Entropy-Based Face Recognition and Spoof Detection for Security Applications

被引:10
|
作者
Pujol, Francisco A. [1 ]
Jose Pujol, Maria [2 ]
Rizo-Maestre, Carlos [3 ]
Pujol, Mar [4 ]
机构
[1] Univ Alicante, Dept Comp Technol, San Vicente Raspeig Alic 03690, Spain
[2] Univ Alicante, Dept Appl Math, San Vicente Raspeig Alic 03690, Spain
[3] Univ Alicante, Dept Architectural Construct, San Vicente Raspeig Alic 03690, Spain
[4] Univ Alicante, Dept Comp Sci & Artificial Intelligence, San Vicente Raspeig Alic 03690, Spain
关键词
face recognition; security; spoofing; histogram of oriented gradients; smart cities; FEATURES; METHODOLOGY; CHALLENGES; TEXTURE; PATTERN;
D O I
10.3390/su12010085
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Nowadays, cyber attacks are becoming an extremely serious issue, which is particularly important to prevent in a smart city context. Among cyber attacks, spoofing is an action that is increasingly common in many areas, such as emails, geolocation services or social networks. Identity spoofing is defined as the action by which a person impersonates a third party to carry out a series of illegal activities such as committing fraud, cyberbullying, sextorsion, etc. In this work, a face recognition system is proposed, with an application to the spoofing prevention. The method is based on the Histogram of Oriented Gradients (HOG) descriptor. Since different face regions do not have the same information for the recognition process, introducing entropy would quantify the importance of each face region in the descriptor. Therefore, entropy is added to increase the robustness of the algorithm. Regarding face recognition, our approach has been tested on three well-known databases (ORL, FERET and LFW) and the experiments show that adding entropy information improves the recognition rate significantly, with an increase over 40% in some of the considered databases. Spoofing tests has been implemented on CASIA FASD and MIFS databases, having obtained again better results than similar texture descriptors approaches.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Entropy-based multipath detection model for MIMO radar
    Junpeng Shi
    Guoping Hu
    Hao Zhou
    [J]. Journal of Systems Engineering and Electronics, 2017, 28 (01) : 51 - 57
  • [42] Spoof Face Recognition in Video Using KSVM
    Faseela, T.
    Jayasree, M.
    [J]. INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 1285 - 1291
  • [43] Entropy-Based Anomaly Detection for Gaussian Mixture Modeling
    Scrucca, Luca
    [J]. ALGORITHMS, 2023, 16 (04)
  • [44] Web Attack Detection using Entropy-based Analysis
    Threepak, T.
    Watcharapupong, A.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2014), 2014, : 244 - 247
  • [45] Sample entropy-based fault detection for photovoltaic arrays
    Khoshnami, Aria
    Sadeghkhani, Iman
    [J]. IET RENEWABLE POWER GENERATION, 2018, 12 (16) : 1966 - 1976
  • [46] Vietnamese treebank construction and entropy-based error detection
    Phuong-Thai Nguyen
    Anh-Cuong Le
    Tu-Bao Ho
    Van-Hiep Nguyen
    [J]. Language Resources and Evaluation, 2015, 49 : 487 - 519
  • [47] Entropy-Based Methods for Motor Fault Detection: A Review
    Aguayo-Tapia, Sarahi
    Avalos-Almazan, Gerardo
    Rangel-Magdaleno, Jose de Jesus
    [J]. ENTROPY, 2024, 26 (04)
  • [48] Entropy-based electricity theft detection in AMI network
    Singh, Sandeep Kumar
    Bose, Ranjan
    Joshi, Anupam
    [J]. IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2018, 3 (02) : 99 - 105
  • [49] Vietnamese treebank construction and entropy-based error detection
    Phuong-Thai Nguyen
    Anh-Cuong Le
    Tu-Bao Ho
    Van-Hiep Nguyen
    [J]. LANGUAGE RESOURCES AND EVALUATION, 2015, 49 (03) : 487 - 519
  • [50] Voice Activity Detection Using Entropy-Based Method
    Xu, Ning
    Wang, Chengcheng
    Bao, Jingyi
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2015,