presentation attack detection and unknown attacks · 2020. 10. 28. · ifpc 2020, pad and unknown...
TRANSCRIPT
![Page 1: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/1.jpg)
Presentation Attack Detection and Unknown Attacks
Marta Gomez-Barrero
Hochschule AnsbachIFPC‘20, 28/10/2020
![Page 2: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/2.jpg)
Ø IntroductionØUnknown PADØ Train on PA and BFØAnomaly detectionØ Conclusions
Outline
2Marta Gomez-Barrero IFPC 2020, PAD and Unknown Attacks, 28/10/2020
![Page 3: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/3.jpg)
What are Presentation Attacks?Ø Presentation attack: presentation to the biometric capture
subsystem with the goal of interfering with the operation of the biometric system
v Impostor: the attacker attempts to being matched to someone else's biometric reference
v Identity concealer: the attacker attempts to avoid being matched to their own biometric reference (i.e., to avoid a black-list)
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 3
Introduction
Marta Gomez-Barrero
[ISO/IEC IS 30107-1 on PAD]
![Page 4: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/4.jpg)
Current situationØ There is a clear need to develop Presentation Attack Detection
(PAD) methods, especially for non-supervised access control scenarios
Ø Good news, there is a lot of work done, reporting really good results and error rates close to 0%
😃
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 4
Introduction
Marta Gomez-Barrero
J. Galbally, S. Marcel, J. Fierrez, “Biometric antispoofing methods: A survey in face recognition”, IEEE Access, 2014
R. Ramachandra, C. Busch, “Presentation attack detection methods for face recognition systems: A comprehensive survey”, ACM CSUR, 2017
E. Marasco, A. Ross, “A survey on antispoofing schemes for fingerprint recognition systems” ACM CSUR, 2014C. Sousedik, C. Busch, “Presentation attack detection methods for fingerprint recognition systems: a survey”, IET Biometrics, 2014
J. Galbally, M. Gomez-Barrero, , “Presentation attack detection in iris recognition”, in Iris and Periocular Biometrics, IET, 2017
A. Czajka, K. Bowyer, “Presentation attack detection for iris recognition: An assessment of the state-of-the-art”, ACM CSUR, 2018
![Page 5: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/5.jpg)
Current situation
Ø But what about unknown attacks? Attacks not seen during training
Ø State of the art PAD methods, based on image quality measures and Support Vector Machines (SVMs), present poor generalisation capabilities to detect unknown attacksv Error rates are multiplied by up to 6! v Even worse, the performance of the system drops significantly for
lower APCER values – probably the most interesting operating points
😟
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5
Introduction
Marta Gomez-Barrero
T. de Freitas Pereira, A. Anjos, J. D. Martino, S. Marcel, “Can face anti-spoofing countermeasures work in a real world scenario?”, in Proc. ICB, 2013
O. Nikisins, A. Mohammadi, A. Anjos, S. Marcel, “On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing”, in Proc. ICB, 2018
![Page 6: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/6.jpg)
Evaluation Metrics – Let‘s keep it standard
Ø In compliance with the ISO/IEC IS 30107-3 on biometric PAD –Part 3: Testing and reporting, the following metrics should be used:
vAttack Presentation Classification Error Rate (APCER): percentage of attack presentations wrongly classified as bona fide presentations.
vBona Fide Presentation Classification Error Rate (BPCER):percentage of bona fide presentations wrongly classified as attack presentation.
vDetection Equal Error Rate (D-EER): operation point where APCER = BPCER.
Introduction
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 6Marta Gomez-Barrero
![Page 7: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/7.jpg)
What can we do?
Ø Profit from ALL the data we have and simulate an unknown attack scenario, using different Presentation Attack Instrument (PAI) species for train and testv Leave-One-Out (LOO) protocolv Deep learning! Generative Adversarial Networks (GANs)
Ø Employ anomaly detection techniques:v Bona fides = “normal“ datav Presentation attacks = outliers, noise
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 7
Unknown PAD
Marta Gomez-Barrero
![Page 8: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/8.jpg)
Fisher vector representation
Ø Add generalisation capabilities to existent PAD approaches
Ø For instance: project the features used by the classifiers into a new feature space, where new attacks will look similar to known attacks
Ø Good results with Fisher vectors for face, fingerprints, and speech!v Deep learning is not the only way to good results and generalisation 😉
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 8
Train on PA and BF
Marta Gomez-Barrero
L. J. Gonzalez-Soler, M. Gomez-Barrero, C. Busch, “Fisher Vector Encoding of Dense-BSIF Features for UnknownFace Presentation Attack Detection”, in Proc. BIOSIG, 2020
L. J. Gonzalez-Soler, J. Patino, M. Gomez-Barrero, M. Todisco, C. Busch, N. Evans, “Texture-based PresentationAttack Detection for Automatic Speaker Verification”, in Proc. WIFS, 2020 (ArXiV)L. J. Gonzalez-Soler, M. Gomez-Barrero, L. Chang, A. Perez-Suarez, C. Busch, „Fingerprint Presentation AttackDetection Based on Local Features Encoding for Unknown Attacks“, in arXiv:1908.10163, 2019
![Page 9: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/9.jpg)
Fisher vector representation
PAI featuresPAI features PAI features
BP featuresBP features
GMM feature space
!!! , !!" , … , !#! , !#"
…
!!! , !!" , … , !#! , !#"BP/PA
!!! , !!"
