Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 工學院
  3. 工程科學及海洋工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74591
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor張恆華
dc.contributor.authorHan-Hsun Kuoen
dc.contributor.author郭漢遜zh_TW
dc.date.accessioned2021-06-17T08:44:31Z-
dc.date.available2020-08-18
dc.date.copyright2019-08-18
dc.date.issued2019
dc.date.submitted2019-08-06
dc.identifier.citation[1] Y. Atoum, Y. Liu, A. Jourabloo, and X. Liu, 'Face anti-spoofing using patch and depth-based CNNs,' in Biometrics (IJCB), 2017 IEEE International Joint Conference on, 2017, pp. 319-328: IEEE.
[2] P. Baldi, 'Autoencoders, unsupervised learning, and deep architectures,' in Proceedings of ICML workshop on unsupervised and transfer learning, 2012, pp. 37-49.
[3] Z. Boulkenafet, J. Komulainen, and A. Hadid, 'Face anti-spoofing based on color texture analysis,' in Image Processing (ICIP), 2015 IEEE International Conference on, 2015, pp. 2636-2640: IEEE.
[4] Z. Boulkenafet, J. Komulainen, A. J. I. Hadid, and V. Computing, 'On the generalization of color texture-based face anti-spoofing,' vol. 77, pp. 1-9, 2018.
[5] A. Brunel et al., 'A CNN adapted to time series for the classification of Supernovae,' 2019.
[6] D. Cai, X. He, and J. Han, 'Semi-supervised discriminant analysis,' in Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on, 2007, pp. 1-7: IEEE.
[7] M. Caron, P. Bojanowski, A. Joulin, and M. J. a. p. a. Douze, 'Deep clustering for unsupervised learning of visual features,' vol. 3, 2018.
[8] O. Chapelle, B. Scholkopf, and A. Zien, 'Semi-supervised learning (chapelle, o. et al., eds.; 2006)[book reviews],' IEEE Transactions on Neural Networks, vol. 20, no. 3, pp. 542-542, 2009.
[9] I. Chingovska, A. Anjos, and S. Marcel, 'On the effectiveness of local binary patterns in face anti-spoofing,' in Proceedings of the 11th International Conference of the Biometrics Special Interes Group, 2012, no. EPFL-CONF-192369.
[10] C. Cortes and V. J. M. l. Vapnik, 'Support-vector networks,' vol. 20, no. 3, pp. 273-297, 1995.
[11] T. de Freitas Pereira, A. Anjos, J. M. De Martino, and S. Marcel, 'Can face anti-spoofing countermeasures work in a real world scenario?,' in Biometrics (ICB), 2013 International Conference on, 2013, pp. 1-8: IEEE.
[12] J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei, 'Imagenet: A large-scale hierarchical image database,' in 2009 IEEE conference on computer vision and pattern recognition, 2009, pp. 248-255: Ieee.
[13] N. Erdogmus and S. Marcel, 'Spoofing 2D face recognition systems with 3D masks,' in 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG), 2013, pp. 1-8: IEEE.
[14] C. Gong, D. Tao, S. J. Maybank, W. Liu, G. Kang, and J. Yang, 'Multi-modal curriculum learning for semi-supervised image classification,' IEEE Transactions on Image Processing, vol. 25, no. 7, pp. 3249-3260, 2016.
[15] J. Hernandez-Ortega, J. Fierrez, A. Morales, and P. Tome, 'Time Analysis of Pulse-based Face Anti-Spoofing in Visible and NIR,' in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 544-552.
[16] S. Hong, H. Noh, and B. Han, 'Decoupled deep neural network for semi-supervised semantic segmentation,' in Advances in neural information processing systems, 2015, pp. 1495-1503.
[17] D. Huang, C. Shan, M. Ardabilian, Y. Wang, and L. Chen, 'Local binary patterns and its application to facial image analysis: a survey,' IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 41, no. 6, pp. 765-781, 2011.
[18] A. Jourabloo, Y. Liu, and X. Liu, 'Face de-spoofing: Anti-spoofing via noise modeling,' arXiv preprint arXiv:1807.09968, vol. 1, no. 2, p. 3, 2018.
[19] A. Jourabloo, Y. Liu, and X. J. a. p. a. Liu, 'Face de-spoofing: Anti-spoofing via noise modeling,' vol. 1, no. 2, p. 3, 2018.
[20] D. P. Kingma, S. Mohamed, D. J. Rezende, and M. Welling, 'Semi-supervised learning with deep generative models,' in Advances in neural information processing systems, 2014, pp. 3581-3589.
