Face spoofing detection
There has been a growing adoption of face recognition systems being used for biometric authentication. Therefore, it is crucial to ensure that facial recognition systems are safe from malicious impersonation attempts to gain access. Which could to theft of confidential information or valuables store...
Saved in:
主要作者: | |
---|---|
其他作者: | |
格式: | Final Year Project |
語言: | English |
出版: |
Nanyang Technological University
2022
|
主題: | |
在線閱讀: | https://hdl.handle.net/10356/157823 |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
機構: | Nanyang Technological University |
語言: | English |
總結: | There has been a growing adoption of face recognition systems being used for biometric authentication. Therefore, it is crucial to ensure that facial recognition systems are safe from malicious impersonation attempts to gain access. Which could to theft of confidential information or valuables stored in applications these systems are typing to protect
Thus, this project proposes and develop a presentation attack detection system based on a lightweight machine learning model for Near Infrared (NIR) camera facial recognition systems such that it could work well on devices with limited computational power such as mobile phones.
The proposed model will classify faces detected from a face detection model as a live or spoof face. As there are limited face spoofing detection datasets with NIR image, this project opted to use RGB datasets (CelebA-Spoof and LCC_FASD) that are easier to find, and data augment the images to look more like NIR images. The proposed model will focus on being lightweight while trying to maintain state of the art performance in detecting impersonation attempts.
Lastly while the proposed model demonstrates strong performance during the testing, with achieving an accuracy of 95.6% and 84.5% when evaluated with the validation and test dataset respectively with the model size being as low as 2MB. This report also discusses the results from the live demonstration to test the model’s strengths across different real-life scenarios. |
---|