跳到主要內容

臺灣博碩士論文加值系統

(44.201.99.222) 您好!臺灣時間:2022/12/05 23:04
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:彭清鈺
研究生(外文):PENG, CHING-YU
論文名稱:使用熱影像之臉部防偽偵測技術
論文名稱(外文):Face Presentation Attacks Detection by using Thermal Images
指導教授:賴泰宏周兆龍
指導教授(外文):LAI, TAI-HONGCHOU, CHAO-LUNG
口試委員:劉江龍左豪官潘勤强
口試委員(外文):LIU, CHIANG-LUNGTSO, HAO-KUANPAN, CHIN-CHIANG
口試日期:2020-05-06
學位類別:碩士
校院名稱:國防大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2020
畢業學年度:108
語文別:中文
論文頁數:53
中文關鍵詞:生物辨識偽冒偵測熱影像機器學習
外文關鍵詞:BiometricsPresentation Attacks DetectionThermal ImageMachine Learning
相關次數:
  • 被引用被引用:2
  • 點閱點閱:168
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
誌謝 i
摘要 ii
目錄 iv
表目錄 vi
圖目錄 vii
1. 前言 1
1.1 研究背景與動機 1
1.2 研究目的 7
1.3 論文架構 7
2. 文獻探討 9
2.1. 人臉防偽偵測技術探討 9
2.2. 熱紅外線人臉偵測探討 12
2.3. 小結 17
3. 熱影像防偽偵測技術設計 18
4. 實驗結果與分析 31
4.1. 實驗環境與設計 31
4.2. 評量標準 36
4.3. 實驗綜合分析 38
5. 結論與未來研究 44
參考文獻 45
著作列表 52
自傳 53


[1]https://fidoalliance.org/ (2020.2.20)
[2]Jain, A. K., Ross, A., and Prabhakar, S., “An Introduction to Biometric Recognition,” Transactions on Circuits and Systems for Video Technology, Vol. 14, pp. 4-20, 2004.
[3]周桂田,“全球在地化風險典範之衝突─生物特徵辨識作為全球鐵的牢籠”,政治與社會哲學評論,第24卷,第101-189頁,2008。
[4]Akhtar, Z., Micheloni, C., and Foresti, G. L., “Biometric Liveness Detection: Challenges and Research Opportunities”, IEEE Security & Privacy, Vol. 13, No. 5, pp. 63-72, 2015.
[5]Zwiesele, A., Munde, A., Busch, C., and Daum, H., “BioIS Study-Comparative Study of Biometric Identification Systems,” Proceedings of the 2000 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 60-63, 2000.
[6]https://www.chinatimes.com/realtimenews/20130923002247-260412?chdtv (2019.9.20)
[7]Li, Y., Li, Y., Xu, K., Yan, Q., and Deng, R.,“Empirical Study of Face Authentication Systems Under OSNFD Attacks,” IEEE Transactions on Dependable and Secure Computing, Vol. 15, No.2, pp.231-245, 2018.
[8]https://www.kocpc.com.tw/archives/247859 (2019.12.10)
[9]ISO/IEC JTC1 SC37 Biometrics, ISO/IEC 30107-1. “Information Technology-Biometric Presentation Attack Detection,” International Organization for Standardization, 2016.
[10]Galbally, J., Marcel, S., and Fierrez, J., “Biometric Anti-Spoofing Methods: A Survey in Face Recognition,” IEEE Access, Vol.2, pp. 1530-1552, 2014.
[11]Boulkenafet, Z., Komulainen, J., and Hadid, A., “On the Generalization of Color Texture-Based Face Anti-spoofing,” Image and Vision Computing, Vol.77, pp.1-9, 2018.
[12]Sluganovic, I., Roeschlin, M., Rasmussen, K. B., and Martinovic, I., “Using Reflexive Eye Movements for Fast Challenge-Response Authentication,” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016.
[13]Frischholz, R. W., and Werner, A., “Avoiding Replay-Attacks in a Face Recognition System Using Head-Pose Estimation,” IEEE International Workshop on Analysis and Modeling of Faces and Gestures (AMFG’03), pp.234-235, 2003.