[21] A. Krizhevsky, I. Sutskever, and G. E. Hinton, 'Imagenet classification with deep convolutional neural networks,' in Advances in neural information processing systems, 2012, pp. 1097-1105.
[22] H. Li et al., 'Unsupervised domain adaptation for face anti-spoofing,' vol. 13, no. 7, pp. 1794-1809, 2018.
[23] L. Li, X. Feng, Z. Boulkenafet, Z. Xia, M. Li, and A. Hadid, 'An original face anti-spoofing approach using partial convolutional neural network,' in Image processing theory tools and applications (IPTA), 2016 6th international conference on, 2016, pp. 1-6: IEEE.
[24] G. Litjens et al., 'A survey on deep learning in medical image analysis,' Medical image analysis, vol. 42, pp. 60-88, 2017.
[25] S. Liu, P. C. Yuen, S. Zhang, and G. Zhao, '3d mask face anti-spoofing with remote photoplethysmography,' in European Conference on Computer Vision, 2016, pp. 85-100: Springer.
[26] Y. Liu, A. Jourabloo, and X. Liu, 'Learning deep models for face anti-spoofing: Binary or auxiliary supervision,' in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 389-398.
[27] J. Long, E. Shelhamer, and T. Darrell, 'Fully convolutional networks for semantic segmentation,' in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 3431-3440.
[28] O. Lucena, A. Junior, V. Moia, R. Souza, E. Valle, and R. Lotufo, 'Transfer learning using convolutional neural networks for face anti-spoofing,' in International Conference Image Analysis and Recognition, 2017, pp. 27-34: Springer.
[29] I. Manjani, S. Tariyal, M. Vatsa, R. Singh, and A. Majumdar, 'Detecting silicone mask-based presentation attack via deep dictionary learning,' IEEE Transactions on Information Forensics and Security, vol. 12, no. 7, pp. 1713-1723, 2017.
[30] F.-J. H. Marc’Aurelio Ranzato, Y.-L. Boureau, and Y. LeCun, 'Unsupervised learning of invariant feature hierarchies with applications to object recognition,' in Proc. Computer Vision and Pattern Recognition Conference (CVPR’07). IEEE Press, 2007, vol. 127.
[31] J. Määttä, A. Hadid, and M. Pietikäinen, 'Face spoofing detection from single images using micro-texture analysis,' in Biometrics (IJCB), 2011 international joint conference on, 2011, pp. 1-7: IEEE.
[32] J. Nagi et al., 'Max-pooling convolutional neural networks for vision-based hand gesture recognition,' in 2011 IEEE International Conference on Signal and Image Processing Applications (ICSIPA), 2011, pp. 342-347: IEEE.
[33] T. Ojala, M. Pietikainen, and D. Harwood, 'Performance evaluation of texture measures with classification based on Kullback discrimination of distributions,' in Pattern Recognition, 1994. Vol. 1-Conference A: Computer Vision & Image Processing., Proceedings of the 12th IAPR International Conference on, 1994, vol. 1, pp. 582-585: IEEE.
[34] T. Ojala, M. Pietikainen, and T. Maenpaa, 'Multiresolution gray-scale and rotation invariant texture classification with local binary patterns,' IEEE Transactions on pattern analysis and machine intelligence, vol. 24, no. 7, pp. 971-987, 2002.
[35] T. Ojala, M. Pietikäinen, and D. Harwood, 'A comparative study of texture measures with classification based on featured distributions,' Pattern recognition, vol. 29, no. 1, pp. 51-59, 1996.
[36] M. Oquab, L. Bottou, I. Laptev, and J. Sivic, 'Learning and transferring mid-level image representations using convolutional neural networks,' in Proceedings of the IEEE conference on computer vision and pattern recognition, 2014, pp. 1717-1724.
[37] K. Patel, H. Han, and A. K. Jain, 'Cross-database face antispoofing with robust feature representation,' in Chinese Conference on Biometric Recognition, 2016, pp. 611-619: Springer.
[38] J. Patterson and A. Gibson, Deep Learning: A Practitioner's Approach. ' O'Reilly Media, Inc.', 2017.
[39] A. Rasmus, M. Berglund, M. Honkala, H. Valpola, and T. Raiko, 'Semi-supervised learning with ladder networks,' in Advances in Neural Information Processing Systems, 2015, pp. 3546-3554.
[40] D. Scherer, A. Müller, and S. Behnke, 'Evaluation of pooling operations in convolutional architectures for object recognition,' in International conference on artificial neural networks, 2010, pp. 92-101: Springer.
