4.7 Article

Face Spoofing Detection Based on Multiple Descriptor Fusion Using Multiscale Dynamic Binarized Statistical Image Features

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2015.2458700

关键词

Face spoofing; multiscale binarized statistical image features on three orthogonal planes (MBSIF-TOP); multiscale local phase quantization on three orthogonal planes; kernel discriminant analysis; kernel fusion

资金

  1. European Union Project Beat
  2. Engineering and Physical Sciences Research Council/Defence Science and Technology Laboratory Project [EP/K014307/1]
  3. EPSRC [EP/F069421/1, EP/K014307/2, EP/H050000/1, EP/K014307/1] Funding Source: UKRI
  4. Engineering and Physical Sciences Research Council [EP/K014307/1, EP/F069421/1, EP/K014307/2, EP/H050000/1] Funding Source: researchfish

向作者/读者索取更多资源

Face recognition has been the focus of attention for the past couple of decades and, as a result, a significant progress has been made in this area. However, the problem of spoofing attacks can challenge face biometric systems in practical applications. In this paper, an effective countermeasure against face spoofing attacks based on a kernel discriminant analysis approach is presented. Its success derives from different innovations. First, it is shown that the recently proposed multiscale dynamic texture descriptor based on binarized statistical image features on three orthogonal planes (MBSIF-TOP) is effective in detecting spoofing attacks, showing promising performance compared with existing alternatives. Next, by combining MBSIF-TOP with a blur-tolerant descriptor, namely, the dynamic multiscale local phase quantization (MLPQ-TOP) representation, the robustness of the spoofing attack detector can be further improved. The fusion of the information provided by MBSIF-TOP and MLPQ-TOP is realized via a kernel fusion approach based on a fast kernel discriminant analysis (KDA) technique. It avoids the costly eigen-analysis computations by solving the KDA problem via spectral regression. The experimental evaluation of the proposed system on different databases demonstrates its advantages in detecting spoofing attacks in various imaging conditions, compared with the existing methods.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据