{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:37:35Z","timestamp":1732041455217},"reference-count":46,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T00:00:00Z","timestamp":1651104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Assistive Devices for empowering dis-Abled People through the robotic Technologies (ADAPT) project"},{"name":"INTERREG VA France (Channel) England Programme"},{"name":"European Regional Development Fund"},{"name":"European Regional Development Fund"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Despite the high performances achieved using deep learning techniques in biometric systems, the inability to rationalise the decisions reached by such approaches is a significant drawback for the usability and security requirements of many applications. For Facial Biometric Presentation Attack Detection (PAD), deep learning approaches can provide good classification results but cannot answer the questions such as \u201cWhy did the system make this decision\u201d? To overcome this limitation, an explainable deep neural architecture for Facial Biometric Presentation Attack Detection is introduced in this paper. Both visual and verbal explanations are produced using the saliency maps from a Grad-CAM approach and the gradient from a Long-Short-Term-Memory (LSTM) network with a modified gate function. These explanations have also been used in the proposed framework as additional information to further improve the classification performance. The proposed framework utilises both spatial and temporal information to help the model focus on anomalous visual characteristics that indicate spoofing attacks. The performance of the proposed approach is evaluated using the CASIA-FA, Replay Attack, MSU-MFSD, and HKBU MARs datasets and indicates the effectiveness of the proposed method for improving performance and producing usable explanations.<\/jats:p>","DOI":"10.3390\/s22093365","type":"journal-article","created":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T02:20:06Z","timestamp":1651198806000},"page":"3365","source":"Crossref","is-referenced-by-count":3,"title":["An Attention-Guided Framework for Explainable Biometric Presentation Attack Detection"],"prefix":"10.3390","volume":"22","author":[{"given":"Shi","family":"Pan","sequence":"first","affiliation":[{"name":"School of Engineering, University of Kent, Canterbury CT2 7NT, UK"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8627-3429","authenticated-orcid":false,"given":"Sanaul","family":"Hoque","sequence":"additional","affiliation":[{"name":"School of Engineering, University of Kent, Canterbury CT2 7NT, UK"}]},{"given":"Farzin","family":"Deravi","sequence":"additional","affiliation":[{"name":"School of Engineering, University of Kent, Canterbury CT2 7NT, UK"}]}],"member":"1968","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3038924","article-title":"Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey","volume":"50","author":"Ramachandra","year":"2017","journal-title":"ACM Comput. Surv."},{"key":"ref_2","unstructured":"Chingovska, I., Andr\u00e9, A., and S\u00e9bastien, M. (2012, January 6\u20137). On the effectiveness of local binary patterns in face anti-spoofing. Proceedings of the 11th International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.jvcir.2018.05.009","article-title":"Face spoofing detection with local binary pattern network","volume":"54","author":"Li","year":"2018","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1530","DOI":"10.1109\/ACCESS.2014.2381273","article-title":"Biometric Antispoofing Methods: A Survey in Face Recognition","volume":"2","author":"Galbally","year":"2014","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Pan, S., and Deravi, F. (2018, January 11\u201312). Facial biometric presentation attack detection using temporal texture co-occurrence. Proceedings of the 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), Singapore.","DOI":"10.1109\/ISBA.2018.8311464"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2639","DOI":"10.1109\/TIFS.2018.2825949","article-title":"Learning Generalized Deep Feature Representation for Face Anti-Spoofing","volume":"13","author":"Li","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3347","DOI":"10.1109\/TIFS.2020.2988168","article-title":"Leveraging Shape, Reflectance and Albedo From Shading for Face Presentation Attack Detection","volume":"15","author":"Pinto","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Wang, G., Han, H., Shan, S., and Chen, X. (2020, January 14\u201319). Cross-domain face presentation attack detection via multi-domain disentangled representation learning. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2020), Virtual.","DOI":"10.1109\/CVPR42600.2020.00671"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Liu, Y., Stehouwer, J., Jourabloo, A., and Liu, X. (2019, January 16\u201320). Deep tree learning for zero-shot face anti-spoofing. