Lightweight Face Anti-spoofing for Improved MobileNetV3
DOI: 10.23977/jipta.2024.070117 | Downloads: 36 | Views: 1295
Author(s)
Sun Zhenlin 1, Yan Hao 1, Guo Mengyu 1, Hao Zhiqiang 1
Affiliation(s)
1 School of Science, Tianjin University of Commerce, Tianjin, 300134, China
Corresponding Author
Sun ZhenlinABSTRACT
Aiming at the security challenges associated with facial authentication in biometric technology, we propose an improved MobileNetV3 model that reduces the complexity and cost of existing face anti-deception methods. This model integrates the Convolutional Block Attention Module (CBAM) and Central Difference Convolution (CDC) techniques. CBAM enhances feature representation, while CDC captures fine-grained information by aggregating intensity and gradient data. Experimental results from the NUAA and Replay-Attack datasets indicate that the improved model achieves a recognition accuracy exceeding 97% without a significant increase in computational requirements, highlighting its potential for mobile applications.
KEYWORDS
Face anti-spoofing, Convolutional block attention mechanism, Central difference convolution, Lightweight neural networkCITE THIS PAPER
Sun Zhenlin, Yan Hao, Guo Mengyu, Hao Zhiqiang, Lightweight Face Anti-spoofing for Improved MobileNetV3. Journal of Image Processing Theory and Applications (2024) Vol. 7: 143-151. DOI: http://dx.doi.org/10.23977/jipta.2024.070117.
REFERENCES
[1] Yang X, Luo W, Bao L, et al. Face anti-spoofing: Model matters, so does data[C]//Proceedingsof the IEEE/CVF conference on computervision and pattern recognition. 2019: 3507-3516.
[2] PATEL K, HAN H, JAIN A K. Secure Face Unlock: Spoof Detection on Smartphones [J].IeeeTransactionson Information Forensics and Security,2016, 11(10): 2268-2283.
[3] Boulkenafet Z, Komulainen J, Hadid A. Face antispoofing using speeded-up robust features and fisher vector encoding[J]. IEEE Signal Processing Letters, 2016, 24(2): 141-145.
[4] Komulainen J, Hadid A, Pietikäinen M. Context based face anti-spoofing[C]//2013 IEEESixth International Conference on Biometrics: Theory, Applications and Systems(BTAS). IEEE, 2013.
[5] Boulkenafet Z, Komulainen J, Hadid A. Faceanti-spoofing based on color texture analysis[C]//Proceedings of 2015 IEEE International Conference on Image Processing (ICIP). IEEE, 2015.
[6] de Freitas Pereira T, Anjos A, De Martino J M. LBP-TOP based countermeasure against face spoofing attacks[C]// Computer Vision-ACCV 2012 Workshops: ACCV 2012 International Workshops, Daejeon, Korea, November 5-6, 2012, Revised Selected Papers, Part I 11. Springer Berlin Heidelberg, 2013: 121-132.
[7] Wang Z, Wang Q, Deng W, et al. Learning multi-granularity temporal characteristics forface anti-spoofing[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 1254-1269.
[8] Gan J, Li S, Zhai Y, et al. 3d convolutional neural network based on face anti-spoofing[C]/2017 2nd international conference on multimedia and image processing (ICMIP). IEEE, 2017: 1-5.
[9] Li L, Feng X, Boulkenafet Z, et al. An original face anti-spoofing approach using partial convolutional neural network[C]/ 2016 sixth international conference on image processing theory, tools and applications (IPTA). IEEE, 2016: 1-6.
[10] Liu Y, Jourabloo A, Liu X. Learning deep models for face anti-spoofing: Binary or auxiliary supervision[C]/ Proceedings of the IEEE conferenceon computer vision and pattern recognition. 2018:389-398.
[11] ZHOU J, QI H B, CHEN Y, et al. Progressive principal component analysis for compressing deep convolutional neural networks [J]. Neurocomputing, 2021, 440: 197-206.
[12] Dai Ying, Ye GUI. Improved YOLOv7 face recognition algorithm for Intelligent elderlycare [J]. Journal of Information Engineering University, 2024, 25 (02):175-180+226.
[13] Li L Z, Gao Z B, Huang L F, Zhang H, LinM J. A dual-modal face anti-spoofing method via light-weight networks[C]//Proceedings of 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID). IEEE, 2019: 70-74.
[14] Zhang P, Zou F H, Wu Z W, Dai N L, Mark S, Fu M, Zhao J, Li K. FeatherNets: Convolutional neural networks as light as feather for face anti-spoofing[C]/Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops. 2019: 1574-1583.
[15] Hu Jiarong, Meng Wen, ZHAO Jingjing. Face recognition method based on improved MobileFaceNet [J].Semiconductor Optoelectronics, 2022, 43 (01): 164-168.
[16] Yu Z, Qin Y, Li X. Multi-modal face anti-spoofing based on central difference networks[C]/Proceedings ofthe IEEE/CVF Conference on Computer Vision and Pattern RecognitionWorkshops. 2020: 650-651.
[17] Yu Z, Zhao C, Wang Z. Searching central difference convolutional networks for face anti-spoofing[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2020:5295-5305.
[18] Yang, Mingye. Research on Face detection in vivo based on Deep learning [D].Qingdao University, 2022.2.
[19] Li Yutong, Lu Wenli, Song Wei, et al. Face detection in vivo based on central difference convolution and frequency domain assistance [J]. Sensors and Microsystems, 2023, 42 (05):117-120+125.
[20] Bu, Chenyu, Shi, Zeyu. Multi-modal face detection in vivo based on lightweight network [J]. Journal of Information Recording Materials, 2023, 24 (12): 1-3+6.
[21] Howard A G. Mobilenets: Efficient convolutional neural networks for mobile vision applications[J]. arXivpreprint arXiv:1704.04861, 2017.
[22] Sandler M, Howard A, Zhu M, et al. Mobilenetv2: Inverted residuals and linear bottlenecks[C]/Proceedings of the IEEE conference on computervision and pattern recognition. 2018: 4510-4520.
[23] Howard A, Sandler M, Chu G, Chen L C,Chen B, Tan M, Wang W, Zhu Y, Pang R, Vasudevan V, Le QV. Searching for mobilenetv3[C]//Proceedings of the IEEE/CVF international conference on computer vision. 2019:1314-1324.
[24] Woo S, Park J, Lee J Y, Kweon I S. Cbam: Convolutional block attention module[C]/Proceedings of the European conference on computer vision (ECCV). 2018: 3-19.
[25] Peixoto B, Michelassi C, Rocha A. Face liveness detection under bad illumination conditions[C]/2011 18th IEEE International Conference on Image Processing. New York: IEEE, 2011:611.
[26] Chingovska I, Anjos A, Marcel S. On the effectiveness of local binary patterns in faceanti-spoofing[C]/2012 BIOSIG-proceedings of the international conference of biometrics special interest group (BIOSIG).2012:1-7.
Downloads: | 2455 |
---|---|
Visits: | 172156 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks