<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
	<record>
		<datafield tag="980" ind1=" " ind2=" ">
			<subfield code="a">REPORT</subfield>
		</datafield>
		<datafield tag="970" ind1=" " ind2=" ">
			<subfield code="a">George_Idiap-RR-03-2022/IDIAP</subfield>
		</datafield>
		<datafield tag="245" ind1=" " ind2=" ">
			<subfield code="a">Robust Face Presentation Attack Detection with Multi-channel Neural Networks</subfield>
		</datafield>
		<datafield tag="700" ind1=" " ind2=" ">
			<subfield code="a">George, Anjith</subfield>
		</datafield>
		<datafield tag="700" ind1=" " ind2=" ">
			<subfield code="a">Marcel, Sébastien</subfield>
		</datafield>
		<datafield tag="856" ind1="4" ind2="0">
			<subfield code="i">EXTERNAL</subfield>
			<subfield code="u">http://publications.idiap.ch/attachments/reports/2021/George_Idiap-RR-03-2022.pdf</subfield>
			<subfield code="x">PUBLIC</subfield>
		</datafield>
		<datafield tag="088" ind1=" " ind2=" ">
			<subfield code="a">Idiap-RR-03-2022</subfield>
		</datafield>
		<datafield tag="260" ind1=" " ind2=" ">
			<subfield code="c">2022</subfield>
			<subfield code="b">Idiap</subfield>
		</datafield>
		<datafield tag="771" ind1="2" ind2=" ">
			<subfield code="d">March 2022</subfield>
		</datafield>
		<datafield tag="520" ind1=" " ind2=" ">
			<subfield code="a">Vulnerability against presentation attacks remains a challenging issue
limiting the reliable use of face recognition systems. Though several methods have
been proposed in the literature for the detection of presentation attacks, the majority
of these methods fail in generalizing to unseen attacks and environments. Since the
quality of attack instruments keeps getting better, the difference between bonaﬁde
and attack samples is diminishing making it harder to distinguish them using the
visible spectrum alone. In this context, multi-channel presentation attack detection
methods have been proposed as a solution to secure face recognition systems. Even
with multiple channels, special care needs to be taken to ensure that the model gener-
alizes well in challenging scenarios. In this chapter, we present three different strate-
gies to use multi-channel information for presentation attack detection. Speciﬁcally,
we present different architecture choices for fusion, along with ad-hoc loss func-
tions as opposed to standard classiﬁcation objective. We conduct an extensive set
of experiments in the HQ-WMCA dataset, which contains a wide variety of attacks
and sensing channels together with challenging unseen attack evaluation protocols.
We make the protocol, source codes, and data publicly available to enable further
extensions of the work.</subfield>
		</datafield>
	</record>
</collection>