Unseen face presentation attack detection using sparse multiple kernel fisher null-space

buir.contributor.authorArashloo, Shervin Rahimzadeh
dc.contributor.authorArashloo, Shervin Rahimzadehen_US
dc.date.accessioned2021-03-09T06:30:11Z
dc.date.available2021-03-09T06:30:11Z
dc.date.issued2020
dc.departmentDepartment of Computer Engineeringen_US
dc.description.abstractWe address the face presentation attack detection problem in the challenging conditions of an unseen attack scenario where the system is exposed to novel presentation attacks that were not available in the training stage. To this aim, we pose the unseen face presentation attack detection (PAD) problem as the one-class kernel Fisher null-space regression and present a new face PAD approach that only uses bona fide (genuine) samples for training. Drawing on the proposed kernel Fisher null-space face PAD method and motivated by the availability of multiple information sources, next, we propose a multiple kernel fusion anomaly detection approach to combine the complementary information provided by different views of the problem for improved detection performance. And the last but not the least, we introduce a sparse variant of our multiple kernel Fisher null-space face PAD approach to improve inference speed at the operational phase without compromising much on the detection performance. The results of an experimental evaluation on the OULU-NPU, Replay-Mobile, Replay-Attack and MSU-MFSD datasets illustrate that the proposed method outperforms other methods operating in an unseen attack detection scenario while achieving very competitive performance to multi-class methods (that benefit from presentation attack data for training) despite using only bona fide samples in the training stage.en_US
dc.description.provenanceSubmitted by Onur Emek (onur.emek@bilkent.edu.tr) on 2021-03-09T06:30:11Z No. of bitstreams: 1 Unseen_Face_Presentation_Attack_Detection_Using_Sparse_Multiple_Kernel_Fisher_Null-Space.pdf: 2378755 bytes, checksum: 4fa459a7c57581b202080bfff1cb65f6 (MD5)en
dc.description.provenanceMade available in DSpace on 2021-03-09T06:30:11Z (GMT). No. of bitstreams: 1 Unseen_Face_Presentation_Attack_Detection_Using_Sparse_Multiple_Kernel_Fisher_Null-Space.pdf: 2378755 bytes, checksum: 4fa459a7c57581b202080bfff1cb65f6 (MD5) Previous issue date: 2020en
dc.identifier.doi10.1109/TCSVT.2020.3046505en_US
dc.identifier.issn1051-8215
dc.identifier.urihttp://hdl.handle.net/11693/75896
dc.language.isoEnglishen_US
dc.publisherIEEEen_US
dc.relation.isversionofhttps://dx.doi.org/10.1109/TCSVT.2020.3046505en_US
dc.source.titleIEEE Transactions on Circuits and Systems for Video Technologyen_US
dc.subjectFace presentation attack detectionen_US
dc.subjectAnti-spoofingen_US
dc.subjectUnseen attacksen_US
dc.subjectNovelty detectionen_US
dc.subjectOne-class classificationen_US
dc.subjectKernel regressionen_US
dc.subjectMultiple kernel fusionen_US
dc.subjectSparse regularisationen_US
dc.titleUnseen face presentation attack detection using sparse multiple kernel fisher null-spaceen_US
dc.typeArticleen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Unseen_Face_Presentation_Attack_Detection_Using_Sparse_Multiple_Kernel_Fisher_Null-Space.pdf
Size:
2.27 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: