Multi-domain-learning-FAS icon indicating copy to clipboard operation
Multi-domain-learning-FAS copied to clipboard

The multi-domain FAS work with SiW-Mv2 dataset (ECCV 2022 oral)

SiW-Mv2 Dataset and Multi-domain FAS

drawing

This project page contains Spoof in Wild with Multiple Attacks Version 2 (SiW-Mv2) dataset and the official implementation of our ECCV2022 oral paper "Multi-domain Learning for Updating Face Anti-spoofing Models". [Arxiv] [SiW-Mv2 Dataset]

Authors: Xiao Guo, Yaojie Liu, Anil Jain, Xiaoming Liu

👏 Our algorithm has been officially accepted and delivered to the IAPRA ODIN program!

🔥🔥Check out our quick demo:

The quick view on the code structure.

./Multi-domain-learning-FAS
    ├── source_SiW_Mv2 (The spoof detection baseline source code, pre-trained weights and protocol partition files,.)
    ├── source_multi_domain (The multi-domain updating source code)
    └── DRA_form_SIWMv2.pdf (Dataset Release Agreement)

Note that the spoof detection baseline is described in the supplementary section of [Arxiv.]

1. SiW-Mv2 Introduction:

Introduction: SiW-Mv2 Dataset is a large-scale face anti-spoofing (FAS) dataset that is first introduced in the multi-domain FAS updating algorithm. The SiW-Mv2 dataset includes 14 spoof attack types, and these spoof attack types are designated and verified by the IARPA ODIN program. Also, SiW-Mv2 dataset is a privacy-aware dataset, in which ALL live subjects in SiW-Mv2 dataset have signed the consent form which ensures the dataset usage for the research purpose. The more details are can be found in page and [paper].

2. SiW-Mv2 Protocols:

To set a baseline for future study on SiW-Mv2, we define three protocols. Note the partition file for each protocol is fixed, which can be found in ./source_SiW_Mv2/pro_3_text/ of Dataset Sec.1.

  • Protocol I: Known Spoof Attack Detection. We divide live subjects and subjects of each spoof pattern into train and test splits. We train the model on the training split and report the overall performance on the test split.

  • Protocol II: Unknown Spoof Attack Detection. We follow the leave-one-out paradigm — keep $13$ spoof attack and $80$% live subjects as the train split, and use the remaining one spoof attacks and left $20$% live subjects as the test split. We report the test split performance for both individual spoof attacks, as well as the averaged performance with standard deviation.

  • Protocol III: Cross-domain Spoof Detection. We partition the SiW-Mv2 into $5$ sub-datasets, where each sub-dataset represents novel spoof type, different age and ethnicity distribution, as well as new illuminations. We train the model on the source domain dataset, and evaluate the model on test splits of $5$ different domains. Each sub-dataset performance, and averaged performance with standard deviation are reported

3. Baseline Performance

  • We implement SRENet as the baseline model, and evaluate this SRENet on three SiW-Mv2 protocols. Please find the details in [paper].
  • To quick reproduce the following numerical numbers with .csv result files, please go to Dataset Sec.2.

drawing

  • In ./source_SiW_Mv2, we provide detailed dataset preprocessing steps as well as the training scripts.

drawing drawing

4. Baseline Pre-trained Weights

  • Also, pre-trained weights for $3$ different protocols can be found in this page.
Protocol Unknown Download Protocol Unknown Download Protocol Unknown Download
I N/A link II Partial Eyes link II Transparent link
II Full Mask link II Paper Mask link II Obfuscation link
II Cosmetic link II Paper glass link II Print link
II Impersonate link II Silicone link II Replay link
II FunnyEyes link II Partial Mouth link II Mannequin link
III Cross Domain link

5. Download

  1. SiW-Mv2 database is available under a license from Michigan State University for research purposes. Sign the Dataset Release Agreement link.

  2. Submit the request and your signed DRA to [email protected] with the following information:

    • Title: SiW-Mv2 Application
    • CC: Your advisor's email
    • Content Line 1: Your name, email, affiliation
    • Content Line 2: Your advisor's name, email, webpage
    • Attachment: Signed DRA
  3. You will receive the download instructions upon approval of your usage of the database.

Reference

If you would like to use our work, please cite:

@inproceedings{xiaoguo2022MDFAS,
    title={Multi-domain Learning for Updating Face Anti-spoofing Models},
    author={Guo, Xiao and Liu, Yaojie and Jain, Anil and Liu, Xiaoming},
    booktitle={ECCV},
    year={2022}
}

This github will continue to update in the near future. If you have any question, please contact: Xiao Guo