Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

Authentication plays a pivotal role in contemporary security frameworks, with various methods utilized including passwords, hardware tokens, and biometrics. Biometric authentication and face recognition hold significant application potential, albeit susceptible to forgery, termed as face spoofing attacks. These attacks, encompassing 2D and 3D modalities, pose challenges through fake photos, warped images, video displays, and 3D masks. The existing counter measures are attack specific and use complex architecture adding to the computational cost. The deep transfer learning models such as AlexNet, ResNet, VGG, and Inception V3 can be used, but they are computationally expensive. This article proposes LwFLNeT, a lightweight deep CNN method that leverages parallel dropout layers to prevent over fitting and achieves excellent performance on 2D and 3D face spoofing datasets. The proposed methods is validated through the Cross-dataset train test evaluation. The methodology proposed in the article has the following key contributions:•Design of Light Weight Dual Stream CNN architecture with a parallel dropout layer to minimize over fitting issue.•Design of Generalized and Robust deep CNN architecture that detects both 2D and 3D attacks with higher efficiency compared to existing methodology.•Method validation done with State-of-the-Art methods using the standard performance metrics for face spoofing attack detection.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11915004PMC
http://dx.doi.org/10.1016/j.mex.2025.103229DOI Listing

Publication Analysis

Top Keywords

face spoofing
12
light weight
8
deep cnn
8
parallel dropout
8
cnn architecture
8
face
5
enhanced light
4
weight face
4
face liveness
4
liveness detection
4

Similar Publications

Face Anti-Spoofing (FAS) is constantly challenged by new attack types and mediums, and thus it is crucial for a FAS model to not only mitigate Catastrophic Forgetting (CF) of previously learned spoofing knowledge on the training data during continual learning but also enhance the model's generalization ability to potential spoofing attacks. In this paper, we first highlight that current strategies for catastrophic forgetting are not well-suited to the imperceptible nature of spoofing information in FAS and lack the focus on improving generalization capability. Then, the instance-wise dynamic central difference convolutional adapter module with the weighted ensemble strategy for Vision Transformer (ViT) is proposed for efficiently fine-tuning with low-shot data by extracting generalized spoofing texture information.

View Article and Find Full Text PDF

Face Anti-Spoofing (FAS) is essential for securing face recognition systems against presentation attacks. Recent advances in sensor technology and multimodal learning have enabled the development of multimodal FAS systems. However, existing methods often struggle to generalize to unseen attacks and diverse environments due to two key challenges: (1) Modality unreliability, where sensors such as depth and infrared suffer from severe domain shifts, impairing the reliability of cross-modal fusion; and (2) Modality imbalance, where over-reliance on a dominant modality weakens the model's robustness against attacks that affect other modalities.

View Article and Find Full Text PDF

Face anti-spoofing detection is crucial for identity verification and security monitoring. However, existing single-modal models struggle with feature extraction under complex lighting conditions and background variations. Moreover, the feature distributions of live and spoofed samples often overlap, resulting in suboptimal classification performance.

View Article and Find Full Text PDF

Authentication plays a pivotal role in contemporary security frameworks, with various methods utilized including passwords, hardware tokens, and biometrics. Biometric authentication and face recognition hold significant application potential, albeit susceptible to forgery, termed as face spoofing attacks. These attacks, encompassing 2D and 3D modalities, pose challenges through fake photos, warped images, video displays, and 3D masks.

View Article and Find Full Text PDF

Conventional living-skin detection methods based on remote photoplethysmographic imaging (PPGI) are not suitable for face anti-spoofing nor skin segmentation for video health monitoring. Therefore, we refer to a novel algorithm based on an entirely new principle for these tasks, i.e.

View Article and Find Full Text PDF