Unseen face presentation attack detection using sparse multiple kernel fisher null-space
buir.contributor.author | Arashloo, Shervin Rahimzadeh | |
dc.contributor.author | Arashloo, Shervin Rahimzadeh | en_US |
dc.date.accessioned | 2021-03-09T06:30:11Z | |
dc.date.available | 2021-03-09T06:30:11Z | |
dc.date.issued | 2020 | |
dc.department | Department of Computer Engineering | en_US |
dc.description.abstract | We address the face presentation attack detection problem in the challenging conditions of an unseen attack scenario where the system is exposed to novel presentation attacks that were not available in the training stage. To this aim, we pose the unseen face presentation attack detection (PAD) problem as the one-class kernel Fisher null-space regression and present a new face PAD approach that only uses bona fide (genuine) samples for training. Drawing on the proposed kernel Fisher null-space face PAD method and motivated by the availability of multiple information sources, next, we propose a multiple kernel fusion anomaly detection approach to combine the complementary information provided by different views of the problem for improved detection performance. And the last but not the least, we introduce a sparse variant of our multiple kernel Fisher null-space face PAD approach to improve inference speed at the operational phase without compromising much on the detection performance. The results of an experimental evaluation on the OULU-NPU, Replay-Mobile, Replay-Attack and MSU-MFSD datasets illustrate that the proposed method outperforms other methods operating in an unseen attack detection scenario while achieving very competitive performance to multi-class methods (that benefit from presentation attack data for training) despite using only bona fide samples in the training stage. | en_US |
dc.description.provenance | Submitted by Onur Emek (onur.emek@bilkent.edu.tr) on 2021-03-09T06:30:11Z No. of bitstreams: 1 Unseen_Face_Presentation_Attack_Detection_Using_Sparse_Multiple_Kernel_Fisher_Null-Space.pdf: 2378755 bytes, checksum: 4fa459a7c57581b202080bfff1cb65f6 (MD5) | en |
dc.description.provenance | Made available in DSpace on 2021-03-09T06:30:11Z (GMT). No. of bitstreams: 1 Unseen_Face_Presentation_Attack_Detection_Using_Sparse_Multiple_Kernel_Fisher_Null-Space.pdf: 2378755 bytes, checksum: 4fa459a7c57581b202080bfff1cb65f6 (MD5) Previous issue date: 2020 | en |
dc.identifier.doi | 10.1109/TCSVT.2020.3046505 | en_US |
dc.identifier.issn | 1051-8215 | en_US |
dc.identifier.uri | http://hdl.handle.net/11693/75896 | en_US |
dc.language.iso | English | en_US |
dc.publisher | IEEE | en_US |
dc.relation.isversionof | https://dx.doi.org/10.1109/TCSVT.2020.3046505 | en_US |
dc.source.title | IEEE Transactions on Circuits and Systems for Video Technology | en_US |
dc.subject | Face presentation attack detection | en_US |
dc.subject | Anti-spoofing | en_US |
dc.subject | Unseen attacks | en_US |
dc.subject | Novelty detection | en_US |
dc.subject | One-class classification | en_US |
dc.subject | Kernel regression | en_US |
dc.subject | Multiple kernel fusion | en_US |
dc.subject | Sparse regularisation | en_US |
dc.title | Unseen face presentation attack detection using sparse multiple kernel fisher null-space | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Unseen_Face_Presentation_Attack_Detection_Using_Sparse_Multiple_Kernel_Fisher_Null-Space.pdf
- Size:
- 2.27 MB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: