請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/88678完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 傅楸善 | zh_TW |
| dc.contributor.advisor | Chiou-Shann Fuh | en |
| dc.contributor.author | 張季祐 | zh_TW |
| dc.contributor.author | Chi-Yu Chang | en |
| dc.date.accessioned | 2023-08-15T17:20:12Z | - |
| dc.date.available | 2023-11-09 | - |
| dc.date.copyright | 2023-08-15 | - |
| dc.date.issued | 2023 | - |
| dc.date.submitted | 2023-08-04 | - |
| dc.identifier.citation | T. Ahonen, A. Hadid, and M. Pietikainen, "Face Description with Local Binary Patterns: Application to Face Recognition," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 2037-2041, 2006.
Z. Boulkenafet, J. Komulainen, L. Li, X. Feng, and A. Hadid, "OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations," Proceedings of IEEE International Conference on Automatic Face & Gesture Recognition, Washington, DC, pp. 612-618, 2017. H. Chen, G. Hu, Z. Lei, Y. Chen, N. M. Robertson, and S. Z. Li, "Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 578-593, 2020. I. Chingovska, A. Anjos, and S. Marcel, "On the Effectiveness of Local Binary Patterns in Face Anti-Spoofing," Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, pp. 1-7, 2012. J. Deng, J. Guo, E. Ververas, I. Kotsia, and S. Zafeiriou, “Retinaface: Single-Shot Multi-Level Face Localisation in the Wild,” Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, pp. 5203-5212, 2020. J. Deng, J. Guo, N. Xue, and S. Zafeiriou, “Arcface: Additive Angular Margin Loss for Deep Face Recognition,” Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, pp. 4690-4699, 2019. H. Ge, X. Tu, W. Ai, Y. Luo, Z. Ma and M. Xie, "Face Anti-Spoofing by the Enhancement of Temporal Motion," Proceedings of International Conference on Advances in Computer Technology, Information Science and Communications, Suzhou, China, pp. 106-111, 2020. M. S. Hossain, L. Rupty, K. Roy, M. Hasan, S. Sengupta, and N. Mohammed, "A-DeepPixBis: Attentional Angular Margin for Face Anti-Spoofing," Proceedings of International Conference on Digital Image Computing: Techniques and Applications, Melbourne, Australia, pp. 1-8, 2020. J. Komulainen, A. Hadid, and M. Pietikäinen, "Context Based Face Anti-Spoofing," IEEE International Conference on Biometrics: Theory, Applications and Systems, Arlington, VA, pp. 1-8, 2013. A. Kumar, Z. J. Zhang, and H. Lyu, “Object Detection in Real Time Based on Improved Single Shot Multi-Box Detector Algorithm,” EURASIP Journal on Wireless Communications and Networking, Vol. 204, pp. 1-18, 2020. Y. Liu, A. Jourabloo, and X. Liu, "Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision," Proceedings of IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, pp. 389-398, 2018 M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, and L. C. Chen, “Mobilenetv2: Inverted residuals and linear bottlenecks” In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 4510-4520, 2018. L. Sirovich and M. Kirby, “Low-Dimensional Procedure for the Characterization of Human Faces,” J. Opt. Soc. Amer., Vol. 4, No. 3, pp. 519–524, 1987. L. Sun, G. Pan, Z. Wu, and S. Lao, “Blinking-Based Live Face Detection Using Conditional Random Fields,” Proceedings of International Conference on Advances in Biometrics, Seoul, Korea, pp. 252-260, 2007. Y. Q. Wang, "An Analysis of the Viola-Jones Face Detection Algorithm," Image Processing On Line, vol. 4, pp. 128-148, 2014. Y. Wang, X. Song, T. Xu, Z. Feng, and X. J. Wu, "From RGB to Depth: Domain Transfer Network for Face Anti-Spoofing," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4280-4290, 2021 J. Yang, Z. Lei, S. Liao, and S. Z. Li, “Face Liveness Detection with Component Dependent Descriptor,” Proceedings of International Conference on Biometrics, Madrid, Spain, pp. 1-6, 2013. J. Yang, Z. Lei, and S. Z. Li, “Learn convolutional neural network for face anti-spoofing,” 2014. Z. Yu, Yi. Qin, X. Li, C. Zhao, Z. Lei, and G. Zhao, “Deep Learning for Face Anti-Spoofing: A Survey,” IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 1-22, https://arxiv.org/pdf/2106.14948.pdf, 2022. Y. Zhang et al., “CelebA-Spoof: Large-Scale Face Anti-Spoofing Dataset with Rich Annotations,” Proceedings of European Conference on Computer Vision, Glasgow, UK, vol. 12357, pp. 70-85, 2020. K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, "Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks," IEEE Signal Processing Letters, vol. 23, no.10, pp. 1499-1503, 2016. X. Li, J. Komulainen, G. Zhao, P.C. Yuen, and M. Pietikäinen, "Generalized Face Anti-Spoofing by Detecting Pulse from Face Videos, "Proceedings of International Conference on Pattern Recognition (ICPR), Cancun, Mexico, pp. 4244-4249, 2016. Yu, Zitong, et al. "Searching Central Difference Convolutional Networks for Face Anti-Spoofing," Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, pp. 5295-5305, 2020. | - |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/88678 | - |
| dc.description.abstract | 在臉部識別的任務中,除了真實的人臉,可能會存在使用偽裝人臉的攻擊者,偽裝人臉的偵測任務就是為了偵測出使用偽裝者的資料,臉部偽裝者可能會有各種不同的攻擊手段,包含利用印刷照片、手機螢幕、面具,以及播放中的影片。要如何因應這些變化多端的攻擊手段是臉部偽裝偵測所需要面臨的課題。另外,不光是偽裝攻擊手段,環境的影響也是一個相當重要的因素,複雜或是光線變化劇烈的背景可能影響算法的判斷結果。因此,不因為環境而影響判斷才會是一個有足夠韌性的算法。
這篇論文對於偽裝人臉的偵測任務提出一個解決辦法。相對於傳統方法,深度學習的結果相對更好,並且在臉部偽裝偵測任務中,精確度是一項十分重要的衡量標準,因此這篇論文選擇使用深度學習技巧來提高對於臉部真偽分辨結果的可信度。關於臉部偽裝偵測的應用較多在於嵌入式系統上,像是手機、可視門鈴,因此在關注提高精確度之外,系統的運算能力以及算法所占的記憶體空間也視需要考慮的,這些也關乎嵌入式裝置的成本以及耗電量。 | zh_TW |
| dc.description.abstract | In face recognition, besides real human faces, attackers may use disguised faces. Face anti-spoofing detection intends to identify such data. Facial attackers may use various methods, including printed photographs, phone screens, masks, or even videos. How to address these ever-changing attack methods is a challenge faced by face recognition detection. Additionally, the environment is also a significant factor, as complex or rapidly changing lighting conditions may affect the algorithm decision-making. Therefore, a robust algorithm should not be affected by the environment during decision-making.
