Entropy-Based Face Recognition and Spoof Detection for Security Applications

被引:10
|
作者
Pujol, Francisco A. [1 ]
Jose Pujol, Maria [2 ]
Rizo-Maestre, Carlos [3 ]
Pujol, Mar [4 ]
机构
[1] Univ Alicante, Dept Comp Technol, San Vicente Raspeig Alic 03690, Spain
[2] Univ Alicante, Dept Appl Math, San Vicente Raspeig Alic 03690, Spain
[3] Univ Alicante, Dept Architectural Construct, San Vicente Raspeig Alic 03690, Spain
[4] Univ Alicante, Dept Comp Sci & Artificial Intelligence, San Vicente Raspeig Alic 03690, Spain
关键词
face recognition; security; spoofing; histogram of oriented gradients; smart cities; FEATURES; METHODOLOGY; CHALLENGES; TEXTURE; PATTERN;
D O I
10.3390/su12010085
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Nowadays, cyber attacks are becoming an extremely serious issue, which is particularly important to prevent in a smart city context. Among cyber attacks, spoofing is an action that is increasingly common in many areas, such as emails, geolocation services or social networks. Identity spoofing is defined as the action by which a person impersonates a third party to carry out a series of illegal activities such as committing fraud, cyberbullying, sextorsion, etc. In this work, a face recognition system is proposed, with an application to the spoofing prevention. The method is based on the Histogram of Oriented Gradients (HOG) descriptor. Since different face regions do not have the same information for the recognition process, introducing entropy would quantify the importance of each face region in the descriptor. Therefore, entropy is added to increase the robustness of the algorithm. Regarding face recognition, our approach has been tested on three well-known databases (ORL, FERET and LFW) and the experiments show that adding entropy information improves the recognition rate significantly, with an increase over 40% in some of the considered databases. Spoofing tests has been implemented on CASIA FASD and MIFS databases, having obtained again better results than similar texture descriptors approaches.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Entropy-based security risk measurement for Android mobile applications
    Mahmood Deypir
    [J]. Soft Computing, 2019, 23 : 7303 - 7319
  • [2] Entropy-based security risk measurement for Android mobile applications
    Deypir, Mahmood
    [J]. SOFT COMPUTING, 2019, 23 (16) : 7303 - 7319
  • [3] Entropy-Based Profiling of Network Traffic for Detection of Security Attack
    Lee, Tsern-Huei
    He, Jyun-De
    [J]. TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 2505 - 2509
  • [4] Entropy-Based Iterative Face Classification
    Kyperountas, Marios
    Tefas, Anastasios
    Pitas, Ioannis
    [J]. BIOMETRICS AND ID MANAGEMENT, 2011, 6583 : 137 - 143
  • [5] Entropy-Based Statistics and Their Applications
    Zhang, Zhiyi
    [J]. ENTROPY, 2023, 25 (06)
  • [6] Robust Face Recognition via Minimum Error Entropy-Based Atomic Representation
    Wang, Yulong
    Tang, Yuan Yan
    Li, Luoqing
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (12) : 5868 - 5878
  • [7] A new entropy-based algorithm for face localization
    Alirezaee, S
    Kanan, HR
    Faez, K
    Aghaeinia, H
    [J]. 2005 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), VOLS 1 AND 2, 2005, : 306 - 310
  • [8] Efficient live face detection to counter spoof attack in face recognition systems
    Biswas, Bikram Kumar
    Alam, Mohammad S.
    [J]. OPTICAL PATTERN RECOGNITION XXVI, 2015, 9477
  • [9] Entropy-based fade modeling and detection
    San Pedro Wandelmer, Jose
    Dominguez Cabrerizo, Sergio
    Denis, Nicolas
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2007, 23 (04) : 1265 - 1280
  • [10] An Entropy-based Scheme for Automatic Target Recognition
    Friend, Mark A.
    Bauer, Kenneth W., Jr.
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2010, 7 (02): : 103 - 114