CONF
George_IJCB_2021/IDIAP
On the Effectiveness of Vision Transformers for Zero-shot Face Anti-Spoofing
George, Anjith
Marcel, Sébastien
EXTERNAL
https://publications.idiap.ch/attachments/papers/2021/George_IJCB_2021.pdf
PUBLIC
https://publications.idiap.ch/index.php/publications/showcite/George_Idiap-RR-30-2020
Related documents
International Joint Conference on Biometrics (IJCB 2021)
2021
The vulnerability of face recognition systems to presentation attacks has limited their application in security-critical scenarios. Automatic methods of detecting such malicious attempts are essential for the safe use of facial recognition technology. Although various methods have been suggested for detecting such attacks, most of them over-fit the training set and fail in generalizing to unseen attacks and environments. In this work, we use transfer learning from the vision transformer model for the zero-shot anti-spoofing task. The effectiveness of the proposed approach is demonstrated through experiments in publicly available datasets. The proposed approach outperforms the state-of-the-art methods in the zero-shot protocols in the HQ-WMCA and SiW-M datasets by a large margin. Besides, the model achieves a significant boost in cross-database performance as well.
REPORT
George_Idiap-RR-30-2020/IDIAP
On the Effectiveness of Vision Transformers for Zero-shot Face Anti-Spoofing
George, Anjith
Marcel, Sébastien
EXTERNAL
https://publications.idiap.ch/attachments/reports/2020/George_Idiap-RR-30-2020.pdf
PUBLIC
Idiap-RR-30-2020
2020
Idiap
November 2020
The vulnerability of face recognition systems to presentation attacks has limited their application in security-critical scenarios. Automatic methods of detecting such malicious attempts are essential for the safe use of facial recognition technology. Although various methods have been suggested for detecting such attacks, most of them over-fit the training set and fail in generalizing to unseen attacks and environments. In this work, we use transfer learning from the vision transformer model for the zero-shot anti-spoofing task. The effectiveness of the proposed approach is demonstrated through experiments in publicly available datasets. The proposed approach outperforms the state of the art methods in the zero-shot protocols in the HQ-WMCA and SiW-M datasets by a large margin. Besides, the model achieves a significant boost in cross-database performance as well.