Skip to content

ee09115/spoofing_detection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Overview

This repository is dedicated to the image-based Presentation Attack Detection - PAD - systems in two different domains: (i) cork and (ii) face PAD. The proposed PAD system relies on the combination of two different color spaces and uses only a single frame to distinguish from a bona fide image and an image attack, see Fig. 1.

Fig. 1 - General flowchart for the developed image-based PAD system.

Contents

Results

MethodPrint-attackReplay-attack
EER(%)HTER(%)EER(%)HTER(%)
YCRCB+LUV+ETC [1] 1.33 0.00 0.00756 0.5954
YCRCB+LUV+SVM [1] 0.00 1.76 4.30 7.86

Cork Spoofing Detection

Face Spoofing Detection

Demonstrative results of the proposed face PAD system - YCRCB+LUV+ETC. The classification model used in this test was trained using the training set of the Replay-Attack database.

How to cite

If you use any part of this work please cite [1]:

@InProceedings{10.1007/978-3-030-05288-1_15,
author="Costa, Valter
and Sousa, Armando
and Reis, Ana",
editor="Barneva, Reneta P.
and Brimkov, Valentin E.
and Tavares, Jo{\~a}o Manuel R.S.",
title="Image-Based Object Spoofing Detection",
booktitle="Combinatorial Image Analysis",
year="2018",
publisher="Springer International Publishing",
address="Cham",
pages="189--201",
abstract="Using 2D images in authentication systems raises the question of spoof attacks: is it possible to deceive an authentication system using fake models possessing identical visual properties of the genuine one? In this work, an anti-spoofing method approach for a wine anti-counterfeiting system is presented. The proposed method relies in two different color spaces: CIE L*u*v* and {\$}{\$}YC{\_}rC{\_}b{\$}{\$}, to distinguish between a genuine instance and a spoof attack. To evaluate the proposed strategy, two databases were used: a private database, with photos/2D attacks of cork stoppers, created for this work; and the public Replay-Attack database that is used for face spoofing detection methods testing. The results on the private database show that the anti-spoofing approach is able to distinguish with high accuracy a real photo from an attack. Regarding the public database, the results were obtained with existing methods, as the best HTER results using a single frame approach.",
isbn="978-3-030-05288-1"
}
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy