Face representation attack detection method based on full-size depth map supervision

An attack detection and depth map technology, which is applied in the fields of image processing and biosecurity, can solve the problems of multi-label information volume, loss, and network inability to make full use of depth map labels, etc., and achieve high detection accuracy and strong robustness

Active Publication Date: 2021-07-23
SOUTH CHINA UNIV OF TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are some studies that introduce the depth map as label information, but these studies compress the label depth map by several times. The common one is to compress it from 256*256 to 32*32, which loses a lot of label information, resulting in Network fails to fully utilize depth map labels for supervised learning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face representation attack detection method based on full-size depth map supervision
  • Face representation attack detection method based on full-size depth map supervision
  • Face representation attack detection method based on full-size depth map supervision

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0036] Such as figure 1 with figure 2 As shown, this embodiment provides a face representation attack detection method based on full-size depth map supervision, and the process is as follows:

[0037] S1. Construct a training set. The training set includes real face pictures and attack face pictures. Each face picture corresponds to two kinds of labels, which are binary classification labels and full-size label depth maps. The binary classification labels indicate the The category value of whether the face picture belongs to the real face picture or the attack face picture; the full-size label depth map indicates the depth label value corresponding to each pixel in the face area part of the face picture. In this embodiment, the full-size label depth map of the real face picture is obtained by the PRNet algorithm, one of the face depth map generation algorithms in the field of 3D face reconstruction, and the full-size label depth map of the attack face picture is set to be th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a face representation attack detection method based on full-size depth map supervision. The method comprises the following steps: constructing a face representation attack detection model based on full-size depth map supervision; inputting a to-be-detected face picture into the trained face representation attack detection model, acquiring a full-size prediction depth map which is identical to the to-be-detected face picture in width and height, wherein each pixel value on the full-size prediction depth map is a depth prediction value of a corresponding pixel point of the to-be-detected face picture; and taking an average depth prediction value of the full-size prediction depth map as a final score, and comparing the final score with a preset discrimination threshold to obtain a detection result. The full-size depth map is adopted as a label for supervised modeling, the shallow-layer features and the deep-layer features of the input face image are fused to obtain the full-size prediction depth map, the detection precision is high, and the invention can adapt to reality detection scenes under different illumination and acquisition equipment conditions.

Description

technical field [0001] The invention relates to the technical fields of image processing and biological security, in particular to a face representation attack detection method based on full-scale depth map supervision. Background technique [0002] Face recognition technology has been widely used at present. In addition to providing legitimate users with a good experience in the identity authentication stage, it also provides opportunities for criminals to infringe upon rights. Attempts to use legitimate user's face photos, videos and other means to borrow the user's identity through the operation of the face recognition system are called face representation attacks. The method of detecting such attacks is called face representation attack detection. Therefore, the face recognition system not only needs to judge whether the face picture obtained by the camera belongs to the legitimate user, but also needs to judge whether the picture is a real face directly obtained by tak...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06K9/62G06N3/04G06N3/08
CPCG06N3/08G06V40/172G06V40/168G06V40/45G06N3/045G06F18/24G06F18/253G06F18/214Y02T10/40
Inventor 傅予力许晓燕黄汉业杨国栋吕玲玲向友君
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products