Giter Club home page Giter Club logo

spoofing_detection's Introduction

Overview

This repository is dedicated to the image-based Presentation Attack Detection - PAD - systems in two different domains: (i) cork and (ii) face PAD. The proposed PAD system relies on the combination of two different color spaces and uses only a single frame to distinguish from a bona fide image and an image attack, see Fig. 1.

Fig. 1 - General flowchart for the developed image-based PAD system.

Contents

Results

MethodPrint-attackReplay-attack
EER(%)HTER(%)EER(%)HTER(%)
YCRCB+LUV+ETC [1] 1.33 0.00 0.00756 0.5954
YCRCB+LUV+SVM [1] 0.00 1.76 4.30 7.86

Cork Spoofing Detection

Face Spoofing Detection

Demonstrative results of the proposed face PAD system - YCRCB+LUV+ETC. The classification model used in this test was trained using the training set of the Replay-Attack database.

How to cite

If you use any part of this work please cite [1]:

@InProceedings{10.1007/978-3-030-05288-1_15,
author="Costa, Valter
and Sousa, Armando
and Reis, Ana",
editor="Barneva, Reneta P.
and Brimkov, Valentin E.
and Tavares, Jo{\~a}o Manuel R.S.",
title="Image-Based Object Spoofing Detection",
booktitle="Combinatorial Image Analysis",
year="2018",
publisher="Springer International Publishing",
address="Cham",
pages="189--201",
abstract="Using 2D images in authentication systems raises the question of spoof attacks: is it possible to deceive an authentication system using fake models possessing identical visual properties of the genuine one? In this work, an anti-spoofing method approach for a wine anti-counterfeiting system is presented. The proposed method relies in two different color spaces: CIE L*u*v* and {\$}{\$}YC{\_}rC{\_}b{\$}{\$}, to distinguish between a genuine instance and a spoof attack. To evaluate the proposed strategy, two databases were used: a private database, with photos/2D attacks of cork stoppers, created for this work; and the public Replay-Attack database that is used for face spoofing detection methods testing. The results on the private database show that the anti-spoofing approach is able to distinguish with high accuracy a real photo from an attack. Regarding the public database, the results were obtained with existing methods, as the best HTER results using a single frame approach.",
isbn="978-3-030-05288-1"
}

spoofing_detection's People

Contributors

ee09115 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

spoofing_detection's Issues

Spoofing detection

Hi valter costa, I checked out your project but I am not able to download any database and having some error while running it, can you provide me a zip file that contains all the files of the project including the databases? that would be really helpful.Thanks

CMD

Hey guys. first of all, well done on the project. And thanks for publishing it for others to play with.

I'm fairly new to python and I was hoping that you might be able to tell me what params I need to give the (Main.py) script when I run it.

Or maby give like an example of how I can run this using windows CMD.

Thanks in advance.
Kind Regards
Ben-Ron Geldenhuys

Preprocess code

Hi, thanks for your excellent model.
I'm trying to make an anti-spoofing model myself and I was wondering if you could share the preprocess you have made to the images

Unable to open models using joblib

Unable to open the models using joblib or pickle..
It always looks for sklearn.externals.joblib

How to get the models saved in using joblib instead of scikit-externals.joblib

Value 0.7

if np.mean(measures) >= 0.7:

Why use the value 0.7?

Results are very poor

Hi thanks for providing your hardwork.

But results needs to be improved, do you have any suggestions for further performance improvement.

thanks

plot eer img

hi,thank for you share your code. how you plot this . Can I get a drawing script?

How to make custom dataset

Hello again,

Thanks for sharing your work.

I read a few issues and im thinking this may not work well on "real world" data, so i wanted to know how could i make my own dataset, given n vidoes which are real and m videos which are attacked in some way.It is related to my other question of how to compute the feature vector given an image.

Thanks in advance.

Tutorial is required.

Can anyone please share detailed instructions to use this code. I am not able to run this code. How to detect spoofing from webcam or not video using this code?

Thank you in advance.

Dataset sharing

Hi,
Thank you for sharing your great work!

Do you have the datasets that you experiemented with in your works? Particularly OULU-NPU and Idiap Replay-Attack datasets, since the owners of these datasets may no longer maintain their website. It would be nice if you can share them!

Thanks

Not successful with real faces!

I found out that your model only works perfectly under the conditions where the face's brightness is normal or dark. I tried some real faces(like the attached photo) under light (a very normal case) and it was not successful. Do you have any solution for that problem?
46914955_283998478987418_6963235176251916288_n

Training

Hi,

i would like to produce some own datasets with webcam and own print magazins.

Do you can show us how you train the models by providing the training script?

Thx.

CSV file used in training_script.py

Can you provide the CSV file training data used for training_script.py?
joblib could not load the classifiers in Raspberry Pi 3B+ due to scikit-learn incompatible versions.
I need to use scikit-learn 0.20.2 instead of 0.19.1 so I need to train the classifier with this version.

Thank you!

Csv file locations

training.py needs csv file as argument .Where is it ? actually what is it ? İs it dataset ?and which columns?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.