms in terms of computing and storage resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face spoofing detection method and system based on multi-scale illumination invariance textural features
  • Face spoofing detection method and system based on multi-scale illumination invariance textural features
  • Face spoofing detection method and system based on multi-scale illumination invariance textural features

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0083] The present embodiment adopts the data sets of CASIA-MFSD face deception database, MSU_MFSD database and Replay-Attack database to carry out training and detection;

[0084] Among them, the CASIA-MFSD face spoofing database is divided into a training set taken by 20 people and a test set taken by 30 people, and fake faces are made by recapturing real faces. The database uses three types of cameras to collect videos with different imaging qualities, and the resolutions are 640×480 pixels, 480×640 pixels, and 1920×1080 pixels. Attack methods include: bending photo attack, cutting photo attack, and video replay attack; a total of 50 people and 600 videos were involved.

[0085] The Replay-Attack database consists of real and attack videos of 50 people. The shooting equipment is a MacBook camera with a resolution of 320×240 pixels. The 1200 videos captured are divided into two lighting conditions: (1) uniform background, fluorescent lighting; (2) background Uneven, poor li...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a face deception detection method and system based on multi-scale illumination invariance textural features. The method comprises the following steps: framing a video, extracting a face image, and carrying out channel separation to obtain a color channel graph; obtaining an illumination invariant texture feature map through an illumination separation texture reservation module, performing normalization, combining the normalized illumination invariant texture feature map with the color channel map to obtain face features, and performing data enhancement to obtain to-be-trained input features; constructing a multi-scale texture module by using the center difference convolution of multiple receptive fields, and embedding the multi-scale texture module into a lightweight network to construct a lightweight multi-scale texture network; weighting the pixel-level loss and the cross entropy loss into total loss; inputting the input features into a lightweight multi-scaletexture network to learn deception features of texture naturalness; updating network parameters according to the loss function, and storing a network model and the parameters after training is completed; and predicting a classification result according to the stored model. The deception features of texture naturalness are accurately extracted, the generalization performance of the model is effectively improved, and the storage and calculation consumption of deployment is reduced.

Description

technical field [0001] The invention relates to the technical field of face spoofing detection, in particular to a face spoofing detection method and system based on multi-scale illumination invariant texture features. Background technique [0002] Face biometrics has rich and unique personal information for authentication and identification, and has become the most popular biometric feature because of its convenience and friendliness, and has achieved extremely accurate identification verification performance. However, there are many kinds of face spoofing attacks: photo attack means that the attacker uses printed photos or face images on the display screen to deceive the authentication system; video replay attack means that the attacker uses the pre-recorded video of the victim to deceive the authentication system ; Face mask attack means that the attacker wears a mask carefully crafted according to the face of the victim to deceive the system; adversarial sample attack me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00G06K9/34G06K9/62G06N3/08G06N3/04
CPCG06N3/08G06V40/168G06V40/45G06V10/267G06N3/045G06F18/214Y02T10/40
Inventor 胡永健罗鑫葛治中刘琲贝王宇飞
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products