
Citation: Neha Sinha, Mark A. Seeley, Daniel S. Horwitz, Hemil Maniar, Andrea H. Seeley. Pediatric Orthogenomics: The Latest Trends and Controversies[J]. AIMS Medical Science, 2017, 4(2): 192-216. doi: 10.3934/medsci.2017.2.192
[1] | Muhammad Danish Zia, Esmail Hassan Abdullatif Al-Sabri, Faisal Yousafzai, Murad-ul-Islam Khan, Rashad Ismail, Mohammed M. Khalaf . A study of quadratic Diophantine fuzzy sets with structural properties and their application in face mask detection during COVID-19. AIMS Mathematics, 2023, 8(6): 14449-14474. doi: 10.3934/math.2023738 |
[2] | Tamilvizhi Thanarajan, Youseef Alotaibi, Surendran Rajendran, Krishnaraj Nagappan . Improved wolf swarm optimization with deep-learning-based movement analysis and self-regulated human activity recognition. AIMS Mathematics, 2023, 8(5): 12520-12539. doi: 10.3934/math.2023629 |
[3] | Mashael Maashi, Mohammed Abdullah Al-Hagery, Mohammed Rizwanullah, Azza Elneil Osman . Deep convolutional neural network-based Leveraging Lion Swarm Optimizer for gesture recognition and classification. AIMS Mathematics, 2024, 9(4): 9380-9393. doi: 10.3934/math.2024457 |
[4] | Thavavel Vaiyapuri, M. Sivakumar, Shridevi S, Velmurugan Subbiah Parvathy, Janjhyam Venkata Naga Ramesh, Khasim Syed, Sachi Nandan Mohanty . An intelligent water drop algorithm with deep learning driven vehicle detection and classification. AIMS Mathematics, 2024, 9(5): 11352-11371. doi: 10.3934/math.2024557 |
[5] | Mashael M Asiri, Abdelwahed Motwakel, Suhanda Drar . Robust sign language detection for hearing disabled persons by Improved Coyote Optimization Algorithm with deep learning. AIMS Mathematics, 2024, 9(6): 15911-15927. doi: 10.3934/math.2024769 |
[6] | Khaled Tarmissi, Hanan Abdullah Mengash, Noha Negm, Yahia Said, Ali M. Al-Sharafi . Explainable artificial intelligence with fusion-based transfer learning on adverse weather conditions detection using complex data for autonomous vehicles. AIMS Mathematics, 2024, 9(12): 35678-35701. doi: 10.3934/math.20241693 |
[7] | Youseef Alotaibi, Veera Ankalu. Vuyyuru . Electroencephalogram based face emotion recognition using multimodal fusion and 1-D convolution neural network (ID-CNN) classifier. AIMS Mathematics, 2023, 8(10): 22984-23002. doi: 10.3934/math.20231169 |
[8] | Fatima M. Azmi, Nabil Mlaiki, Salma Haque, Wasfi Shatanawi . Complex-valued controlled rectangular metric type spaces and application to linear systems. AIMS Mathematics, 2023, 8(7): 16584-16598. doi: 10.3934/math.2023848 |
[9] | Renjie Chu, Peiyuan Jin, Hanli Qiao, Quanxi Feng . Intrusion detection in the IoT data streams using concept drift localization. AIMS Mathematics, 2024, 9(1): 1535-1561. doi: 10.3934/math.2024076 |
[10] | Thavavel Vaiyapuri, Prasanalakshmi Balaji, S. Shridevi, Santhi Muttipoll Dharmarajlu, Nourah Ali AlAseem . An attention-based bidirectional long short-term memory based optimal deep learning technique for bone cancer detection and classifications. AIMS Mathematics, 2024, 9(6): 16704-16720. doi: 10.3934/math.2024810 |
With Covid-19 spreading across the world, epidemic prevention has become an essential part of public life and more and more people begin to be concerned about their health of themselves and turn to adapt to a new lifestyle. Covid-19 is a kind of respiratory infectious disease that spreads mainly through droplets and close contact. To protect people in public places from infection, one practical suggestion for people is to wear masks as possible, keep social distance, and so on. However, most public facilities cannot be directly compatible with these new normal actions under epidemic. Taking the entry scene for example, most public entries are equipped with ACS to effectively prevent idle personnel, recognize people and check their identities. In order to prevent entry procedures causing the spread of the epidemic, it is not suggested people to taking off masks or sojourn on the ACS. Therefore, it needs to enable ACS with high-level biometric recognition capability and passage efficiency. As one popular direction of computer vision research, biometric recognition is widely used in security systems due to its safety and convenience. Nowadays common biometric recognition methods include face recognition, fingerprint recognition, iris recognition, voice recognition, etc. Among these methods, face recognition is supposed to be the most convenient compared with others, especially its non-contact characteristics match the requirement of Covid-19 epidemic prevention. In most public entry conditions, a face recognition module is implemented based on a monocular camera. In practice, this design has to confront several challenges, such as mask-wearing reorganization and Face Anti-Spoofing Detection (FASD). The article will discuss the solutions we think of for the above two problems.