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR2019), Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00481"},{"key":"ref_10","unstructured":"Glorot, X., and Bengio, Y. (2010, January 13\u201315). Understanding the difficulty of training deep feedforward neural networks. Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics (AISTATS), Chia Laguna Resort, Sardinia, Italy."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Lucena, O., Junior, A., Moia, V., Souza, R., Valle, E., and Lotufo, R. (2017, January 5\u20137). Transfer learning using convolutional neural networks for face anti-spoofing. Proceedings of the International Conference on Image Analysis and Recognition (ICIAR 2017), Montreal, QC, Canada. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-319-59876-5_4"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Vigan\u00f2, L., and Magazzeni, D. (2020, January 7\u201311). Explainable Security. Proceedings of the 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy.","DOI":"10.1109\/EuroSPW51379.2020.00045"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","article-title":"Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI)","volume":"6","author":"Adadi","year":"2018","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"4793","DOI":"10.1109\/TNNLS.2020.3027314","article-title":"A Survey on Explainable Artificial Intelligence (XAI): Towards Medical XAI","volume":"32","author":"Tjoa","year":"2021","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Phillips, P.J., and Przybocki, M. (2020). Four principles of explainable AI as applied to biometrics and facial forensic algorithms. arXiv.","DOI":"10.6028\/NIST.IR.8312-draft"},{"key":"ref_16","first-page":"44","article-title":"DARPA\u2019s Explainable Artificial Intelligence (XAI) Program","volume":"40","author":"Gunning","year":"2019","journal-title":"AI Mag."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Deb, D., and Engelsma, J.J. (2021). Biometrics: Trust, but Verify. arXiv.","DOI":"10.1109\/TBIOM.2021.3115465"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., and Li, S.Z. (April, January 29). A face antispoofing database with diverse attacks. Proceedings of the 2012 5th IAPR international conference on Biometrics (ICB), New Delhi, India.","DOI":"10.1109\/ICB.2012.6199754"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Pan, S., and Deravi, F. (2017, January 6\u20138). Facial action units for presentation attack detection. Proceedings of the 2017 Seventh Emerging Security Technologies (EST), Canterbury, UK.","DOI":"10.1109\/EST.2017.8090400"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Shao, R., Lan, X., and Yuen, P.C. (2017, January 1\u20134). Deep convolutional dynamic texture learning with adaptive channel-discriminability for 3D mask face anti-spoofing. Proceedings of the 2017 IEEE International Joint Conference on Biometrics (IJCB), Denver, CO, USA.","DOI":"10.1109\/BTAS.2017.8272765"},{"key":"ref_21","unstructured":"Yang, J., Lei, Z., and Li, S.Z. (2014). Learn convolutional neural network for face anti-spoofing. arXiv."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"864","DOI":"10.1109\/TIFS.2015.2398817","article-title":"Deep Representations for Iris, Face, and Fingerprint Spoofing Detection","volume":"10","author":"Menotti","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Ramanishka, V., Das, A., Zhang, J., and Saenko, K. (2017, January 21\u201326). Top-down visual saliency guided by captions. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.334"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Xu, Z., Li, S., and Deng, W. (2015, January 3\u20136). Learning temporal features using LSTM-CNN architecture for face anti-spoofing. Proceedings of the 2015 3rd IAPR Asian Conference on Pattern Recognition (ACPR), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1049\/bme2.12045","article-title":"An exploratory study of interpretability for face presentation attack detection","volume":"10","author":"Sequeira","year":"2021","journal-title":"IET Biom."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Sequeira, A.F., Silva, W., Pinto, J.R., Gon\u00e7alves, T., and Cardoso, J.S. (2020, January 29\u201330). Interpretable biometrics: Should we rethink how presentation attack detection is evaluated?. Proceedings of the 2020 8th International Workshop on Biometrics and Forensics (IWBF), Porto, Portugal.","DOI":"10.1109\/IWBF49977.2020.9107949"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.patrec.2017.08.007","article-title":"UP-CNN: Un-pooling augmented convolutional neural network","volume":"119","author":"Xu","year":"2017","journal-title":"Pattern Recognit. Lett."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., and Batra, D. (2017, January 22\u201329). Grad-CAM: Visual Explanations from Deep Networks via Gradient-Based Localization. Proceedings of the 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy.","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref_29","unstructured":"Guo, P., Anderson, C., Pearson, K., and Farrell, R. (2018). Neural Network Interpretation via Fine Grained Textual Summarization. arXiv."