激光与光电子学进展, 2019, 56 (3): 031002, 网络出版: 2019-07-31   

基于多特征融合的3D打印面具攻击检测 下载: 1255次封面文章

3D Printing Mask Attacks Detection Based on Multi-Feature Fusion
作者单位
1 北京工业大学北京未来网络科技高精尖创新中心, 北京 100124
2 北京工业大学北京市数字化医疗3D打印工程技术研究中心, 北京 100124
引用该论文

陆经纬, 陈鹤天, 马肖攀, 陈继民. 基于多特征融合的3D打印面具攻击检测[J]. 激光与光电子学进展, 2019, 56(3): 031002.

Jingwei Lu, Hetian Chen, Xiaopan Ma, Jimin Chen. 3D Printing Mask Attacks Detection Based on Multi-Feature Fusion[J]. Laser & Optoelectronics Progress, 2019, 56(3): 031002.

参考文献

[1] 张敏贵, 周德龙, 潘泉, 等. 生物特征识别及研究现状[J]. 生物物理学报, 2002, 18(2): 156-162.

    Zhang M G, Zhou D L, Pan Q, et al. Biometrics and its situation of present study[J]. Acta Biophysica Sinica, 2002, 18(2): 156-162.

[2] Nixon KA, AimaleV, Rowe RK. Spoof detection schemes[M] ∥Boston: Springer US, 2008: 403- 423.

[3] ChettyG, WagnerM. Multi-level liveness verification for face-voice biometric authentication[C]∥Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference, 2006: 1- 6.

[4] PanG, SunL, Wu ZH, et al. Eyeblink-based anti-spoofing in face recognition from a generic webcamera[C]∥IEEE 11th International Conference on Computer Vision, 2007: 1- 8.

[5] KollreiderK, FronthalerH, BigunJ. Evaluating liveness by face images and the structure tensor[C]//Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05), 2005: 75- 80.

[6] de MarsicoM, NappiM, RiccioD, et al. Moving face spoofing detection via 3D projective invariants[C]∥2012 5th IAPR International Conference on Biometrics (ICB), 2012: 73- 78.

[7] 孔月萍, 刘霞, 谢心谦, 等. 基于梯度方向直方图的人脸活体检测方法[J]. 激光与光电子学进展, 2018, 55(3): 031009.

    Kong Y P, Liu X, Xie X Q, et al. Face liveness detection method based on histogram of oriented gradient[J]. Laser & Optoelectronics Progress, 2018, 55(3): 031009.

[8] MäättäJ, HadidA, PietikäinenM. Face spoofing detection from single images using micro-texture analysis[C]∥International Joint Conference on Biometrics (IJCB), 2011: 1- 7.

[9] 谷小婧, 付传卿, 顾幸生. 基于面部生命特征的3D假面欺骗攻击检测方法[J]. 系统仿真学报, 2016, 28(2): 361-368.

    Gu X J, Fu C Q, Gu X S. Facial vital sign based countermeasure against 3D mask attacks[J]. Journal of System Simulation, 2016, 28(2): 361-368.

[10] WallaceR, McLaren M, McCool C, et al. Inter-session variability modelling and joint factor analysis for face authentication[C]∥International Joint Conference on Biometrics (IJCB), 2011: 1- 8.

[11] ErdogmusN, MarcelS. Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect[C]∥IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2013: 1- 6.

[12] Li S Z, Chu R F, Liao S C, et al. Illumination invariant face recognition using near-infrared images[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007, 29(4): 627-639.

[13] Zhang ZW, YiD, LeiZ, et al. Face liveness detection by learning multispectral reflectance distributions[C]∥Face and Gesture, 2011: 436- 441.

[14] KoseN, Dugelay JL. Countermeasure for the protection of face recognition systems against mask attacks[C]∥10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2013: 1- 6.

[15] Menotti D, Chiachia G, Pinto A, et al. Deep representations for iris, face, and fingerprint spoofing detection[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(4): 864-879.

[16] AgarwalA, SinghR, VatsaM. Face anti-spoofing using Haralick features[C]∥IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), 2016: 1- 6.

[17] Guo K H, Labate D. Optimally sparse multidimensional representation using shearlets[J]. SIAM Journal on Mathematical Analysis, 2007, 39(1): 298-318.

[18] Sun X, Morvan J M. Curvature measures, normal cycles and asymptotic cones[J]. Actes des Rencontres Du CIRM, 2013, 3(1): 3-10.

[19] Sun X, Morvan J M. Asymptotic cones of embedded singular spaces[J]. Geometry, Imaging and Computing, 2015, 2(1): 47-76.

[20] Cohen-SteinerD, Morvan JM. Restricted delaunay triangulations and normal cycle[C]∥Proceedings of the nineteenth Conference on Computational Geometry - SCG '03, the Nineteenth Conference, 2003.

[21] Lowe D G. Distinctiveimage features from scale-invariant keypoints[J]. International Journal of Computer Vision, 2004, 60(2): 91-110.

[22] 侯一民, 隋文秀, 孙晓雪. SIFT特征降维方法及其在图像检索中的应用[J]. 中国激光, 2015, 42(s1): s108002.

    Hou Y M, Sui W X, Sun X X. SIFT feature dimension reduction method and its application in image retrieval[J]. Chinese Journal of Lasers, 2015, 42(s1): s108002.

[23] Smeets D, Keustermans J, Vandermeulen D, et al. meshSIFT: local surface features for 3D face recognition under expression variations and partial data[J]. Computer Vision and Image Understanding, 2013, 117(2): 158-169.

[24] 熊风光, 霍旺, 韩燮, 等. 三维点云中关键点误匹配剔除方法[J]. 光学学报, 2018, 38(2): 0210003.

    Xiong F G, Huo W, Han X, et al. Removal method of mismatching keypoints in 3D point cloud[J]. Acta Optica Sinica, 2018, 38(2): 0210003.

[25] Tola E, Lepetit V, Fua P. DAISY: an efficient dense descriptor applied to wide-baseline stereo[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010, 32(5): 815-830.

陆经纬, 陈鹤天, 马肖攀, 陈继民. 基于多特征融合的3D打印面具攻击检测[J]. 激光与光电子学进展, 2019, 56(3): 031002. Jingwei Lu, Hetian Chen, Xiaopan Ma, Jimin Chen. 3D Printing Mask Attacks Detection Based on Multi-Feature Fusion[J]. Laser & Optoelectronics Progress, 2019, 56(3): 031002.

本文已被 2 篇论文引用
被引统计数据来源于中国光学期刊网
引用该论文: TXT   |   EndNote

相关论文

加载中...

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!