face presentation
Recently Published Documents


TOTAL DOCUMENTS

167
(FIVE YEARS 81)

H-INDEX

14
(FIVE YEARS 6)

2022 ◽  
Vol 25 (1) ◽  
pp. 1-28
Author(s):  
Le Qin ◽  
Fei Peng ◽  
Min Long ◽  
Raghavendra Ramachandra ◽  
Christoph Busch

As face presentation attacks (PAs) are realistic threats for unattended face verification systems, face presentation attack detection (PAD) has been intensively investigated in past years, and the recent advances in face PAD have significantly reduced the success rate of such attacks. In this article, an empirical study on a novel and effective face impostor PA is made. In the proposed PA, a facial artifact is created by using the most vulnerable facial components, which are optimally selected based on the vulnerability analysis of different facial components to impostor PAs. An attacker can launch a face PA by presenting a facial artifact on his or her own real face. With a collected PA database containing various types of artifacts and presentation attack instruments (PAIs), the experimental results and analysis show that the proposed PA poses a more serious threat to face verification and PAD systems compared with the print, replay, and mask PAs. Moreover, the generalization ability of the proposed PA and the vulnerability analysis with regard to commercial systems are also investigated by evaluating unknown face verification and real-world PAD systems. It provides a new paradigm for the study of face PAs.


2022 ◽  
Vol 12 ◽  
Author(s):  
Yuki Tsuji ◽  
So Kanazawa ◽  
Masami K. Yamaguchi

Pupil contagion is the phenomenon in which an observer’s pupil-diameter changes in response to another person’s pupil. Even chimpanzees and infants in early development stages show pupil contagion. This study investigated whether dynamic changes in pupil diameter would induce changes in infants’ pupil diameter. We also investigated pupil contagion in the context of different faces. We measured the pupil-diameter of 50 five- to six-month-old infants in response to changes in the pupil diameter (dilating/constricting) of upright and inverted faces. The results showed that (1) in the upright presentation condition, dilating the pupil diameter induced a change in the infants’ pupil diameter while constricting the pupil diameter did not induce a change, and (2) pupil contagion occurred only in the upright face presentation, and not in the inverted face presentation. These results indicate the face-inversion effect in infants’ pupil contagion.


2021 ◽  
Author(s):  
Jiong Wang ◽  
Zhou Zhao ◽  
Weike Jin ◽  
Xinyu Duan ◽  
Zhen Lei ◽  
...  

2021 ◽  
Author(s):  
Ajian Liu ◽  
Chenxu Zhao ◽  
Zitong Yu ◽  
Anyang Su ◽  
Xing Liu ◽  
...  

2021 ◽  
Author(s):  
Shen Chen ◽  
Taiping Yao ◽  
Keyue Zhang ◽  
Yang Chen ◽  
Ke Sun ◽  
...  

2021 ◽  
pp. 108398
Author(s):  
Meiling Fang ◽  
Naser Damer ◽  
Florian Kirchbuchner ◽  
Arjan Kuijper

2021 ◽  
Vol 13 (9) ◽  
pp. 234
Author(s):  
Norah Alshareef ◽  
Xiaohong Yuan ◽  
Kaushik Roy ◽  
Mustafa Atay

In biometric systems, the process of identifying or verifying people using facial data must be highly accurate to ensure a high level of security and credibility. Many researchers investigated the fairness of face recognition systems and reported demographic bias. However, there was not much study on face presentation attack detection technology (PAD) in terms of bias. This research sheds light on bias in face spoofing detection by implementing two phases. First, two CNN (convolutional neural network)-based presentation attack detection models, ResNet50 and VGG16 were used to evaluate the fairness of detecting imposer attacks on the basis of gender. In addition, different sizes of Spoof in the Wild (SiW) testing and training data were used in the first phase to study the effect of gender distribution on the models’ performance. Second, the debiasing variational autoencoder (DB-VAE) (Amini, A., et al., Uncovering and Mitigating Algorithmic Bias through Learned Latent Structure) was applied in combination with VGG16 to assess its ability to mitigate bias in presentation attack detection. Our experiments exposed minor gender bias in CNN-based presentation attack detection methods. In addition, it was proven that imbalance in training and testing data does not necessarily lead to gender bias in the model’s performance. Results proved that the DB-VAE approach (Amini, A., et al., Uncovering and Mitigating Algorithmic Bias through Learned Latent Structure) succeeded in mitigating bias in detecting spoof faces.


Author(s):  
Tomoaki Matsunami ◽  
Hidetsugu Uchida ◽  
Narishige Abe ◽  
Shigefumi Yamada

Sign in / Sign up

Export Citation Format

Share Document