!"! , !"
"
!# ! , !# "
! $! , ! $
"
FV projection Prediction
Feature extraction
1
2
3
4
$!! $!"$"! $"" ⋯ $!$
$"$⋮ ⋱ ⋮
$%! $%" ⋯ $%$
1
Training Testing
! %! , ! %
"
&# , (# , )#& $, ( $, ) $
& %,( %,) %
&&, (&, )&
&' , (' , )'
Probe unknown PAIsKnown PAIs Known BP
…
Training samples
…
$!! $!"$"! $"" ⋯ $!$
$"$⋮ ⋱ ⋮
$%! $%" ⋯ $%$
Feature extraction
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 9
Train on PA and BF
Marta Gomez-Barrero
BSIF, LBP, SIFT, SURF,…
L. J. Gonzalez-Soler, M. Gomez-Barrero, C. Busch, “Fisher Vector Encoding of Dense-BSIF Features for UnknownFace Presentation Attack Detection”, in Proc. BIOSIG, 2020
BP/AP
![Page 10: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/10.jpg)
Fisher vector representationØ For known attacks (CASIA database):
v BSIF + SVM → D-ERR = 10.21%v State of the art (no deep learning) → D-ERR = 4.60%v BSIF + Fisher Vectors + SVM → D-EER = 1.79%
Ø For unknown attacks:
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 10
Train on PA and BF
Marta Gomez-Barrero
L. J. Gonzalez-Soler, M. Gomez-Barrero, C. Busch, “Fisher Vector Encoding of Dense-BSIF Features for UnknownFace Presentation Attack Detection”, in Proc. BIOSIG, 2020
😃
CASIA REPLAY-ATTACK REPLAY-MOBILECut Warped Video Digital Printed Video Digital Printed Video
AUC 99.6 97.9 99.9 100 99.9 100 100 100 100
D-EER 4.11 6.15 1.37 0.00 1.35 0.00 0.00 0.34 0.02
![Page 11: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/11.jpg)
Fisher vector representation
Ø Depending on the PAI species / training set, very different results!
Ø And this is not exclusive to face, but has also been reported for othercharacteristics (e.g., fingerprint)
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 11
Train on PA and BF
Marta Gomez-Barrero
L. J. Gonzalez-Soler, M. Gomez-Barrero, L. Chang, A. Perez-Suarez, C. Busch, “On the Impact of Different Fabrication Materials on Fingerprint Presentation Attack Detection”,in Proc. ICB, 2019T. Chugh, A. K. Jain, “Fingerprint presentation attack detection: Generalization and efficiency”, in Proc. ICB, 2019
🤔
![Page 12: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/12.jpg)
Fisher vector representation
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 12
Train on PA and BF
Marta Gomez-Barrero
![Page 13: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/13.jpg)
One-Class ClassifiersØ Adapt classifiers such as SVMs or Gaussian Mixture Models (GMMs)
to be trained only on bona fide data
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 13
Anomaly detection
Marta Gomez-Barrero
O. Nikisins, A. Mohammadi, A. Anjos, S. Marcel, “On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing”, in Proc. ICB, 2018
Development Evaluation
![Page 14: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/14.jpg)
Generative Adversarial Networks (GANs)Ø A GAN is made of two parts:
v Generator network: takes as input a random vector and decodes it into a synthetic image
v Discriminator network (adversary): takes as input an image (real or synthetic) and predicts its type
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 14
Anomaly detection
Marta Gomez-Barrero
![Page 15: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/15.jpg)
Generative Adversarial Networks (GANs)Ø We can use a trained discriminator for PAD:
v Synthetic = presentation attackv Real = bona fide
Ø For fingerprint PAD, APCER @ BPCER = 0.2%:
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 15
Anomaly detection
Marta Gomez-Barrero
J. J. Engelsma, A. K. Jain, “Generalizing fingerprint spoof detector: Learning a one-class classifier” in Proc. ICB, 2019
Gelatin Pigmented Playdoh Woodglue Transpa-rency Gold finger
Binary CNN 32.3% 70.6% 99.4% 44.3% 66.0% 88.2%
1-class GAN 26.4% 77.7% 3.7% 14.8% 6.0% 60.8%
Dragonskin Ecoflex Monster Latex
CrayolaMagic Body Latex 2D paper
Binary CNN 51.0% 60.7% 45.7% 21.9% 87.9% 53.9%
1-class GAN 97.9% 95.2% 61.5% 16.4% 99.7% 43.2%
![Page 16: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/16.jpg)
Autoencoders (AEs)
Ø A classical image autoencoder takes an image, maps it to a latent vector space, and decodes it back
Ø The autoencoder learns to reconstruct the original inputs
Ø If we only train it on bona fide data, it will produce “weird” results for presentation attacks on the test set
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 16
Anomaly detection
Marta Gomez-Barrero
![Page 17: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/17.jpg)
Autoencoders
C US + CScoreConv-AE (RE)
C MP US + C ScorePooling-AE (RE)
C MP F R US + CScoreDense-AE (RE)
(300x100xd)
(150x50xd)(300x100xd)
(300x100xd) (300x100xd)
(150x50xd)
(300x100xd)
(300x100xd) (300x100xd)
(150x50xd)(64,)
(7500,) (7500,)
(150x50xd)
(300x100xd)
Conv-AE
Pooling-AE
Dense-AE
(128,)
SWIR (1200, 1300, 1450, 1550 nm)
Laser(First, Middle, Last)
(128,)
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 17
Anomaly detection
Marta Gomez-Barrero
J. Kolberg, M. Grimmer, M. Gomez-Barrero, C. Busch, “Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection”, in ArXiV:2008.07989, 2020.
