Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Advbox | 1,279 | 2 months ago | 2 | December 05, 2018 | 16 | apache-2.0 | Jupyter Notebook | |||
Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and Advbox can benchmark the robustness of machine learning models. Advbox give a command line tool to generate adversarial examples with Zero-Coding. | ||||||||||
Feathernets_face Anti Spoofing Attack Detection Challenge Cvpr2019 | 611 | 3 years ago | 66 | other | Python | |||||
Code for 3rd Place Solution in Face Anti-spoofing Attack Detection Challenge @ CVPR2019,model only 0.35M!!! 1.88ms(CPU) | ||||||||||
Cvpr19 Face Anti Spoofing | 528 | a year ago | 3 | Python | ||||||
Code for 2nd Place Solution in Face Anti-spoofing Attack Detection Challenge @ CVPR2019 | ||||||||||
Chalearn_liveness_challenge | 379 | 4 months ago | 27 | mit | Python | |||||
ChaLearn Face Anti-spoofing Attack Detection [email protected] | ||||||||||
Adversarial Face Attack | 338 | 2 years ago | gpl-3.0 | Python | ||||||
Black-Box Adversarial Attack on Public Face Recognition Systems | ||||||||||
Cdcn | 317 | 2 years ago | 28 | other | Python | |||||
Central Difference Convolutional Networks | ||||||||||
Awesome Fas | 282 | 7 months ago | ||||||||
Paper collection of about the face anti-spoofing | ||||||||||
Advhat | 266 | 2 years ago | 2 | mit | Jupyter Notebook | |||||
AdvHat: Real-world adversarial attack on ArcFace Face ID system | ||||||||||
Spoofing_detection | 150 | 4 years ago | 12 | Python | ||||||
Cork/Face Presentation Attack Detection | ||||||||||
Hyperfas | 143 | 2 years ago | 1 | bsd-3-clause | Python | |||||
静默活体检测 Silent Face Anti-Spoofing Attack Detection |
This repository is dedicated to the image-based Presentation Attack Detection - PAD - systems in two different domains: (i) cork and (ii) face PAD. The proposed PAD system relies on the combination of two different color spaces and uses only a single frame to distinguish from a bona fide image and an image attack, see Fig. 1.
Fig. 1 - General flowchart for the developed image-based PAD system.
Method | Print-attack | Replay-attack | ||
EER(%) | HTER(%) | EER(%) | HTER(%) | |
YCRCB+LUV+ETC [1] | 1.33 | 0.00 | 0.00756 | 0.5954 |
YCRCB+LUV+SVM [1] | 0.00 | 1.76 | 4.30 | 7.86 |
Demonstrative results of the proposed face PAD system - YCRCB+LUV+ETC. The classification model used in this test was trained using the training set of the Replay-Attack database.
If you use any part of this work please cite [1]:
@InProceedings{10.1007/978-3-030-05288-1_15,
author="Costa, Valter
and Sousa, Armando
and Reis, Ana",
editor="Barneva, Reneta P.
and Brimkov, Valentin E.
and Tavares, Jo{\~a}o Manuel R.S.",
title="Image-Based Object Spoofing Detection",
booktitle="Combinatorial Image Analysis",
year="2018",
publisher="Springer International Publishing",
address="Cham",
pages="189--201",
abstract="Using 2D images in authentication systems raises the question of spoof attacks: is it possible to deceive an authentication system using fake models possessing identical visual properties of the genuine one? In this work, an anti-spoofing method approach for a wine anti-counterfeiting system is presented. The proposed method relies in two different color spaces: CIE L*u*v* and {\$}{\$}YC{\_}rC{\_}b{\$}{\$}, to distinguish between a genuine instance and a spoof attack. To evaluate the proposed strategy, two databases were used: a private database, with photos/2D attacks of cork stoppers, created for this work; and the public Replay-Attack database that is used for face spoofing detection methods testing. The results on the private database show that the anti-spoofing approach is able to distinguish with high accuracy a real photo from an attack. Regarding the public database, the results were obtained with existing methods, as the best HTER results using a single frame approach.",
isbn="978-3-030-05288-1"
}