Deteksi Non-Spoofing Wajah pada Video secara Real Time Menggunakan Faster R-CNN
Abstract
Face non-spoofing detection is an important job used to ensure authentication security by performing an analysis of the captured faces. Face spoofing is the process of fake faces by other people to gain illegal access to the biometric system which can be done by displaying videos or images of someone's face on the monitor screen or using printed images. There are various forms of attacks that can be carried out on the face authentication system in the form of face sketches, face photos, face videos and 3D face masks. Such attacks can occur because photos and videos of faces from users of the facial authentication system are very easy to obtain via the internet or cameras. To solve this problem, in this research proposes a non-spoofing face detection model on video using Faster R-CNN. The results obtained in this study are the Faster R-CNN model that can detect non-spoof and spoof face in real time using the Raspberry Pi as a camera with a frame rate of 1 fps.
Downloads
References
[2] S. Liu, P. C. Yuen, S. Zhang and G. Zhao, “3D Mask Face Anti-Spoofing with Remote Photoplethysmography,” Spinger International Publishing AG, pp. 85-100, 2016.
[3] X. Song, X. Zhao, L. Fang and T. Lin, “Discriminative Representation Combinations for Accurate Face Spoofing Detection,” Elsevier, vol. 85, pp. 220-231, 2019.
[4] Z. Boulkenafet, J. Komulainen. J, and A. Hadid, “Face Spoofing Detection Using Colour Texture Analysis,” IEEE Transactions on Information Forensics and Security, vol. 11(8), 2016.
[5] C. Nagpal and S. R. Dubey, “A Performance Evaluation of Convolutional Neural Networks for Face Anti Spoofing,” International Joint Conference on Neural Networks (IJCNN), 2019.
[6] Raspberry Pi Web, “Rasberrypi.org,” 2012. [Online]. Available: https://www.raspberrypi.org/help/what-%20is-a-raspberry-pi/. [Accessed 22 Februari 2020].
[7] Z. Zhong, L. Sun and Q. Huo, “An Anchor-Free Region Proposal Network for Faster R-CNN based Text Detection
[8] Approaches,” International Journal on Document Analysis and Recognition (IJDAR) vol. 22, pp. 315–327, 2019. [8] B. Benjdira, T. Khursheed, A. Koubaa, A. Ammar, and K. Ouni, “Car Detection using Unmanned Aerial Vehicles: Comparison between Faster R-CNN and YOLOv3,” arXiv:1812.10968v1 [cs.RO], 2018.
[9] M. Sunario and W. S. Lestari, “Deteksi Spoofing Wajah Menggunakan Faster R-CNN dengan Arsitektur Resnet50 pada Video, “Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI), vol.9, pp.261-267, 2020.
[10] H. Zettl, “Video Basics. 6 ed,” USA: Wadsworth, 2010.
[11] J. Maatta, A. Hadid, and M. Pietikainen, “Face spoofing detection from single images using texture and local shape analysis, “ IET Digital Libary, 1(1), pp. 3-10, 2012.
[12] A. Anjos, J. Komulainen, A. Hadid, and M. Pietikainen, “Face Anti-spoofing: Visual Approach. In: Handbook of Biometric Anti-Spoofing,” London: Springer, pp. 65-82, 2014.
[13] R. Girshick, “Fast R-CNN. s.l.,” Proceedings of the IEEE International Conference on Computer Vision (ICCV), 2015.
[14] S. M. Abbas and D. S. N. Singh, “Region-based Object Detection and Classification using Faster R-CNN,” Ghaziabad, 4th International Conference on Computational Intelligence & Communication Technology (CICT), 2018.
[15] A. E. Putra, “Mengenal Raspberry Pi. [Online]”, 2012. Available at: http://agfi.staff.ugm.ac.id/blog/index.php/2012/08/mengenal-raspberry-pi/ [Accessed 22 February 2019].
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Deteksi Non-Spoofing Wajah pada Video secara Real Time Menggunakan Faster R-CNN
Pages: 291-299
Copyright (c) 2022 Sunario Megawan, Wulan Sri Lestari, Apriyanto Halim

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