[14]Chingovska, I., and dos Anjos, A.R., “On the Use of Client Identity Information for Face Antispoofing,” IEEE Transactions on Information Forensics and Security, Vol.10, No.4, pp.787-796, 2015.
[15]Pan, G., Wu, Z., and Sun, L., “Liveness Detection for Face Recognition,” Recent Advances in Face Recognition, No.9, pp.109-124, 2008.
[16]Kollreider, K., Fronthaler, H., and Bigun, J., “Non-Intrusive Liveness Detection by Face Images,” Image and Vision Computing, Vol. 27, No.3, pp.233-244, 2009.
[17]Chingovska, I., Yang, J., Lei, Z., Yi, D., Li, S. Z., Kahm, O., Glaser, C., Darner, N., Kuijper, A., Nouak, A., Komulainen, J., Pereira, T., Gupta, S., Khandel W., S., Bansal, S., Rai, A., Krishna, T., Goyal, D., Waris, M. A., Zhang, H., Ahmad, I., Kiranyaz, S., Gabbouj, M., Tronci, R., Pili, M., Sirena, N., Roli, F., Galbally, J., Ficrrcz, J., Pinto, A., Pedrini, H., Schwartz, W. S., Rocha, A., Anjos, A., and Marcel, S., “The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks”, Proceedings of the 2007 International Conference on Biometrics, pp.1-6, 2013.
[18]Choudhury, T., Clarkson, B., Jebara, T., and Pentland, A., “Multimodal Person Recognition Using Unconstrained Audio and Video,” International Conference on Audio and Video-Based Biometric Person Authentication, pp.176-181, 1999.
[19]Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., and Li, S. Z., “A face Antispoofing Database with Diverse Attacks”, International Conference on Biometrics, pp. 26-31, 2012.
[20]Bhowmik, M. K., Saha, K., Majumder, S., Majumder, G., Saha, A., Sarma, A. N., Bhattacharjee, D., Basu, D. K. , and Nasipuri, M., “Thermal Infrared Face Recognition - A Biometric Identification Technique for Robust Security System,” Reviews Refinements and New Ideas in Face Recognition, 2011.
[21]Wilder, J., Phillips, P. J., Jiang, C., and Wiener, S., “Comparison of Visible and Infra-Red Imagery for Face Recognition,” 2nd International Conference on Automatic Face & Gesture Recognition, pp.182-187, 1996.
[22]Socolinsky, D. A., Selinger, A., and Neuheisel, J. D., “Face Recognition with Visible and Thermal Infrared Imagery”, Computer Vision and Image Understanding , Vol.91, pp.72-114, 2003.
[23]Kwon, O. K., and Kong, S. G., “Multiscale Fusion of Visual and Thermal Images for Robust Face Recognition,” IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, Vol. IV, pp. 112-116, 2005.
[24]Han, S., Park, H. A., Cho, D., Park, K. R., and Lee, S., “Face Recognition Based on Near-Infrared Light Using Mobile Phone,” International Conference on Adaptive and Natural Computing Algorithms 2007, Vol. 4432, pp. 440-448, 2007.
[25]Lai, K., Samoil, S., and Yanushkevich, S. N., “Multi-Spectral Facial Biometrics in Access Control,” IEEE Symposium on Computational Intelligence in Biometrics and Identity Management, pp. 102-109, 2014.
[26]Zhang, L., Chu, R., Xiang, S., Liao, S., and Li, S. Z., “Face Detection Based on Multi-Block LBP Representation,” 2007 International Conference on Biometrics, pp. 11-18, 2007.
[27]Éndez, H.M., Martín, C. S., Kittler, J., Plasencia, Y., and García-Reyes, E., “Face Recognition with LWIR Imagery Using Local Binary Patterns,” Proceedings of the Third International Conference on Advances in Biometrics, pp. 327-336, 2009.
[28]Dalal, N., and Triggs, B., “Histograms of Oriented Gradients for Human Detection,” Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 886-893, 2005.