In terms of mask-wearing recognition, this paper focuses on the fusion between mask detection and ACS based on face recognition in order to remind users to wear masks correctly. Qin et al. [1] proposed a facemask-wearing condition identification method, which is divided into three conditions for face mask detection and includes a face with masks correctly, faces with masks incorrectly and faces without masks. This method achieves relatively satisfying results in experiments but lacks robustness under complex background. Ejaz et al. [2] proposed another face masks detection method based on Principal Component Analysis (PCA). This method meets the application requirement on the embedded devices, but the accuracy of face-mask detection is not good. In order to deal with the lack of datasets, Jiang et al. [3] designed one kind of mask detector which uses transfer learning to enhance networks robustness which increases the capability of image feature extraction in the Backone. Through using feature pyramid networks (FPN) [4] and Convolutional Block Attention Module (CBAM) [5], this method increases the accuracy of classification results and enables the frame compatible with embedded systems too.
Completing face recognition is divided into two tasks: Face identification task and face verification task. The face identification task compares one face with face datasets from which the most possible identity will be found. The face verification task is a binary classifier, it makes use of a similarity metric algorithm to get confidence whether this identity indeed matches the tested face. Thanks to the recent developments of Convolutional Neural Networks (CNNs), face recognition has achieved great progress, but there are many challenges, such as illumination, pixel resolution, and so on. There are two ideas for face recognition in the era of deep learning: Metric learning [6] and margin-based classification [9,10,11,12]. Metric learning is also called distance metric learning, which classifies input images by calculating the similarity between two input images. However, the model training relies on so large data that the efficiency of the fitting is very slow. Margin-based classification is margin limited to feature layer by modifying softmax formula indirectly. This method makes the network obtain a feature that is more discriminative than the feature obtained after training. But the model has the instrict of overfitting because of harsh constraints. Yi Sun et al. [7] proposed a DeepID model that achieves 99.15% face verification accuracy on the LFW dataset by designing deep CNNs and using both face identification and verification signals as supervision. The advantage of DeepID is its high accuracy, but its training process is also prone to be overfitted. Dung Nguyen et al. [8] proposed a framework called FaceNet that directly learns a mapping through transferring face images to a compact Euclidean distance which directly corresponds to face similarity. This method achieves an accuracy of 99.63% on the LFW and accuracy of 95.12% on YouTube FacesDB respectively. However, there are many facial features lost in the process, which makes it easy to focus on the local feature rather than the global feature. Besides, another algorithm called ArcFace Jiankang was proposed by Deng et al [9]. It has a geometric interpretation to obtain highly discriminative features for face recognition. The verification accuracy of this method is 99.83% on the LFW dataset and 98.02% on the YTF dataset. ArcFace 9has high performance, but its weight model is so large that it is much more difficult to apply in transfer learning. MV-softmax [10,11] integrates the feature margin and feature mining into one unified loss function, it implements the discriminative learning by adaptively coding the feature vector of false classification. The main disadvantage of MV-softmax is to stress hard samples or half-hard samples, this may cause a negative influence on the model coverage. CurricularFace [12] adopts one kind of adaptive strategy to train loss function using margin samples and hard samples mining, which has great value in practice.