[41] J. Schmidhuber, 'Deep learning in neural networks: An overview,' Neural networks, vol. 61, pp. 85-117, 2015.
[42] R. Shao, X. Lan, and P. C. Yuen, 'Deep convolutional dynamic texture learning with adaptive channel-discriminability for 3D mask face anti-spoofing,' in Biometrics (IJCB), 2017 IEEE International Joint Conference on, 2017, pp. 748-755: IEEE.
[43] R. Shao, X. Lan, and P. C. Yuen, 'Joint Discriminative Learning of Deep Dynamic Textures for 3D Mask Face Anti-Spoofing,' IEEE Transactions on Information Forensics and Security, vol. 14, no. 4, pp. 923-938, 2019.
[44] R. Shao, X. Lan, P. C. J. I. T. o. I. F. Yuen, and Security, 'Joint Discriminative Learning of Deep Dynamic Textures for 3D Mask Face Anti-Spoofing,' vol. 14, no. 4, pp. 923-938, 2019.
[45] J. Shi, L. Xu, and J. Jia, 'Discriminative BD detection features,' in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014, pp. 2965-2972.
[46] T. A. Siddiqui et al., 'Face anti-spoofing with multifeature videolet aggregation,' in Pattern recognition (ICPR), 2016 23rd international conference on, 2016, pp. 1035-1040: IEEE.
[47] K. Simonyan and A. Zisserman, 'Very deep convolutional networks for large-scale image recognition,' arXiv preprint arXiv:1409.1556, 2014.
[48] K. Simonyan and A. J. a. p. a. Zisserman, 'Very deep convolutional networks for large-scale image recognition,' 2014.
[49] C. Sousedik and C. Busch, 'Presentation attack detection methods for fingerprint recognition systems: a survey,' Iet Biometrics, vol. 3, no. 4, pp. 219-233, 2014.
[50] J. T. Springenberg, 'Unsupervised and semi-supervised learning with categorical generative adversarial networks,' arXiv preprint arXiv:1511.06390, 2015.
[51] Z. Wang, C. Zhao, Y. Qin, Q. Zhou, and Z. Lei, 'Exploiting temporal and depth information for multi-frame face anti-spoofing,' arXiv preprint arXiv:1811.05118, 2018.
[52] D. Wen, H. Han, and A. K. Jain, 'Face spoof detection with image distortion analysis,' IEEE Transactions on Information Forensics and Security, vol. 10, no. 4, pp. 746-761, 2015.
[53] Z. Xu, S. Li, and W. Deng, 'Learning temporal features using LSTM-CNN architecture for face anti-spoofing,' in Pattern recognition (acpr), 2015 3rd IAPR asian conference on, 2015, pp. 141-145: IEEE.
[54] J. Yang, Z. Lei, and S. Z. Li, 'Learn convolutional neural network for face anti-spoofing,' arXiv preprint arXiv:1408.5601, 2014.
[55] S. Yoon, J. Feng, and A. K. Jain, 'Altered fingerprints: Analysis and detection,' IEEE transactions on pattern analysis and machine intelligence, vol. 34, no. 3, pp. 451-464, 2012.
[56] Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, and S. Z. Li, 'A face antispoofing database with diverse attacks,' in 2012 5th IAPR international conference on Biometrics (ICB), 2012, pp. 26-31: IEEE.
