skip to main content
10.1145/3628797.3628948acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

Enhancing Face Anti-Spoofing with Swin Transformer-driven Multi-stage Pipeline

Published:07 December 2023Publication History

ABSTRACT

Facial anti-spoofing distinguishes between real and fake faces in images and videos, which is crucial for security systems like facial authentication and payment applications. The Zalo AI Challenge organized a competition for more than 250 teams to use real-world face data to address this problem. In this article, we proposed to use the Swin Transformer backbone combined with a suitable pipeline, which helped us achieve second place in the competition. The competition evaluation results indicate that the proposed solution offers high accuracy with a Time-constraint EER of 7.1% and a faster processing time compared to other solutions.

References

  1. Yousef Atoum, Yaojie Liu, Amin Jourabloo, and Xiaoming Liu. 2017. Face anti-spoofing using patch and depth-based CNNs. In 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 319–328.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Tiago de Freitas Pereira, André Anjos, José Mario De Martino, and Sébastien Marcel. 2013. LBP- TOP based countermeasure against face spoofing attacks. In Computer Vision-ACCV 2012 Workshops: ACCV 2012 International Workshops, Daejeon, Korea, November 5-6, 2012, Revised Selected Papers, Part I 11. Springer, 121–132.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, 2020. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020).Google ScholarGoogle Scholar
  4. Anjith George and Sébastien Marcel. 2021. On the effectiveness of vision transformers for zero-shot face anti-spoofing. In 2021 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 1–8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Raden Budiarto Hadiprakoso, Hermawan Setiawan, 2020. Face anti-spoofing using CNN classifier & face liveness detection. In 2020 3rd International Conference on Information and Communications Technology (ICOIACT). IEEE, 143–147.Google ScholarGoogle ScholarCross RefCross Ref
  6. Md Rezwan Hasan, SM Hasan Mahmud, and Xiang Yu Li. 2019. Face anti-spoofing using texture-based techniques and filtering methods. In Journal of Physics: Conference Series, Vol. 1229. IOP Publishing, 012044.Google ScholarGoogle Scholar
  7. Yunseung Lee, Youngjun Kwak, and Jinho Shin. 2023. Robust face anti-spoofing framework with Convolutional Vision Transformer. arXiv preprint arXiv:2307.12459 (2023).Google ScholarGoogle Scholar
  8. Lei Li, Xiaoyi Feng, Zinelabidine Boulkenafet, Zhaoqiang Xia, Mingming Li, and Abdenour Hadid. 2016. An original face anti-spoofing approach using partial convolutional neural network. In 2016 Sixth international conference on image processing theory, tools and applications (IPTA). IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  9. Sheng Li, Xun Zhu, Guorui Feng, Xinpeng Zhang, and Zhenxing Qian. 2021. Diffusing the Liveness Cues for Face Anti-spoofing. In Proceedings of the 29th ACM International Conference on Multimedia. 1636–1644.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Chen-Hao Liao, Wen-Cheng Chen, Hsuan-Tung Liu, Yi-Ren Yeh, Min-Chun Hu, and Chu-Song Chen. 2023. Domain Invariant Vision Transformer Learning for Face Anti-Spoofing. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (WACV). 6098–6107.Google ScholarGoogle ScholarCross RefCross Ref
  11. Hsueh-Yi Sean Lin and Yu-Wei Su. 2019. Convolutional neural networks for face anti-spoofing and liveness detection. In 2019 6th International Conference on Systems and Informatics (ICSAI). IEEE, 1233–1237.Google ScholarGoogle ScholarCross RefCross Ref
  12. Siqi Liu, Pong C Yuen, Shengping Zhang, and Guoying Zhao. 2016. 3D mask face anti-spoofing with remote photoplethysmography. In Computer Vision–ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11–14, 2016, Proceedings, Part VII 14. Springer, 85–100.Google ScholarGoogle Scholar
  13. Ze Liu, Yutong Lin, Yue Cao, Han Hu, Yixuan Wei, Zheng Zhang, Stephen Lin, and Baining Guo. 2021. Swin transformer: Hierarchical vision transformer using shifted windows. In Proceedings of the IEEE/CVF international conference on computer vision. 10012–10022.Google ScholarGoogle ScholarCross RefCross Ref
  14. Zuheng Ming, Muriel Visani, Muhammad Muzzamil Luqman, and Jean-Christophe Burie. 2020. A survey on anti-spoofing methods for facial recognition with rgb cameras of generic consumer devices. Journal of imaging 6, 12 (2020), 139.Google ScholarGoogle ScholarCross RefCross Ref