We propose ChangFAS for face anti-spoofing detection. Compared with traditional methods, deep-learning produces relatively better results. Accuracy is a crucial measure in face recognition detection, and therefore, We choose deep-learning techniques to improve the credibility of facial authenticity discrimination results. Face anti-spoofing detection is mostly applied to embedded systems such as mobile phones and video doorbells. Therefore, besides focusing on improving accuracy, the system's computing power and the memory space occupied by the algorithm should also be considered, as they are related to the cost and power consumption of the embedded device. | en |
| dc.description.provenance | Submitted by admin ntu (admin@lib.ntu.edu.tw) on 2023-08-15T17:20:12Z No. of bitstreams: 0 | en |
| dc.description.provenance | Made available in DSpace on 2023-08-15T17:20:12Z (GMT). No. of bitstreams: 0 | en |
| dc.description.tableofcontents | 誌謝 i
中文摘要 ii ABSTRACT iii CONTENTS v LIST OF FIGURES viii LIST OF TABLES xi Chapter 1 Introduction 1 1.1 Overview 1 1.2 Face Recognition 1 1.3 Environment Variety 2 1.4 Attack Techniques 3 1.5 Thesis Organization 4 Chapter 2 Related Works 5 2.1 Face Detection 5 2.2 Traditional Face Anti-Spoofing 7 2.3 Deep Learning in Face Anti-Spoofing 10 2.4 Remote Photoplethysmography 12 Chapter 3 Background 14 3.1 Application 14 3.2 Central Difference Convolutional Network (CDCN) 14 3.3 CDCN++ 17 3.4 Metric Learning 19 3.4.1 Arcface Loss 19 Chapter 4 Methodology 21 4.1 Overview 21 4.2 Network Architecture 22 4.2.1 Backbone Network 23 4.2.2 Frequency Domain Network 24 4.2.3 Noise Network 27 4.3 Data Augmentation 32 4.4 Auxiliary Tasks 32 4.4.1 Depth Estimation 33 4.4.2 Auxiliary Classification 37 4.5 Loss Functions 39 Chapter 5 Experiment Results 41 5.1 Evaluation Metric 41 5.1.1 Basic Evaluation Metric 41 5.1.2 HTER 42 5.2 Datasets 42 5.2.1 CelebA-Spoof 42 5.2.2 Oulu_NPU 43 5.3 Comparison 44 5.4 Data Visualization 45 5.5 Test Image Result 47 5.6 Ablation Study 57 5.7 Computing performance 58 Chapter 6 Conclusion and Future Works 60 References 61 | - |
| dc.language.iso | en | - |
| dc.subject | 嵌入式系統 | zh_TW |
| dc.subject | 深度學習 | zh_TW |
| dc.subject | 臉部識別 | zh_TW |
| dc.subject | 臉部偽裝偵測 | zh_TW |
| dc.subject | face anti-spoofing | en |
| dc.subject | Face recognition | en |
| dc.subject | deep-learning | en |
| dc.subject | embedded system | en |
| dc.title | 張真臉:真活人臉驗證用於嵌入式系統 | zh_TW |
| dc.title | ChangFAS: Face Anti-Spoofing for Embedded System | en |
| dc.type | Thesis | - |
| dc.date.schoolyear | 111-2 | - |
| dc.description.degree | 碩士 | - |
| dc.contributor.oralexamcommittee | 方瓊瑤;王獻章 | zh_TW |
| dc.contributor.oralexamcommittee | Qiung-Yao Fang;Xian-Zhang Wang | en |
| dc.subject.keyword | 臉部識別,臉部偽裝偵測,深度學習,嵌入式系統, | zh_TW |
| dc.subject.keyword | Face recognition,face anti-spoofing,deep-learning,embedded system, | en |
| dc.relation.page | 64 | - |
| dc.identifier.doi | 10.6342/NTU202302745 | - |
| dc.rights.note | 同意授權(全球公開) | - |
| dc.date.accepted | 2023-08-08 | - |
| dc.contributor.author-college | 電機資訊學院 | - |
| dc.contributor.author-dept | 資訊工程學系 | - |
| 顯示於系所單位: | 資訊工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-111-2.pdf | 3.63 MB | Adobe PDF | 檢視/開啟 |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
