In order to increase the diversity of image quality, this work presents a new PAD database based on open-access Flickr images called: "F-PAD". Our new hand-made database shows high-quality printed and screen scenarios. This will help researchers to compare new approaches to existing algorithms on a wider database. This database will be available for other researchers. A leave-one-out protocol was used to train and evaluate three PAD models based on MobileNet-V3 (small and large) and EfficientNet-B0. The best result was reached with MobileNet-V3 large with BPCER10 of 7.08% and BPCER20 of 11.15%.
Database description
This work will be presented in IWBF 2023: 11th International Workshop on Biometrics and Forensics 2023. Barcelona, April, 2023. Link: https://ieeexplore.ieee.org/document/10157771
@INPROCEEDINGS{10157771,
author={Pasmino, Diego and Aravena, Carlos and Tapia, Juan E. and Busch, Christoph},
booktitle={2023 11th International Workshop on Biometrics and Forensics (IWBF)},
title={Flickr-PAD: New Face High-Resolution Presentation Attack Detection Database},
year={2023},
volume={},
number={},
pages={1-6},
doi={10.1109/IWBF57495.2023.10157771}}
Files requirement access will be given only for Senior researchers, and Profesors using an academic email.
To extract the images, you should first collect the files together and run "zip -F attack1.zip --out single_attack1.zip" or "zip -s0 attack1.zip --out single_attack1.zip". Then you can simply unzip single_attack1.zip.
This work and the methods proposed are only for research purposes and the images are be generated by chance. Any implementation or commercial use modification must be analysed separately for each case to the email: juan.tapia-farias@h-da.de.