231
Views
0
CrossRef citations to date
0
Altmetric
Articles

Deep Learning Base Face Anti Spoofing -Convolutional Restricted Basis Neural Network Technique

ORCID Icon &

References

  • M. Sharma, and J. Tripathi, “Deep Neural network for human face recognition,” Int. J. Eng. Manuf. Vol. 8, no. 1, pp. 63–71, 8th January 2018.
  • H. Li, S. Wang, P. He, and A. Rocha, “Face anti-spoofing with deep neural network distillation,” IEEE J. Sel. Top. Signal Process., Vol. 14, no. 5, pp. 933–46, 2020.
  • Y. A. U. Rehman, L. M. Po, and M. Liu, “Livenet: Improving features generalization for face liveness detection using convolution neural networks,” Expert Syst. Appl., Vol. 108, pp. 159–16, 2018.
  • Z. Boulkenafet, J. Komulainen, and A. Hadid, “Face spoofing detection using colour texture analysis,” IEEE Trans. Inf. Forensics Secur., Vol. 11, no. 8, pp. 1818–30, 2016.
  • D. Wen, H. Han, and A. K. Jain, “Face spoof detection with image distortion analysis,” IEEE Trans. Inf. Forensics Secur., Vol. 10, no. 4, pp. 746–61, 2015.
  • S. Zhang, et al., “Casia-surf: A large-scale multi-modal benchmark for face anti-spoofing,” IEEE Trans. Biometrics, Behav. Identity Sci., Vol. 2, no. 2, pp. 182–93, 2020.
  • H. Li, et al., “Learning generalized deep feature representation for face anti-spoofing,” IEEE Trans. Inf. Forensics Secur., Vol. 13, no. 10, pp. 2639–52, 2018.
  • H. Chen, et al., “A cascade face spoofing detector based on face anti-spoofing R-CNN and improved Retinex LBP,” IEEE Access, Vol. 7, pp. 170116–33, 2019.
  • A. George, and S. Marcel, “Learning one class representations for face presentation attack detection using multi-channel convolutional neural networks,” IEEE Trans. Inf. Forensics Secur., Vol. 16, pp. 361–75, 2020.
  • R. Cai, et al., “DRL-FAS: A novel framework based on deep reinforcement learning for face anti-spoofing,” IEEE Trans. Inf. Forensics Secur., Vol. 16, pp. 937–51, 2020.
  • Y. Sun, H. Xiong, and S. M. Yiu, “Understanding deep face anti-spoofing: from the perspective of data,” The Visual Comput., Vol. 37, pp. 1015–1028, 2021.
  • B. Zhang, B. Tondi, and M. Barni, “Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability,” Comput. Vision Image Understanding, Vol. 197, pp. 102988, 2020.
  • L. Li, et al., “Face spoofing detection with local binary pattern network,” J. Visual Commun. Image Representation, Vol. 54, pp. 182–92, 2018.
  • N. Bousnina, et al., “Unraveling robustness of deep face anti-spoofing models against pixel attacks,” Multimedia Tools Appl., Vol. 80, no. 5, pp. 7229–46, 2021.
  • F. Jiang, P. Liu, and X. Zhou, “Multilevel fusing paired visible light and near-infrared spectral images for face anti-spoofing,” Pattern Recogn. Lett., Vol. 128, pp. 30–7, 2019.
  • Y. A. U. Rehman, et al., “Face liveness detection using convolutional-features fusion of real and deep network generated face images,” J. Visual Commun. Image Representation, Vol. 59, pp. 574–82, 2019.
  • M. Sajjad, et al., “CNN-based anti-spoofing two-tier multi-factor authentication system,” Pattern Recognit. Lett., Vol. 126, pp. 123–31, 2019.
  • W. Zhang, and S. Xiang, “Face anti-spoofing detection based on DWT-LBP-DCT features,” Signal Process.: Image Commun., Vol. 89, pp. 115990, 2020.
  • F. Jiang, et al., “Face anti-spoofing with generated near-infrared images,” Multimedia Tools Appl., Vol. 79, no. 29, pp. 21299–323, 2020.
  • H. Li, et al., “Unsupervised domain adaptation for face anti-spoofing,” IEEE Trans. Inf. Forensics Secur., Vol. 13, no. 7, pp. 1794–809, 2018.
  • Y. A. U. Rehman, L.-M. Po, and M. Liu, “Slnet: Stereo face liveness detection via dynamic disparity-maps and convolutional neural network,” Expert Syst. Appl., Vol. 142, pp. 113002, 2020.
  • R. Shao, X. Lan, and P. C. Yuen, “Joint discriminative learning of deep dynamic textures for 3d mask face anti-spoofing,” IEEE Trans. Inf. Forensics Secur., Vol. 14, no. 4, pp. 923–38, 2018.
  • Y. Chen, et al., “Single-image super-resolution algorithm based on structural self-similarity and deformation block features,” IEEE Access, Vol. 7, pp. 58791–801, 2019.
  • M. Loey, G. Manogaran, M. Hamed N. Taha, and N. E. M. Khalifa, “A hybrid deep transfer learning model with machine learning methods for face mask detection in the era of the COVID-19 pandemic,” Measurement, Vol. 167, pp. 108288, 2021.
  • A. Negi, K. K. PrachiChauhan, and R. S. Rajput. “Face Mask Detection Classifier and Model Pruning with Keras-Surgeon.” In 2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE), pp. 1–6. IEEE, 2020.
  • A. Ghoneim, G. Muhammad, and M. ShamimHossain, “Cervical cancer classification using convolutional neural networks and extreme learning machines,” Future Gener. Comput. Syst., Vol. 102, pp. 643–9, 2020.
  • A. Negi, P. Krishan Kumar, and R. S. Rajput. “Deep Neural Architecture for Face mask Detection on Simulated Masked Face Dataset against Covid-19 Pandemic.” In 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), pp. 595–600. IEEE, 2021.
  • K. Kumar, and D. D. Shrimankar, “F-DES: Fast and deep event summarization,” IEEE Trans. Multimedia, Vol. 20, no. 2, pp. 323–34, 2017.
  • Y. Han, C. Wei, R. Zhou, Z. Hong, Y. Zhang, and S. Yang, “Combining 3D-CNN and squeeze-and-excitation networks for remote sensing sea ice image classification,” Math. Problems Eng., Vol. 2020, Article ID: 8065396, 15 p., 2020.
  • X. Song, X. Zhao, L. Fang, and T. Lin, “Discriminative representation combinations for accurate face spoofing detection,” Pattern Recogn., Vol. 85, pp. 220–31, 2019.
  • A. Darbari, S. Krishan Kumar, and P. L. Patil, “Requirement of artificial intelligence technology awareness for thoracic surgeons,” The Cardiothoracic Surgeon, Vol. 29, no. 1, pp. 1–10, 2021.
  • S. Sharma, S. NareshShivhare, N. Singh, and K. Kumar, “Computationally efficient ann model for small-scale problems,” in Machine intelligence and signal analysis, Singapore: Springer, 2019, pp. 423–35.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.