ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2020
DOI: 10.1109/icassp40776.2020.9053587
|View full text |Cite
|
Sign up to set email alerts
|

Auto-Fas: Searching Lightweight Networks for Face Anti-Spoofing

Abstract: With the development of mobile devices, it is hopeful and pressing to deploy face recognition and face anti-spoofing (FAS) model on cell phone or portable devices. Most of existing face anti-spoofing methods focus on building computational costly detector for better spoofing face detection performance. However, these detectors are unfriendly to be deployed on the mobile device for real-time FAS applications. In this paper, we propose a neural architecture search (NAS) based method called Auto-FAS, intending to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
24
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

4
5

Authors

Journals

citations
Cited by 41 publications
(24 citation statements)
references
References 14 publications
(20 reference statements)
0
24
0
Order By: Relevance
“…In recent years, several hand-crafted features based [7,8,15,29,45,44] and deep learning based [49,64,36,26,62,4,19,20] methods have been proposed for presentation attack detection (PAD). On one hand, the classical handcrafted descriptors (e.g., local binary pattern (LBP) [7]) leverage local relationship among the neighbours as the discriminative features, which is robust for describing the detailed invariant information (e.g., color texture, moiré pattern and noise artifacts) between the living and spoofing faces.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, several hand-crafted features based [7,8,15,29,45,44] and deep learning based [49,64,36,26,62,4,19,20] methods have been proposed for presentation attack detection (PAD). On one hand, the classical handcrafted descriptors (e.g., local binary pattern (LBP) [7]) leverage local relationship among the neighbours as the discriminative features, which is robust for describing the detailed invariant information (e.g., color texture, moiré pattern and noise artifacts) between the living and spoofing faces.…”
Section: Introductionmentioning
confidence: 99%
“…However, most of existing face recognition systems are easily to be spoofed through presentation attacks (PAs) ranging from printing a face on paper (print attack) to replaying a face on a digital device (replay attack) or bringing a 3D-mask (3D-mask attack). Therefore, not only the research community but also the industry has recognized face anti-spoofing [18,19,4,33,39,11,23,55,1,29,12,49,45,54,21] as a critical role in securing the face recognition system. In the past few years, both traditional methods [14,42,9] and CNN-based methods [35,38,20,24,46] have shown effectiveness in discriminating between the living and spoofing face.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, several hand-crafted feature based [3,4,7,15,28,27] and deep learning based [38,33,29,22,12,34,2,8,9] methods have been proposed for presentation attack detection (PAD). On one hand, the classical hand- * denotes corresponding author [21].…”
Section: Introductionmentioning
confidence: 99%