Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
167 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Deep Tree Learning for Zero-shot Face Anti-Spoofing (1904.02860v2)

Published 5 Apr 2019 in cs.CV

Abstract: Face anti-spoofing is designed to keep face recognition systems from recognizing fake faces as the genuine users. While advanced face anti-spoofing methods are developed, new types of spoof attacks are also being created and becoming a threat to all existing systems. We define the detection of unknown spoof attacks as Zero-Shot Face Anti-spoofing (ZSFA). Previous works of ZSFA only study 1-2 types of spoof attacks, such as print/replay attacks, which limits the insight of this problem. In this work, we expand the ZSFA problem to a wide range of 13 types of spoof attacks, including print attack, replay attack, 3D mask attacks, and so on. A novel Deep Tree Network (DTN) is proposed to tackle the ZSFA. The tree is learned to partition the spoof samples into semantic sub-groups in an unsupervised fashion. When a data sample arrives, being know or unknown attacks, DTN routes it to the most similar spoof cluster, and make the binary decision. In addition, to enable the study of ZSFA, we introduce the first face anti-spoofing database that contains diverse types of spoof attacks. Experiments show that our proposed method achieves the state of the art on multiple testing protocols of ZSFA.

Citations (226)

Summary

  • The paper introduces a novel Deep Tree Network that uses hierarchical embedding and unsupervised clustering to detect 13 distinct spoof attack types.
  • The methodology leverages Convolutional Residual Units and Tree Routing Units to optimize the semantic routing of spoof samples without prior annotation.
  • The results demonstrate state-of-the-art zero-shot performance across traditional benchmarks and the new SiW-M dataset, highlighting its potential in biometric security.

Deep Tree Learning for Zero-shot Face Anti-Spoofing

The paper presents an advanced approach to face anti-spoofing designed to improve the detection of unauthorized access using spoofed facial inputs, introducing a Zero-Shot Face Anti-spoofing (ZSFA) framework named Deep Tree Network (DTN). This novel contribution extends existing methodologies by addressing a more expansive range of spoof attack types compared to prior works.

The authors identify a critical gap in the ZSFA domain, noting that previous studies primarily focused on only one or two spoof types such as print or replay attacks. They broaden the scope by evaluating their DTN on a diverse dataset featuring 13 distinct types of spoof attacks, including replay, print, 3D mask, makeup, and partial attacks. In addition, they introduce a significant advancement with the creation of the Spoof in the Wild database with Multiple Attack Types (SiW-M), which surpasses existing datasets in terms of the variety and volume of recorded subjects and spoof types.

The core innovation in this research is the Deep Tree Network. DTN autonomously organizes spoof samples into semantic sub-groups through unsupervised learning, optimizing a tree structure that effectively routes incoming data, whether known or unknown spoof attacks, to the most analogous cluster. The network implements hierarchical embedding learning, which captures spoof-specific features initially and generalizes to more nuanced patterns within the data as it progresses through the tree nodes using Convolutional Residual Units (CRU) and Tree Routing Units (TRU).

An essential aspect of DTN's operation is the unsupervised partitioning of spoof data at each node along the axis of maximum data variation, resembling a PCA approach, thereby achieving efficient clustering without requiring prior annotation of spoof types. This methodological innovation distinguishes DTN from prior models that often depended on live data modeling without leveraging available spoof data effectively.

The empirical results underscore the method's robustness, demonstrating state-of-the-art performance across multiple experimental protocols, including traditional datasets like CASIA, Replay-Attack, and MSU-MFSD, as well as the newly proposed SiW-M. DTN outperforms benchmark operations by an appreciable margin, particularly in the zero-shot context where the model consistently achieves high accuracy in unseen spoof detection scenarios.

The implications of this research are substantial for the field of biometric security, where the capacity to preemptively detect and counteract novel spoofing strategies is of paramount importance. The paper lays a foundation for further exploration into hierarchical, unsupervised learning models capable of adapting to emerging attack vectors without explicit training data. The introduction of the SiW-M database also provides a broader platform for future assessments of anti-spoofing technologies.

This work highlights a potential shift towards more dynamic and flexible anti-spoofing systems in artificial intelligence, advocating for advanced models that can generalize more effectively across unanticipated spoof types. Future research could expand upon hierarchical models to further enhance adaptability and resilience against evolving artificial spoofing threats, thereby fortifying the reliability of biometric authentication systems.