• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Ma, Yu-Kun (Ma, Yu-Kun.) | Wu, Li-Fang (Wu, Li-Fang.) (学者:毋立芳) | Jian, Meng (Jian, Meng.) | Liu, Fang-Hao (Liu, Fang-Hao.) | Yang, Zhou (Yang, Zhou.)

收录:

EI Scopus PKU CSCD

摘要:

Face-spoofing detection based on deep convolutional neural networks has achieved good performance in recent years. However, deep neural networks are vulnerable to adversarial examples, which will reduce the safety of the face based application systems. Therefore, it is necessary to analyze the mechanism of generating the adversarial examples, so that the face-spoofing detection algorithms will be more robust. Compared with the general classification problems, face-spoofing detection has the smaller inter-class distance, and the perturbation is difficulty to assign. Motivated by the above, this study proposes an approach to generate the adversarial examples for face-spoofing detection by combining the minimum perturbation dimensions and visual concentration. In the proposed approach, perturbation is concentrated on a few pixels in a single component, and the intervals between pixels are constrained-according to the visual concentration. With such constraints, the generated adversarial examples can be perceived by human with low probability. The adversarial examples generated from the proposed approach can defraud the deep neural networks based classifier with only 1.36% changed pixels on average. Furthermore, human vision perception rate of the proposed approach decreases about 20% compared with DeepFool. © Copyright 2019, Institute of Software, the Chinese Academy of Sciences. All rights reserved.

关键词:

Face recognition Convolution Pixels Convolutional neural networks Deep neural networks

作者机构:

  • [ 1 ] [Ma, Yu-Kun]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [Ma, Yu-Kun]School of Information Engineering, He'nan Institute of Science and Technology, Xinxiang; 453000, China
  • [ 3 ] [Wu, Li-Fang]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 4 ] [Jian, Meng]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 5 ] [Liu, Fang-Hao]Courant Institute of Mathematics, New York University, New York; NY; 10012, United States
  • [ 6 ] [Yang, Zhou]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China

通讯作者信息:

  • 毋立芳

    [wu, li-fang]faculty of information technology, beijing university of technology, beijing; 100124, china

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

Journal of Software

ISSN: 1000-9825

年份: 2019

期: 2

卷: 30

页码: 469-480

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次: 9

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 4

归属院系:

在线人数/总访问数:800/3898335
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司