Generally speaking, although face recognition technology has been widely studied, there still exists a balance among the network size, computation cost and generalization. In addition, new face recognition also needs to complete tasks when people wear masks as possible, this is also the focus in the research field.
Compared with mask-wearing recognition, FASD is a long-term and widely-discussed problem because nowadays the biometric information of the face is easier to capture and be utilized for spoofing. Usually, Face spoofing attacks method includes photo attacks [13,14], video attacks [15,16] driven by reinforcement learning model, and 3D mask attacks [17,18,19] within low cost, hyper-real 3D color masks. Compared with widely studied 2D face presentation attacks, 3D face spoofing attacks are more challenging because present 3D face recognition systems are difficult to balance the effectiveness and cost. A typical 3D anti-spoofing system based on holographic imaging has little availability for most public entry scenes due to its high expense. Consequently, conventional face recognition systems are vulnerable to the above proofing attacks, most widely-applied face anti-spoofing methods up to now are still Human-computer interaction (HCI) methods that verify the user through some behavior interaction, such as winking, head moving, and lip language. Therefore, it is necessary to endow ACS with the capability of verifying the authenticity of facial information, and reject illegal users who present an imitation or fake face of the enrolled user.
The core task of the FASD is to find the intrinsic difference between the sampled information and fake spoofing information. With the development of the reinforcement learning technique, it has not been difficult to produce dynamic face movement completely driven by data, which presents a challenge to the anti-spoofing method based on human-machine interaction. Up to now, the main attention is increasingly drawn on the research involved in color texture analyzing [13,14,20,21] and adaptive recognition based on deep learning [22,23], etc. Määttä et al. [19] utilized multi-scale LBP to analyze the texture of face images. Bouklenafe et al. [13,14] proposed a face anti-spoofing algorithm based on color texture. This algorithm considered the three-color space, RGB, YCbCr and HSV, which improves the model reliability in various conditions. After that, Bouklenafe et al. [13,14] started to focus on the luminance and chrominance channels and utilized the fusion mechanism of color and texture. Although FASD based on texture has drawn much attention, its performance is easy to be affected by illumination and image resolution. When the above factor decreases in quality, this method may be difficult to maintain self-stability. Another category of FASD is to monitor face movement. Usually, a genuine face has lots of movement characteristics, such as blinking, mouth opening and head-turning, while fake faces are difficult to formulate similar movements. Pan et al. [24] proposed a real-time liveness detection approach by recognizing spontaneous eyeblinks to prevent photos attack in face recognition. Zadeh et al. [25] also proposed a method utilizing eye and mouth movements to conduct liveness detection. Despite these ways tend to have high accuracy, it is still necessary to highly interact with users. On the other hand, the time cost of this detection is relatively long and not friendly to users. In recent years, there has appeared simulated dynamic faces driven by the reinforcement learning model [26], which presents challenges to FASD research. It is also found that the CNNs have great potential for learning faced with various spoofing ways and improved the robustness of anti-spoofing algorithms. Atoum et al. [22] proposed a two-stream CNNs-based approach for face anti-spoofing. Liu et al. [23] assumed liveness detection as a binary classification problem to be directly learned by Deep Neural Networks (DNNs). Despite CNNs [27,28] having potential for face liveness detection, it has to face the problem of overfitting and needs further studies.