  15. Ewa Magdalena Nowara, Ashutosh Sabharwal, and Ashok Veeraraghavan. 2017. Ppgsecure: Biometric presentation attack detection using photopletysmograms. In 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017). IEEE, 56–62.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. RJ Raghavendra and R Sanjeev Kunte. 2020. A novel feature descriptor for face anti-spoofing using texture based method. Cybernetics and Information Technologies 20, 3 (2020), 159–176.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Maithra Raghu, Thomas Unterthiner, Simon Kornblith, Chiyuan Zhang, and Alexey Dosovitskiy. 2021. Do vision transformers see like convolutional neural networks?Advances in Neural Information Processing Systems 34 (2021), 12116–12128.Google ScholarGoogle Scholar
  18. Koushik Roy, Md Hasan, Labiba Rupty, Md Sourave Hossain, Shirshajit Sengupta, Shehzad Noor Taus, and Nabeel Mohammed. 2021. Bi-fpnfas: Bi-directional feature pyramid network for pixel-wise face anti-spoofing by leveraging fourier spectra. Sensors 21, 8 (2021), 2799.Google ScholarGoogle ScholarCross RefCross Ref
  19. Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017).Google ScholarGoogle Scholar
  20. Tao Wang, Jianwei Yang, Zhen Lei, Shengcai Liao, and Stan Z Li. 2013. Face liveness detection using 3D structure recovered from a single camera. In 2013 international conference on biometrics (ICB). IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  21. Xiaolong Wang, Ross Girshick, Abhinav Gupta, and Kaiming He. 2018. Non-local neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition. 7794–7803.Google ScholarGoogle ScholarCross RefCross Ref
  22. Yahang Wang, Xiaoning Song, Tianyang Xu, Zhenhua Feng, and Xiao-Jun Wu. 2021. From RGB to depth: domain transfer network for face anti-spoofing. IEEE Transactions on Information Forensics and Security 16 (2021), 4280–4290.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Zezheng Wang, Zitong Yu, Chenxu Zhao, Xiangyu Zhu, Yunxiao Qin, Qiusheng Zhou, Feng Zhou, and Zhen Lei. 2020. Deep Spatial Gradient and Temporal Depth Learning for Face Anti-Spoofing. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).Google ScholarGoogle ScholarCross RefCross Ref
  24. Di Wen, Hu Han, and Anil K Jain. 2015. Face spoof detection with image distortion analysis. IEEE Transactions on Information Forensics and Security 10, 4 (2015), 746–761.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Zhenqi Xu, Shan Li, and Weihong Deng. 2015. Learning temporal features using LSTM-CNN architecture for face anti-spoofing. In 2015 3rd IAPR asian conference on pattern recognition (ACPR). IEEE, 141–145.Google ScholarGoogle Scholar
  26. Qing Yang, Xia Zhu, Jong-Kae Fwu, Yun Ye, Ganmei You, and Yuan Zhu. 2020. PipeNet: selective modal pipeline of fusion network for multi-modal face anti-spoofing. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops. 644–645.Google ScholarGoogle ScholarCross RefCross Ref
  27. Wenze Yin, Yue Ming, and Lei Tian. 2016. A face anti-spoofing method based on optical flow field. In 2016 IEEE 13th International Conference on Signal Processing (ICSP). 1333–1337. https://doi.org/10.1109/ICSP.2016.7878043Google ScholarGoogle ScholarCross RefCross Ref
  28. Zitong Yu, Yunxiao Qin, Xiaobai Li, Chenxu Zhao, Zhen Lei, and Guoying Zhao. 2022. Deep learning for face anti-spoofing: A survey. IEEE transactions on pattern analysis and machine intelligence 45, 5 (2022), 5609–5631.Google ScholarGoogle ScholarCross RefCross Ref
  29. Junwei Zhou, Ke Shu, Peng Liu, Jianwen Xiang, and Shengwu Xiong. 2021. Face anti-spoofing based on dynamic color texture analysis using local directional number pattern. In 2020 25th International Conference on Pattern Recognition (ICPR). IEEE, 4221–4228.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Enhancing Face Anti-Spoofing with Swin Transformer-driven Multi-stage Pipeline

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SOICT '23: Proceedings of the 12th International Symposium on Information and Communication Technology
          December 2023
          1058 pages
          ISBN:9798400708916
          DOI:10.1145/3628797

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 December 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate147of318submissions,46%
        • Article Metrics

          • Downloads (Last 12 months)39
          • Downloads (Last 6 weeks)6

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format