[57] B. Zinelabidine, K. Jukka, L. Li, X. Feng, and A. Hadid, 'OULUNPU: a mobile face presentation attack database with real-world variations,' in Proc. IEEE Int. Conf. on Identity, Security and Behavior Analysis, ISBA, 2017, pp. 1-7.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74591-
dc.description.abstract隨著臉部辨識在各種授權系統的使用需求趨於增加,如何防止非法入侵者透過臉部影像造假技術而得到使用許可變成重要的研究議題。在過往研究者的努力之下,在同一臉部防偽資料集內的訓練及測試準確率,已經達到可觀的研究成果。但是,根據某一資料集所訓練的模型,再將之應用到其他資料集時,仍存在許多問題;也就是在跨資料集測試時,錯誤率會有巨大的增加。為了解決此問題,本論文提出了一種無監督及遷移學習的方法,以提高模型在跨資料集時的泛化能力。我們使用預訓練深度學習模型來抽取臉部真實及造假影像的高維影像特徵,並透過降維及無監督分群方法取得針對測試資料集的分類結果。此方法的特色在於,預訓練模型的訓練資料不只使用臉部防偽影像,也納入模糊偵測及自然影像資料集。在我們提出的模型架構中,甚至可以在不使用臉部防偽影像的情況下完成訓練。與現有的遷移學習中,大多仍會採用目標資料集的標籤來調整模型的方法相比,本方法更偏重於尋找足以多重跨資料集導向的模型。在現有主要的公開資料集實驗中,我們的分類模型的平均錯誤率,比起現有最好方法低了3%以上,我們相信無監督深度分群的模型對於克服此一問題有極大的研究潛力。zh_TW
dc.description.abstractWith the increasing requirements for face recognition in many authentication systems, how to prevent intruders from accessing the permission via Face Anti-Spoofing(FAS) techniques has become an important research area in biometrics. After the endeavors over the past few years, researchers around the world have achieved acceptable FAS detection accuracy in the same training and testing dataset. However, it is still problematic when the model trained on one dataset is tested on some other datasets. The detection error rate increases dramatically when this kind of cross-dataset evaluation arises. To address this issue, this thesis introduces the unique techniques of transfer learning and unsupervised learning to increase the generalization ability for cross-dataset evaluation. Specifically, we develop a pre-trained deep learning model to extract the high dimension features of the attack and bona fide images, and the extracted features are clustered into two subsets after the dimension is reduced. One particular characteristic of this strategy is that the dataset that being used to train the pre-trained model is not necessarily in the FAS domain, which makes our framework naturally cross-data oriented. This is quite different from other existing transfer learning methods, which mostly utilize the labeled data of the target domain to fine-tune the model parameters. Based on benchmark dataset experiments, our FAS classifier achieved lower average classification error rate (ACER) scores than state-of-the-art methods by 3%. We believe that the proposed semi-supervised learning model is of potential to overcome this challenging FAS task in biometrics.en
dc.description.provenanceMade available in DSpace on 2021-06-17T08:44:31Z (GMT). No. of bitstreams: 1
ntu-108-R06525087-1.pdf: 3188031 bytes, checksum: c416939475849b38139c3686c311ac75 (MD5)
Previous issue date: 2019
en
dc.description.tableofcontents致謝 i
中文摘要 ii
ABSTRACT iii
目錄 v
圖目錄 vi
表目錄 vii
第一章 緒論 1
第二章 文獻回顧 5
2.1影像紋理特徵 5
2.2生物訊號分析 7
2.3深度卷積網路 9
2.4跨資料集表現回顧 11
第三章 研究方法 15
3.1研究方法架構概述 15
3.2特徵抽取之預訓練模型 17
3.3模糊偵測資料集 20
3.4降維方法及分群 22
3.5實驗流程圖 23
3.6模型能力評估方法 25
第四章 實驗結果 27
4.1資料集及預訓練模型介紹 27
4.1.1公開資料集簡介 27
4.1.2預訓練模型介紹 29
4.2參數分析 31
4.2.1實驗結果列表 31
4.2.2公開資料集測試結果討論 36
4.3實驗結果比較 38
4.3.1最佳實驗結果之模型設定 38
4.3.2與現有方法結果之比較 40
第五章 結論 43
附錄 預訓練模型圖表 44
參考文獻 48
dc.language.isozh-TW
dc.subject臉部防偽zh_TW
dc.subject跨資料集zh_TW
dc.subject深度學習zh_TW
dc.subject無監督學習zh_TW
dc.subject分群zh_TW
dc.subjectface anti-spoofingen
dc.subjectcross-dataseten
dc.subjectdeep learningen
dc.subjectunsupervised learningen
dc.subjectclusteringen
dc.title基於無監督深度特徵分群法的人臉影像防偽辨識模型zh_TW
dc.titleAn Unsupervised Face Anti-Spoofing Model Based on Deep Feature Clusteringen
dc.typeThesis
dc.date.schoolyear107-2
dc.description.degree碩士
dc.contributor.oralexamcommittee戴璽恆,張瑞益,黃乾綱
dc.subject.keyword臉部防偽,跨資料集,深度學習,無監督學習,分群,zh_TW
dc.subject.keywordface anti-spoofing,cross-dataset,deep learning,unsupervised learning,clustering,en
dc.relation.page52
dc.identifier.doi10.6342/NTU201902655
dc.rights.note有償授權
dc.date.accepted2019-08-07
dc.contributor.author-college工學院zh_TW
dc.contributor.author-dept工程科學及海洋工程學研究所zh_TW
顯示於系所單位:工程科學及海洋工程學系

文件中的檔案:
檔案 大小格式 
ntu-108-1.pdf
  未授權公開取用
3.11 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved