ABSTRACT
Facial anti-spoofing distinguishes between real and fake faces in images and videos, which is crucial for security systems like facial authentication and payment applications. The Zalo AI Challenge organized a competition for more than 250 teams to use real-world face data to address this problem. In this article, we proposed to use the Swin Transformer backbone combined with a suitable pipeline, which helped us achieve second place in the competition. The competition evaluation results indicate that the proposed solution offers high accuracy with a Time-constraint EER of 7.1% and a faster processing time compared to other solutions.
- Yousef Atoum, Yaojie Liu, Amin Jourabloo, and Xiaoming Liu. 2017. Face anti-spoofing using patch and depth-based CNNs. In 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 319–328.Google ScholarDigital Library
- Tiago de Freitas Pereira, André Anjos, José Mario De Martino, and Sébastien Marcel. 2013. LBP- TOP based countermeasure against face spoofing attacks. In Computer Vision-ACCV 2012 Workshops: ACCV 2012 International Workshops, Daejeon, Korea, November 5-6, 2012, Revised Selected Papers, Part I 11. Springer, 121–132.Google ScholarDigital Library
- Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, 2020. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020).Google Scholar
- Anjith George and Sébastien Marcel. 2021. On the effectiveness of vision transformers for zero-shot face anti-spoofing. In 2021 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 1–8.Google ScholarDigital Library
- Raden Budiarto Hadiprakoso, Hermawan Setiawan, 2020. Face anti-spoofing using CNN classifier & face liveness detection. In 2020 3rd International Conference on Information and Communications Technology (ICOIACT). IEEE, 143–147.Google ScholarCross Ref
- Md Rezwan Hasan, SM Hasan Mahmud, and Xiang Yu Li. 2019. Face anti-spoofing using texture-based techniques and filtering methods. In Journal of Physics: Conference Series, Vol. 1229. IOP Publishing, 012044.Google Scholar
- Yunseung Lee, Youngjun Kwak, and Jinho Shin. 2023. Robust face anti-spoofing framework with Convolutional Vision Transformer. arXiv preprint arXiv:2307.12459 (2023).Google Scholar
- Lei Li, Xiaoyi Feng, Zinelabidine Boulkenafet, Zhaoqiang Xia, Mingming Li, and Abdenour Hadid. 2016. An original face anti-spoofing approach using partial convolutional neural network. In 2016 Sixth international conference on image processing theory, tools and applications (IPTA). IEEE, 1–6.Google ScholarCross Ref
- Sheng Li, Xun Zhu, Guorui Feng, Xinpeng Zhang, and Zhenxing Qian. 2021. Diffusing the Liveness Cues for Face Anti-spoofing. In Proceedings of the 29th ACM International Conference on Multimedia. 1636–1644.Google ScholarDigital Library
- Chen-Hao Liao, Wen-Cheng Chen, Hsuan-Tung Liu, Yi-Ren Yeh, Min-Chun Hu, and Chu-Song Chen. 2023. Domain Invariant Vision Transformer Learning for Face Anti-Spoofing. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (WACV). 6098–6107.Google ScholarCross Ref
- Hsueh-Yi Sean Lin and Yu-Wei Su. 2019. Convolutional neural networks for face anti-spoofing and liveness detection. In 2019 6th International Conference on Systems and Informatics (ICSAI). IEEE, 1233–1237.Google ScholarCross Ref
- Siqi Liu, Pong C Yuen, Shengping Zhang, and Guoying Zhao. 2016. 3D mask face anti-spoofing with remote photoplethysmography. In Computer Vision–ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11–14, 2016, Proceedings, Part VII 14. Springer, 85–100.Google Scholar
- Ze Liu, Yutong Lin, Yue Cao, Han Hu, Yixuan Wei, Zheng Zhang, Stephen Lin, and Baining Guo. 2021. Swin transformer: Hierarchical vision transformer using shifted windows. In Proceedings of the IEEE/CVF international conference on computer vision. 10012–10022.Google ScholarCross Ref
- Zuheng Ming, Muriel Visani, Muhammad Muzzamil Luqman, and Jean-Christophe Burie. 2020. A survey on anti-spoofing methods for facial recognition with rgb cameras of generic consumer devices. Journal of imaging 6, 12 (2020), 139.Google ScholarCross Ref
- Ewa Magdalena Nowara, Ashutosh Sabharwal, and Ashok Veeraraghavan. 2017. Ppgsecure: Biometric presentation attack detection using photopletysmograms. In 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017). IEEE, 56–62.Google ScholarDigital Library
