Convolutional Neural Network Approach for Multispectral Facial Presentation Attack Detection in Automated Border Control Systems
Automated border control systems are the first critical infrastructure point when crossing a border country. Crossing border lines for unauthorized passengers is a high security risk to any country. This paper presents a multispectral analysis of presentation attack detection for facial biometrics u...
Saved in:
Published in | Entropy (Basel, Switzerland) Vol. 22; no. 11; p. 1296 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Switzerland
MDPI AG
14.11.2020
MDPI |
Subjects | |
Online Access | Get full text |
ISSN | 1099-4300 1099-4300 |
DOI | 10.3390/e22111296 |
Cover
Summary: | Automated border control systems are the first critical infrastructure point when crossing a border country. Crossing border lines for unauthorized passengers is a high security risk to any country. This paper presents a multispectral analysis of presentation attack detection for facial biometrics using the learned features from a convolutional neural network. Three sensors are considered to design and develop a new database that is composed of visible (VIS), near-infrared (NIR), and thermal images. Most studies are based on laboratory or ideal conditions-controlled environments. However, in a real scenario, a subject’s situation is completely modified due to diverse physiological conditions, such as stress, temperature changes, sweating, and increased blood pressure. For this reason, the added value of this study is that this database was acquired in situ. The attacks considered were printed, masked, and displayed images. In addition, five classifiers were used to detect the presentation attack. Note that thermal sensors provide better performance than other solutions. The results present better outputs when all sensors are used together, regardless of whether classifier or feature-level fusion is considered. Finally, classifiers such as KNN or SVM show high performance and low computational level. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ISSN: | 1099-4300 1099-4300 |
DOI: | 10.3390/e22111296 |