Cross-domain face presentation attack detection techniques with attention to genuine faces

Face recognition as a convenient approach for automatic identity verification has become increasingly prevailing in recent years. The presentation attack (PA) is a serious threat hindering the application of face recognition systems in security-critical scenarios. Face presentation attack detection...

Full description

Saved in:
Bibliographic Details
Main Author: Li, Zhi
Other Authors: Alex Chichung Kot
Format: Thesis-Doctor of Philosophy
Language:English
Published: Nanyang Technological University 2023
Subjects:
Online Access:https://hdl.handle.net/10356/165704
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-165704
record_format dspace
spelling sg-ntu-dr.10356-1657042023-05-02T06:33:01Z Cross-domain face presentation attack detection techniques with attention to genuine faces Li, Zhi Alex Chichung Kot Lam Kwok Yan School of Computer Science and Engineering kwokyan.lam@ntu.edu.sg, EACKOT@ntu.edu.sg Engineering::Computer science and engineering Face recognition as a convenient approach for automatic identity verification has become increasingly prevailing in recent years. The presentation attack (PA) is a serious threat hindering the application of face recognition systems in security-critical scenarios. Face presentation attack detection (PAD) is an essential anti-spoofing measure to enhance the security of face recognition systems by discriminating presentation attacks from bona fide attempts. Existing methods have achieved good performance in intra-domain testing, where the testing data is from the same distribution as training data. However, when testing the face PAD models in a new target domain, the performance will degrade severely since the testing data could be from unseen distributions which are different from the training data. In this thesis, we explore the cross-domain problems in face PAD and introduce several methods to apply to different application scenarios. In consideration of the intrinsic difference between genuine face and attack samples, such as the feasibility and the expense of data collection in practical scenarios, our methods are devised with more attention to genuine face samples. Considering that the attackers may launch presentation attacks with novel spoofing mediums, we study the unseen attack problem in face PAD in the first work and propose method based on deep metric learning. We learn a discriminative feature space with a hypersphere loss which forces the genuine face samples to maintain intra-class compactness and ensure inter-class separation from the attack samples. Since the decision-making is directly conducted on the learned feature space, there is no need for additional classifiers to be trained. Beyond the threats of unseen attacks, the changes in illumination conditions and camera sensors will also degrade the reliability of the face PAD systems. In the second work, we tackle the generalization problems in face PAD and propose a bi-modality method that better generalizes to unseen attack and illumination variations. We establish the connection between face images of different modalities via asymmetric modality translation. The discrepancy of modality translation between genuine faces and attack samples is used as a compelling clue for discriminating various spoofing faces from genuine faces. Domain adaptation is a typical approach to improving the cross-domain performance of face PAD with the help of target domain data. However, it has always been a non-trivial challenge to collect sufficient data samples in the target domain, especially for attack samples. In the third work, we improve the cross-domain performance of the face PAD by only using a few genuine face samples collected in the target domain. We propose a method by introducing teacher-student learning to address the one-class domain adaptation problem in face PAD. The similarity score between the representations of the teacher and student networks is used to distinguish attacks from genuine ones. To verify the effectiveness of the proposed methods, we devise protocols and conduct extensive experiments on multiple datasets. The experimental results show that our methods outperform prior methods. Doctor of Philosophy 2023-04-10T03:46:51Z 2023-04-10T03:46:51Z 2023 Thesis-Doctor of Philosophy Li, Z. (2023). Cross-domain face presentation attack detection techniques with attention to genuine faces. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/165704 https://hdl.handle.net/10356/165704 10.32657/10356/165704 en This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0). application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
spellingShingle Engineering::Computer science and engineering
Li, Zhi
Cross-domain face presentation attack detection techniques with attention to genuine faces
description Face recognition as a convenient approach for automatic identity verification has become increasingly prevailing in recent years. The presentation attack (PA) is a serious threat hindering the application of face recognition systems in security-critical scenarios. Face presentation attack detection (PAD) is an essential anti-spoofing measure to enhance the security of face recognition systems by discriminating presentation attacks from bona fide attempts. Existing methods have achieved good performance in intra-domain testing, where the testing data is from the same distribution as training data. However, when testing the face PAD models in a new target domain, the performance will degrade severely since the testing data could be from unseen distributions which are different from the training data. In this thesis, we explore the cross-domain problems in face PAD and introduce several methods to apply to different application scenarios. In consideration of the intrinsic difference between genuine face and attack samples, such as the feasibility and the expense of data collection in practical scenarios, our methods are devised with more attention to genuine face samples. Considering that the attackers may launch presentation attacks with novel spoofing mediums, we study the unseen attack problem in face PAD in the first work and propose method based on deep metric learning. We learn a discriminative feature space with a hypersphere loss which forces the genuine face samples to maintain intra-class compactness and ensure inter-class separation from the attack samples. Since the decision-making is directly conducted on the learned feature space, there is no need for additional classifiers to be trained. Beyond the threats of unseen attacks, the changes in illumination conditions and camera sensors will also degrade the reliability of the face PAD systems. In the second work, we tackle the generalization problems in face PAD and propose a bi-modality method that better generalizes to unseen attack and illumination variations. We establish the connection between face images of different modalities via asymmetric modality translation. The discrepancy of modality translation between genuine faces and attack samples is used as a compelling clue for discriminating various spoofing faces from genuine faces. Domain adaptation is a typical approach to improving the cross-domain performance of face PAD with the help of target domain data. However, it has always been a non-trivial challenge to collect sufficient data samples in the target domain, especially for attack samples. In the third work, we improve the cross-domain performance of the face PAD by only using a few genuine face samples collected in the target domain. We propose a method by introducing teacher-student learning to address the one-class domain adaptation problem in face PAD. The similarity score between the representations of the teacher and student networks is used to distinguish attacks from genuine ones. To verify the effectiveness of the proposed methods, we devise protocols and conduct extensive experiments on multiple datasets. The experimental results show that our methods outperform prior methods.
author2 Alex Chichung Kot
author_facet Alex Chichung Kot
Li, Zhi
format Thesis-Doctor of Philosophy
author Li, Zhi
author_sort Li, Zhi
title Cross-domain face presentation attack detection techniques with attention to genuine faces
title_short Cross-domain face presentation attack detection techniques with attention to genuine faces
title_full Cross-domain face presentation attack detection techniques with attention to genuine faces
title_fullStr Cross-domain face presentation attack detection techniques with attention to genuine faces
title_full_unstemmed Cross-domain face presentation attack detection techniques with attention to genuine faces
title_sort cross-domain face presentation attack detection techniques with attention to genuine faces
publisher Nanyang Technological University
publishDate 2023
url https://hdl.handle.net/10356/165704
_version_ 1765213809987813376