- RJ Raghavendra and R Sanjeev Kunte. 2020. A novel feature descriptor for face anti-spoofing using texture based method. Cybernetics and Information Technologies 20, 3 (2020), 159–176.Google ScholarDigital Library
- Maithra Raghu, Thomas Unterthiner, Simon Kornblith, Chiyuan Zhang, and Alexey Dosovitskiy. 2021. Do vision transformers see like convolutional neural networks?Advances in Neural Information Processing Systems 34 (2021), 12116–12128.Google Scholar
- Koushik Roy, Md Hasan, Labiba Rupty, Md Sourave Hossain, Shirshajit Sengupta, Shehzad Noor Taus, and Nabeel Mohammed. 2021. Bi-fpnfas: Bi-directional feature pyramid network for pixel-wise face anti-spoofing by leveraging fourier spectra. Sensors 21, 8 (2021), 2799.Google ScholarCross Ref
- Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017).Google Scholar
- Tao Wang, Jianwei Yang, Zhen Lei, Shengcai Liao, and Stan Z Li. 2013. Face liveness detection using 3D structure recovered from a single camera. In 2013 international conference on biometrics (ICB). IEEE, 1–6.Google ScholarCross Ref
- Xiaolong Wang, Ross Girshick, Abhinav Gupta, and Kaiming He. 2018. Non-local neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition. 7794–7803.Google ScholarCross Ref
- Yahang Wang, Xiaoning Song, Tianyang Xu, Zhenhua Feng, and Xiao-Jun Wu. 2021. From RGB to depth: domain transfer network for face anti-spoofing. IEEE Transactions on Information Forensics and Security 16 (2021), 4280–4290.Google ScholarDigital Library
- Zezheng Wang, Zitong Yu, Chenxu Zhao, Xiangyu Zhu, Yunxiao Qin, Qiusheng Zhou, Feng Zhou, and Zhen Lei. 2020. Deep Spatial Gradient and Temporal Depth Learning for Face Anti-Spoofing. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).Google ScholarCross Ref
- Di Wen, Hu Han, and Anil K Jain. 2015. Face spoof detection with image distortion analysis. IEEE Transactions on Information Forensics and Security 10, 4 (2015), 746–761.Google ScholarDigital Library
- Zhenqi Xu, Shan Li, and Weihong Deng. 2015. Learning temporal features using LSTM-CNN architecture for face anti-spoofing. In 2015 3rd IAPR asian conference on pattern recognition (ACPR). IEEE, 141–145.Google Scholar
- Qing Yang, Xia Zhu, Jong-Kae Fwu, Yun Ye, Ganmei You, and Yuan Zhu. 2020. PipeNet: selective modal pipeline of fusion network for multi-modal face anti-spoofing. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops. 644–645.Google ScholarCross Ref
- Wenze Yin, Yue Ming, and Lei Tian. 2016. A face anti-spoofing method based on optical flow field. In 2016 IEEE 13th International Conference on Signal Processing (ICSP). 1333–1337. https://doi.org/10.1109/ICSP.2016.7878043Google ScholarCross Ref
- Zitong Yu, Yunxiao Qin, Xiaobai Li, Chenxu Zhao, Zhen Lei, and Guoying Zhao. 2022. Deep learning for face anti-spoofing: A survey. IEEE transactions on pattern analysis and machine intelligence 45, 5 (2022), 5609–5631.Google ScholarCross Ref
- Junwei Zhou, Ke Shu, Peng Liu, Jianwen Xiang, and Shengwu Xiong. 2021. Face anti-spoofing based on dynamic color texture analysis using local directional number pattern. In 2020 25th International Conference on Pattern Recognition (ICPR). IEEE, 4221–4228.Google ScholarCross Ref
Index Terms
- Enhancing Face Anti-Spoofing with Swin Transformer-driven Multi-stage Pipeline
Recommendations
Deep and Wide Features for Face Anti-Spoofing
BDIOT '22: Proceedings of the 2022 5th International Conference on Big Data and Internet of ThingsRecently, the face recognition system is rapid development, and face anti-spoofing (FAS) also plays a significant role in that system. There are two approaches to FAS methods 1) use handcrafted features and 2) use deep features extracted from deep ...
Two-Stage Face Detection and Anti-spoofing
Advances in Visual ComputingAbstractFace recognition is a widely used biometric technique that has received a lot of attention. It is used to establish and verify the user’s identity, and subsequently grant access for authorized users to restricted places and electronic devices. ...
Integration of image quality and motion cues for face anti-spoofing
A multi-cues integration framework is proposed using a hierarchical neural network.Bottleneck representations are effective in multi-cues feature fusion.Shearlet is utilized to perform face image quality assessment.Motion-based face liveness features ...
Comments