Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/88678
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor傅楸善zh_TW
dc.contributor.advisorChiou-Shann Fuhen
dc.contributor.author張季祐zh_TW
dc.contributor.authorChi-Yu Changen
dc.date.accessioned2023-08-15T17:20:12Z-
dc.date.available2023-11-09-
dc.date.copyright2023-08-15-
dc.date.issued2023-
dc.date.submitted2023-08-04-
dc.identifier.citationT. Ahonen, A. Hadid, and M. Pietikainen, "Face Description with Local Binary Patterns: Application to Face Recognition," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 2037-2041, 2006.
Z. Boulkenafet, J. Komulainen, L. Li, X. Feng, and A. Hadid, "OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations," Proceedings of IEEE International Conference on Automatic Face & Gesture Recognition, Washington, DC, pp. 612-618, 2017.
H. Chen, G. Hu, Z. Lei, Y. Chen, N. M. Robertson, and S. Z. Li, "Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 578-593, 2020.
I. Chingovska, A. Anjos, and S. Marcel, "On the Effectiveness of Local Binary Patterns in Face Anti-Spoofing," Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, pp. 1-7, 2012.
J. Deng, J. Guo, E. Ververas, I. Kotsia, and S. Zafeiriou, “Retinaface: Single-Shot Multi-Level Face Localisation in the Wild,” Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, pp. 5203-5212, 2020.
J. Deng, J. Guo, N. Xue, and S. Zafeiriou, “Arcface: Additive Angular Margin Loss for Deep Face Recognition,” Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, pp. 4690-4699, 2019.
H. Ge, X. Tu, W. Ai, Y. Luo, Z. Ma and M. Xie, "Face Anti-Spoofing by the Enhancement of Temporal Motion," Proceedings of International Conference on Advances in Computer Technology, Information Science and Communications, Suzhou, China, pp. 106-111, 2020.
M. S. Hossain, L. Rupty, K. Roy, M. Hasan, S. Sengupta, and N. Mohammed, "A-DeepPixBis: Attentional Angular Margin for Face Anti-Spoofing," Proceedings of International Conference on Digital Image Computing: Techniques and Applications, Melbourne, Australia, pp. 1-8, 2020.
J. Komulainen, A. Hadid, and M. Pietikäinen, "Context Based Face Anti-Spoofing," IEEE International Conference on Biometrics: Theory, Applications and Systems, Arlington, VA, pp. 1-8, 2013.
A. Kumar, Z. J. Zhang, and H. Lyu, “Object Detection in Real Time Based on Improved Single Shot Multi-Box Detector Algorithm,” EURASIP Journal on Wireless Communications and Networking, Vol. 204, pp. 1-18, 2020.
Y. Liu, A. Jourabloo, and X. Liu, "Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision," Proceedings of IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, pp. 389-398, 2018
M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, and L. C. Chen, “Mobilenetv2: Inverted residuals and linear bottlenecks” In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 4510-4520, 2018.
L. Sirovich and M. Kirby, “Low-Dimensional Procedure for the Characterization of Human Faces,” J. Opt. Soc. Amer., Vol. 4, No. 3, pp. 519–524, 1987.
L. Sun, G. Pan, Z. Wu, and S. Lao, “Blinking-Based Live Face Detection Using Conditional Random Fields,” Proceedings of International Conference on Advances in Biometrics, Seoul, Korea, pp. 252-260, 2007.
Y. Q. Wang, "An Analysis of the Viola-Jones Face Detection Algorithm," Image Processing On Line, vol. 4, pp. 128-148, 2014.
Y. Wang, X. Song, T. Xu, Z. Feng, and X. J. Wu, "From RGB to Depth: Domain Transfer Network for Face Anti-Spoofing," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4280-4290, 2021
J. Yang, Z. Lei, S. Liao, and S. Z. Li, “Face Liveness Detection with Component Dependent Descriptor,” Proceedings of International Conference on Biometrics, Madrid, Spain, pp. 1-6, 2013.
J. Yang, Z. Lei, and S. Z. Li, “Learn convolutional neural network for face anti-spoofing,” 2014.
Z. Yu, Yi. Qin, X. Li, C. Zhao, Z. Lei, and G. Zhao, “Deep Learning for Face Anti-Spoofing: A Survey,” IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 1-22, https://arxiv.org/pdf/2106.14948.pdf, 2022.
Y. Zhang et al., “CelebA-Spoof: Large-Scale Face Anti-Spoofing Dataset with Rich Annotations,” Proceedings of European Conference on Computer Vision, Glasgow, UK, vol. 12357, pp. 70-85, 2020.
K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, "Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks," IEEE Signal Processing Letters, vol. 23, no.10, pp. 1499-1503, 2016.
X. Li, J. Komulainen, G. Zhao, P.C. Yuen, and M. Pietikäinen, "Generalized Face Anti-Spoofing by Detecting Pulse from Face Videos, "Proceedings of International Conference on Pattern Recognition (ICPR), Cancun, Mexico, pp. 4244-4249, 2016.
Yu, Zitong, et al. "Searching Central Difference Convolutional Networks for Face Anti-Spoofing," Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, pp. 5295-5305, 2020.
-
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/88678-
dc.description.abstract在臉部識別的任務中,除了真實的人臉,可能會存在使用偽裝人臉的攻擊者,偽裝人臉的偵測任務就是為了偵測出使用偽裝者的資料,臉部偽裝者可能會有各種不同的攻擊手段,包含利用印刷照片、手機螢幕、面具,以及播放中的影片。要如何因應這些變化多端的攻擊手段是臉部偽裝偵測所需要面臨的課題。另外,不光是偽裝攻擊手段,環境的影響也是一個相當重要的因素,複雜或是光線變化劇烈的背景可能影響算法的判斷結果。因此,不因為環境而影響判斷才會是一個有足夠韌性的算法。