![Page 18: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/18.jpg)
AutoencodersØ 19,711 bona fide and 4,339 PA images, 45 different PAI species
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 18
Anomaly detection
Marta Gomez-Barrero
![Page 19: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/19.jpg)
Autoencoders vs. Two-class CNNsØ What happens when we benchmark Autoencoders with two-class
classifiers evaluated on a leave-one-out (LOO) protocol?
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 19
Anomaly detection
Marta Gomez-Barrero
J. Kolberg, M. Gomez-Barrero, C. Busch, “On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain”, in ArXiX:2010.09566, 2020.
![Page 20: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/20.jpg)
Autoencoders vs. Two-class CNNsØ Baseline training on BFs + PAs (APCER @ BPCER = 0.2%)
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 20
Anomaly Detection
Marta Gomez-Barrero
![Page 21: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/21.jpg)
Autoencoders vs. Two-class CNNsØ LOO per groups: fake fingers
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 21
Anomaly detection
Marta Gomez-Barrero
![Page 22: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/22.jpg)
Autoencoders vs. Two-class CNNsØ LOO per groups: opaque overlays
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 22
Anomaly detection
Marta Gomez-Barrero
![Page 23: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/23.jpg)
Autoencoders vs. Two-class CNNsØ LOO per groups: transparent overlays
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 23
Anomaly detection
Marta Gomez-Barrero
![Page 24: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/24.jpg)
Ø Goal: generate synthetic PA images of unknown materials, by transferring the style (texture) characteristics from known materials
Style transfer with deep learning
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 24
Train on PA and BF
Marta Gomez-Barrero
T. Chugh, A. K. Jain, “Fingerprint Spoof Generalization”, ArXiV:1912.02710, 2019
![Page 25: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/25.jpg)
Ø Style transfer is done with an AE constructionØ A GAN construction enhances the appearance of the synthetic
samples
Style transfer with GANs and AEs
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 25
Train on PA and BF
Marta Gomez-Barrero
T. Chugh, A. K. Jain, “Fingerprint Spoof Generalization”, ArXiV:1912.02710, 2019
![Page 26: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/26.jpg)
Style transfer with deep learning
Ø For fingerprint PAD, APCER @ BPCER = 0.2% on a LOO partition:
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 26
Train on PA and BF
Marta Gomez-Barrero
Gelatin Silicone Playdoh Woodglue Transpa-rency Gold Finger
CNN 45.05% 32.28% 41.58% 13.62% 4.17% 11.78%
CNN + UMG 2.04% 1.36% 27.64% 1.03% 0.00% 11.41%
Dragonskin ConductiveInk + Paper
Monster Latex
3D Univ. Targets Body Latex 2D paper
CNN 2.52% 10.00% 5.23% 5.00% 23.65% 44.56%
CNN + UMG 0.00% 0.00% 3.76% 0.00% 10.28% 19.78%
T. Chugh, A. K. Jain, “Fingerprint Spoof Generalization”, ArXiV:1912.02710, 2019
![Page 27: Presentation Attack Detection and Unknown Attacks · 2020. 10. 28. · IFPC 2020, PAD and Unknown Attacks, 28/10/2020 5 Introduction Marta Gomez-Barrero T. de Freitas Pereira, A](https://reader035.vdocuments.site/reader035/viewer/2022081518/613417d1dfd10f4dd73b82bc/html5/thumbnails/27.jpg)
Ø Good performing PAD methods are still not robust to unknown attacks
Ø Two approaches to tackle the problem:v Use a limited number of PAI species for training in order to simulate an
unknown attacks scenariov Use anomaly detection approaches
Ø Main findings:v Traditional one-class classifiers cannot reach a good performance in
the state of the art (so far)v Alternatives based on feature projection, autoencoders, or style
transfer do offer good results, but highly dependent on the PAI species
Ø There is still work to be done!
IFPC 2020, PAD and Unknown Attacks, 28/10/2020 27
Conclusions
Marta Gomez-Barrero