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Brito, J., and Proenca, H. (2021, January 19\u201325). A Deep Adversarial Framework for Visually Explainable Periocular Recognition. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Virtual.","DOI":"10.1109\/CVPRW53098.2021.00161"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Sharma, R., and Ross, A. (October, January 28). D-NetPAD: An explainable and interpretable iris presentation attack detector. Proceedings of the 2020 IEEE International Joint Conference on Biometrics (IJCB), Houston, TX, USA.","DOI":"10.1109\/IJCB48548.2020.9304880"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Chen, C., and Ross, A. (2021, January 5\u20139). An Explainable Attention-Guided Iris Presentation Attack Detector. Proceedings of the Workshop on Applications of Computer Vision (WACV), Virtual.","DOI":"10.1109\/WACVW52041.2021.00015"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.-J., and Li, K. (2009, January 20\u201325). ImageNet: A large-scale hierarchical image database. Proceedings of the 2009 IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL, USA.","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Satu, M.S., Parvez, M.H., and Al-Mamun, S. (2015, January 26\u201327). Review of integrated applications with AIML based chatbot. Proceedings of the 2015 International Conference on Computer and Information Engineering (ICCIE), Rajshahi, Bangladesh.","DOI":"10.1109\/CCIE.2015.7399324"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Sch\u00f6ttl, A. (2020, January 16\u201318). A light-weight method to foster the (Grad) CAM interpretability and explainability of classification networks. Proceedings of the 2020 10th International Conference on Advanced Computer Information Technologies (ACIT), Deggendorf, Germany.","DOI":"10.1109\/ACIT49673.2020.9208950"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Dahl, G.E., Sainath, T.N., and Hinton, G.E. (2013, January 26\u201331). Improving deep neural networks for LVCSR using rectified linear units and dropout. Proceedings of the 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, Vancouver, BC, Canada.","DOI":"10.1109\/ICASSP.2013.6639346"},{"key":"ref_37","unstructured":"Mnih, V., Heess, N., Graves, A., and Kavukcuoglu, K. (2014, January 8\u201313). Recurrent models of visual attention. Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems (NIPS 2014), Montreal, QC, Canada."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2222","DOI":"10.1109\/TNNLS.2016.2582924","article-title":"LSTM: A Search Space Odyssey","volume":"28","author":"Greff","year":"2017","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","article-title":"Face Spoof Detection with Image Distortion Analysis","volume":"10","author":"Wen","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Liu, S., Yuen, P.C., Zhang, S., and Zhao, G. (2016, January 11\u201314). 3D mask face anti-spoofing with remote photoplethysmography. Proceedings of the European Conference on Computer Vision (ECCV 2016), Amsterdam, The Netherlands. LNCS-9911.","DOI":"10.1007\/978-3-319-46478-7_6"},{"key":"ref_41","unstructured":"Simonyan, K., and Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Li, L., Feng, X., Boulkenafet, Z., Xia, Z., Li, M., and Hadid, A. (2016, January 12\u201315). An original face anti-spoofing approach using partial convolutional neural network. Proceedings of the 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA), Oulu, Finland.","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"ref_43","unstructured":"Tu, X., and Fang, Y. (2017, January 14\u201318). Ultra-deep neural network for face anti-spoofing. Proceedings of the International Conference on Neural Information Processing (ICONIP 2017), Guangzhou, China. LNCS-10635."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"4280","DOI":"10.1109\/TIFS.2021.3102448","article-title":"From RGB to Depth: Domain Transfer Network for Face Anti-Spoofing","volume":"16","author":"Wang","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_45","unstructured":"Targ, S., Almeida, D., and Lyman, K. (2016). Resnet in resnet: Generalizing residual architectures. arXiv."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Ioffe, S., Vanhoucke, V., and Alemi, A.A. (2017, January 4\u20139). Inception-v4, inception-resnet and the impact of residual connections on learning. Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17), San Francisco, CA, USA.","DOI":"10.1609\/aaai.v31i1.11231"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/9\/3365\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,28]],"date-time":"2024-07-28T23:30:15Z","timestamp":1722209415000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/9\/3365"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,28]]},"references-count":46,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2022,5]]}},"alternative-id":["s22093365"],"URL":"https:\/\/doi.org\/10.3390\/s22093365","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,28]]}}}