這篇論文對於偽裝人臉的偵測任務提出一個解決辦法。相對於傳統方法,深度學習的結果相對更好,並且在臉部偽裝偵測任務中,精確度是一項十分重要的衡量標準,因此這篇論文選擇使用深度學習技巧來提高對於臉部真偽分辨結果的可信度。關於臉部偽裝偵測的應用較多在於嵌入式系統上,像是手機、可視門鈴,因此在關注提高精確度之外,系統的運算能力以及算法所占的記憶體空間也視需要考慮的,這些也關乎嵌入式裝置的成本以及耗電量。
zh_TW
dc.description.abstractIn face recognition, besides real human faces, attackers may use disguised faces. Face anti-spoofing detection intends to identify such data. Facial attackers may use various methods, including printed photographs, phone screens, masks, or even videos. How to address these ever-changing attack methods is a challenge faced by face recognition detection. Additionally, the environment is also a significant factor, as complex or rapidly changing lighting conditions may affect the algorithm decision-making. Therefore, a robust algorithm should not be affected by the environment during decision-making.

We propose ChangFAS for face anti-spoofing detection. Compared with traditional methods, deep-learning produces relatively better results. Accuracy is a crucial measure in face recognition detection, and therefore, We choose deep-learning techniques to improve the credibility of facial authenticity discrimination results.

Face anti-spoofing detection is mostly applied to embedded systems such as mobile phones and video doorbells. Therefore, besides focusing on improving accuracy, the system's computing power and the memory space occupied by the algorithm should also be considered, as they are related to the cost and power consumption of the embedded device.
en
dc.description.provenanceSubmitted by admin ntu (admin@lib.ntu.edu.tw) on 2023-08-15T17:20:12Z
No. of bitstreams: 0
en
dc.description.provenanceMade available in DSpace on 2023-08-15T17:20:12Z (GMT). No. of bitstreams: 0en
dc.description.tableofcontents誌謝 i
中文摘要 ii
ABSTRACT iii
CONTENTS v
LIST OF FIGURES viii
LIST OF TABLES xi
Chapter 1 Introduction 1
1.1 Overview 1
1.2 Face Recognition 1
1.3 Environment Variety 2
1.4 Attack Techniques 3
1.5 Thesis Organization 4
Chapter 2 Related Works 5
2.1 Face Detection 5
2.2 Traditional Face Anti-Spoofing 7
2.3 Deep Learning in Face Anti-Spoofing 10
2.4 Remote Photoplethysmography 12
Chapter 3 Background 14
3.1 Application 14
3.2 Central Difference Convolutional Network (CDCN) 14
3.3 CDCN++ 17
3.4 Metric Learning 19
3.4.1 Arcface Loss 19
Chapter 4 Methodology 21
4.1 Overview 21
4.2 Network Architecture 22
4.2.1 Backbone Network 23
4.2.2 Frequency Domain Network 24
4.2.3 Noise Network 27
4.3 Data Augmentation 32
4.4 Auxiliary Tasks 32
4.4.1 Depth Estimation 33
4.4.2 Auxiliary Classification 37
4.5 Loss Functions 39
Chapter 5 Experiment Results 41
5.1 Evaluation Metric 41
5.1.1 Basic Evaluation Metric 41
5.1.2 HTER 42
5.2 Datasets 42
5.2.1 CelebA-Spoof 42
5.2.2 Oulu_NPU 43
5.3 Comparison 44
5.4 Data Visualization 45
5.5 Test Image Result 47
5.6 Ablation Study 57
5.7 Computing performance 58
Chapter 6 Conclusion and Future Works 60
References 61
-
dc.language.isoen-
dc.subject嵌入式系統zh_TW
dc.subject深度學習zh_TW
dc.subject臉部識別zh_TW
dc.subject臉部偽裝偵測zh_TW
dc.subjectface anti-spoofingen
dc.subjectFace recognitionen
dc.subjectdeep-learningen
dc.subjectembedded systemen
dc.title張真臉:真活人臉驗證用於嵌入式系統zh_TW
dc.titleChangFAS: Face Anti-Spoofing for Embedded Systemen
dc.typeThesis-
dc.date.schoolyear111-2-
dc.description.degree碩士-
dc.contributor.oralexamcommittee方瓊瑤;王獻章zh_TW
dc.contributor.oralexamcommitteeQiung-Yao Fang;Xian-Zhang Wangen
dc.subject.keyword臉部識別,臉部偽裝偵測,深度學習,嵌入式系統,zh_TW
dc.subject.keywordFace recognition,face anti-spoofing,deep-learning,embedded system,en
dc.relation.page64-
dc.identifier.doi10.6342/NTU202302745-
dc.rights.note同意授權(全球公開)-
dc.date.accepted2023-08-08-
dc.contributor.author-college電機資訊學院-
dc.contributor.author-dept資訊工程學系-
顯示於系所單位:資訊工程學系

文件中的檔案:
檔案 大小格式 
ntu-111-2.pdf3.63 MBAdobe PDF檢視/開啟
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved