• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

定向注视轨迹用于生物特征呈现攻击检测。

Directed Gaze Trajectories for Biometric Presentation Attack Detection.

机构信息

School of Engineering and Digital Arts, University of Kent, Canterbury CT2 7NT, UK.

出版信息

Sensors (Basel). 2021 Feb 17;21(4):1394. doi: 10.3390/s21041394.

DOI:10.3390/s21041394
PMID:33671222
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7922021/
Abstract

Presentation attack artefacts can be used to subvert the operation of biometric systems by being presented to the sensors of such systems. In this work, we propose the use of visual stimuli with randomised trajectories to stimulate eye movements for the detection of such spoofing attacks. The presentation of a moving visual challenge is used to ensure that some pupillary motion is stimulated and then captured with a camera. Various types of challenge trajectories are explored on different planar geometries representing prospective devices where the challenge could be presented to users. To evaluate the system, photo, 2D mask and 3D mask attack artefacts were used and pupillary movement data were captured from 80 volunteers performing genuine and spoofing attempts. The results support the potential of the proposed features for the detection of biometric presentation attacks.

摘要

演示攻击伪造物可以通过向生物识别系统的传感器呈现来破坏生物识别系统的运行。在这项工作中,我们建议使用具有随机轨迹的视觉刺激来刺激眼球运动,以检测这种欺骗攻击。呈现移动的视觉挑战,以确保刺激一些瞳孔运动,然后用相机捕捉。在不同的平面几何形状上探索了各种类型的挑战轨迹,这些平面几何形状代表了可以向用户呈现挑战的预期设备。为了评估系统,使用了照片、2D 面具和 3D 面具攻击伪造物,并从 80 名志愿者中捕获了瞳孔运动数据,他们执行了真实和欺骗尝试。结果支持所提出的特征用于检测生物识别演示攻击的潜力。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/507e3e736ef1/sensors-21-01394-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/174b1aaea4c6/sensors-21-01394-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/561ec1eea08b/sensors-21-01394-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/7834f9ccb755/sensors-21-01394-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/4a02679af023/sensors-21-01394-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/37bfbae55512/sensors-21-01394-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/4246a52b5f74/sensors-21-01394-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/6da7a4b66bbd/sensors-21-01394-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/507e3e736ef1/sensors-21-01394-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/174b1aaea4c6/sensors-21-01394-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/561ec1eea08b/sensors-21-01394-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/7834f9ccb755/sensors-21-01394-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/4a02679af023/sensors-21-01394-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/37bfbae55512/sensors-21-01394-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/4246a52b5f74/sensors-21-01394-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/6da7a4b66bbd/sensors-21-01394-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0ef3/7922021/507e3e736ef1/sensors-21-01394-g008.jpg

相似文献

1
Directed Gaze Trajectories for Biometric Presentation Attack Detection.定向注视轨迹用于生物特征呈现攻击检测。
Sensors (Basel). 2021 Feb 17;21(4):1394. doi: 10.3390/s21041394.
2
Face Biometric Spoof Detection Method Using a Remote Photoplethysmography Signal.基于远程光电容积脉搏波信号的人脸生物特征防伪检测方法。
Sensors (Basel). 2022 Apr 16;22(8):3070. doi: 10.3390/s22083070.
3
Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes.通过光谱时频体的视觉代码本进行人脸伪造检测。
IEEE Trans Image Process. 2015 Dec;24(12):4726-40. doi: 10.1109/TIP.2015.2466088. Epub 2015 Aug 11.
4
Bio-Inspired Presentation Attack Detection for Face Biometrics.用于面部生物识别的生物启发式呈现攻击检测
Front Comput Neurosci. 2019 May 28;13:34. doi: 10.3389/fncom.2019.00034. eCollection 2019.
5
An Attention-Guided Framework for Explainable Biometric Presentation Attack Detection.一种用于可解释生物特征呈现攻击检测的注意力引导框架。
Sensors (Basel). 2022 Apr 28;22(9):3365. doi: 10.3390/s22093365.
6
Biometric recognition via texture features of eye movement trajectories in a visual searching task.基于视觉搜索任务中眼球运动轨迹纹理特征的生物识别。
PLoS One. 2018 Apr 4;13(4):e0194475. doi: 10.1371/journal.pone.0194475. eCollection 2018.
7
The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras.使用3D传感器相机的深度数据在活体面部认证中的有效性
Sensors (Basel). 2019 Apr 24;19(8):1928. doi: 10.3390/s19081928.
8
Live Spoofing Detection for Automatic Human Activity Recognition Applications.实时伪造检测在自动人体活动识别应用中的研究。
Sensors (Basel). 2021 Nov 4;21(21):7339. doi: 10.3390/s21217339.
9
Biometric Recognition Based on Recurrence Plot and InceptionV3 Model Using Eye Movements.基于眼动的递归图和 InceptionV3 模型的生物识别。
IEEE J Biomed Health Inform. 2023 Nov;27(11):5554-5563. doi: 10.1109/JBHI.2023.3313261. Epub 2023 Nov 7.
10
Face Spoofing, Age, Gender and Facial Expression Recognition Using Advance Neural Network Architecture-Based Biometric System.基于先进神经网络架构的生物识别系统的人脸伪造、年龄、性别和面部表情识别。
Sensors (Basel). 2022 Jul 9;22(14):5160. doi: 10.3390/s22145160.

引用本文的文献

1
Face Presentation Attack Detection Using Deep Background Subtraction.基于深度背景减除的人脸呈现攻击检测。
Sensors (Basel). 2022 May 15;22(10):3760. doi: 10.3390/s22103760.
2
Reinforced Palmprint Reconstruction Attacks in Biometric Systems.生物识别系统中的增强掌纹重建攻击。
Sensors (Basel). 2022 Jan 13;22(2):591. doi: 10.3390/s22020591.