Facial-Liveliness-Verification for Monocular Real-Time-Systems
dc.contributor.author | Hassani, Ali | |
dc.contributor.advisor | Malik, Hafiz | |
dc.date.accessioned | 2022-11-16T15:04:49Z | |
dc.date.available | 2023-11-16 10:04:50 | en |
dc.date.issued | 2022-12-17 | |
dc.date.submitted | 2022-11-01 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/175150 | |
dc.description.abstract | Face-recognition is becoming the go-to authentication method. It is convenient: simply look at the camera for instant recognition. Attackers, however, can expose vulnerabilities by “replaying” an enrolled user. The primary concern here is the physical-spoof-attack. Attackers can acquire a representative image from social media and create a realistic looking facsimile (e.g., paper-mask) for authentication. This attack is rather popular for its efficacy and simplicity; despite this, there are few reliable monocular detection methods. Alternatively, attackers can tamper the camera stream by placing an injection device. The face-swap-attack similarly presents an acquired image of the victim, this time as a photo-realistic image alteration using machine-learning. This attack is new and does not yet have a computationally efficient means of detection. The goal of this dissertation is to address both problems in a fashion that is monocular, single-frame and computationally efficient. A series of four physics-informed facial-liveliness-verification frameworks are presented to achieve these goals. Performance evaluation shows best-in-class accuracy where all algorithms are optimized for real-time-systems. These results are discussed and concluded with proposed future works. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Face recognition | en_US |
dc.subject | Face liveliness | en_US |
dc.subject | Forensics | en_US |
dc.subject | Deepfake | en_US |
dc.subject | Real-time systems | en_US |
dc.subject.other | Electrical, Electronics, and Computer Engineering | en_US |
dc.title | Facial-Liveliness-Verification for Monocular Real-Time-Systems | en_US |
dc.type | Thesis | en_US |
dc.description.thesisdegreename | PhD | en_US |
dc.description.thesisdegreediscipline | College of Engineering & Computer Science | en_US |
dc.description.thesisdegreegrantor | University of Michigan-Dearborn | en_US |
dc.contributor.committeemember | Abouelenien, Mohamed | |
dc.contributor.committeemember | Lakshmanan, Sridhar | |
dc.contributor.committeemember | Rawashdeh, Samir | |
dc.contributor.committeemember | Shaout, Adnan | |
dc.identifier.uniqname | 3873 9600 | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/175150/1/Ali Hassani final dissertation.pdf | |
dc.identifier.doi | https://dx.doi.org/10.7302/6611 | |
dc.identifier.orcid | 0000-0003-0097-6807 | en_US |
dc.description.filedescription | Description of Ali Hassani final dissertation.pdf : Dissertation | |
dc.identifier.name-orcid | Hassani, Ali; 0000-0003-0097-6807 | en_US |
dc.working.doi | 10.7302/6611 | en_US |
dc.owningcollname | Dissertations and Theses (Ph.D. and Master's) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.