[29]Reese, K., Zheng, Y., and Elmaghraby, A., “A Comparison of Face Detection Algorithms in Visible and Thermal Spectrums ,” Proceedings of International Conference on Advances in Computer Science and Application, 2012.
[30]Viola, P., and Jones, M., “Rapid Object Detection Using a Boosted Cascade of Simple Features,” Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp.8-14, 2001.
[31]Sumriddetchkajorn, S., and Somboonkaew, A., “Face Detection in Thermal Imagery Using an Open Source Computer Vision Library,” Proceedings of The International Society for Optical Engineering (SPIE ), pp. 7299, 2009.
[32]Kopaczka, M., Nestler, J., Merhof, D., “Face Detection in Thermal Infrared Images: A Comparison of Algorithm and Machine Learning Based Approaches,” Advanced Concepts for Intelligent Vision Systems, Vol.10617, pp. 518-529, 2017.
[33]Kopaczka, M., Schock, J., Nestler, J., Kielholz, K., and Merhof, D., “A Combined Modular System for Face Detection, Head Pose Estimation, Face Tracking and Emotion Recognition in Thermal Infrared Images,” Proceedings of IEEE International Conference on Imaging Systems and Techniques, 2018.
[34]Kopaczka, M., Breuer, L., Schock, J., and Merhof, D., “A Modular System for Detection, Tracking and Analysis of Human Faces in Thermal Infrared Recordings,”  Sensors, Vol.19, No.4135, 2019.
[35]Wang, X., Han, T.X., and Yan An, S., “An HOG-LBP Human Detector with Partial Occlusion Handling,” Proceedings of the 2009 IEEE 12th International Conference on Computer Vision, pp. 32-39, 2009.
[36]Wilson, P.I., and Fernandez, J., “Facial Feature Detection Using Haar Classifiers,” Journal of Computing and Information Science in Engineering , Vol.21 , No. 4, pp.127-133, 2006.
[37]Hou, H. S., Andrews, and H. C., “Cubic Splines for Image Interpolation and Digital Filtering,” IEEE Transactions on Acoustics Speech and Signal Processing, Vol. ASSP-26, No. 6, pp. 508-517, 1978.
[38]Otsu, N., “A Threshold Selection Method from Gray-Level Histograms,” IEEE transactions on systems, man, and cybernetics, Vol. 9, No.1, pp. 62-66, 1979.
[39]Ragnemalm, I., “Fast Erosion and Dilation by Contour Processing and Thresholding of Distance Maps,” Pattern Recognition Letters, Vol.13, No.3, pp.161-166, 1992.
[40] Russell, S.J., and Norvig, P., Artificial Intelligence: A Modern Approach,
Prentice Hall, New Jersy, pp.111-114, 2016.
[41]Cortes, C., and Vapni, V., “Support Vector Networks,” Machine Learning, Vol. 20, pp. 273-297, 1995.
[42]Espinosa-Duró, V., Faundez-Zanuy, M., Mekyska, J., and Monte-Moreno, E., “A New Face Database Simultaneously Acquired in Visible, Near-Infrared and Thermal Spectrums”, Cognitive Computation, Vol. 5, No. 1, pp. 119-135, 2013.
[43]Espinosa-Duró, V., Faundez-Zanuy, M., Mekyska, J., and Monte-Moreno, E., “A Criterion for Analysis of Different Sensor Combinations with an Application to Face Biometrics”, Cognitive Computation, Vol. 2, No. 3, pp. 135-141, 2010.
[44]Roland Miezianko, Terravic Research Infrared Database. IEEE OTCBVS WS Series Bench; Roland Miezianko, Terravic Research Infrared, http://vcipl-okstate.org/pbvs/bench/.
[45]Chingovska, I., Mohammadi, A., Anjos, A., and Marcel, S., Evaluation Methodologies for Biometric Presentation Attack Detection in Handbook of Biometric Anti-Spoofing: Presentation Attack Detection, Springer International Publishing, New York City, pp. 457-480, 2019.

電子全文 電子全文(網際網路公開日期:20230506)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