Based on the above discussion, it is not difficult to find that the liveness detection research has competed with a variety of spoofing approaches all the time. In this paper, we focus on these issues and present an intelligent access control framework with two improvements:
1) A novel authentication system fusing the mask detection algorithm and face authentication algorithm with face anti-spoofing algorithm is proposed. The mask detection algorithm employs the mask detector called RetinaFaceMask, and uses MobileNetV3 as the feature extractor; the face authentication algorithm makes use of Tripletloss for training the neural network model;
2) In order to realize the anti-spoofing function, this paper makes use of a lightweight neural network and uniform Local Binary Patterns (LBP) method to extract the color texture of the image frame. The accuracy and training efficiency of the above model is tested on the CASIA-FASD dataset and Replay-Attack dataset.
This paper is organized as follows. Sections Ⅱ and Ⅲ discuss the design of the network framework in detail, the selection of benchmark datasets, and experiment setups respectively. Then the analysis and discussion of experimental results are presented in Section Ⅳ.
The proposed framework of the intelligent access control framework is composed of three parts: Mask detection module, face detection and recognition module and face anti-spoofing module (as shown in Figure 1). During the operation process, the passenger is sampled using videos and flagged the mask-wearing status by the mask detection module. Then it makes use of a multi-task convolutional neural network (MTCNN) [29] to process captured video frames and align them within the user's face. Through MTCNN the detected face is centrally located in alignment pictures with a size of 160*160 pixel). The alignment pictures are then filled into the face anti-spoofing module in which the liveness detection algorithm can judge its authenticity. If one face is judged as real, it will enter the face recognition module for identity matching. In the face recognition module, if the real face matches one in the database, this face and its identity will be flagged by this system. Otherwise, the face recognition will end and present an alarm message.
This paper designs mask and face detection module, which includes mask detection unit and face detection unit. The mask detection unit is designed based on a kind of face-mask detector called RetinaFaceMask (as shown in Figure 2). In order to apply to embedded applications, the feature extractor is replaced with MobileNetV3 which is featured with its low parameter quantity and lightweight architecture. On the other hand, the high-level semantic information is extracted by FPN from the feature maps of different sizes while fusing this information into previous layers' feature maps by adding operation with a coefficient. In Figure 2, the head part of mask detection architecture represents classifiers, predictors, estimators which complete inference function and indicate the mask-wearing status. The test image input into networks model in the testing, which outputs two results are face confidence and mask confidence by removing proposal which is less than the set threshold. The remaining results are filtered using Non-Maximum Suppression (NMS). The prediction results of faces and masks are retained, whose weighted logistic loss is defined as (1). In the Eq (1), di denoted a detection, yi∈{−1,1} indicate whether or not di was successfully matched to an object, and let f denote the scoring function (RetinaFaceMask) that jointly scores all detections on an image f([di]ni=1)=[si]ni=1. For a variety potential detection results, here loss per detections is coupled to the other detections through the marching produces yi. By this way, the prediction results of faces and masks are retained.
L(si,yi)=∑Ni=1ωyi⋅log(1+exp(−si⋅yi)). | (1) |
Due to the limited data set of face masks, it is difficult for the network to be trained through the training set to get good results so that we train a more robust network model through transfer learning. In RetinaFaceMask, only the parameters of the backbone and neck are transferred from Wider Face, a dataset consisting of 32,203 images and 393,703 annotated faces. RetinaFaceMask proposed a new contextual attention module as Heads in order to improve the prediction performance of face masks. The context attention module has three branches, each branch has a 3×3, two 3×3, and three 3×3 convolution kernels, and using different numbers of 3×3 convolution kernels to obtain different receptive fields from the same feature map. The original context module does not consider the face or mask, so it needs to feature an abstraction component put it into retraining. Here the abstraction component is designed to be one simplified convolutional block attention module (CBAM). Given an intermediate feature map from the original RetinaFaceMask architecture, the CBAM can sequentially infer a 1D channel attention map and a 2D spatial attention map. Although this structure is suitable to save the memory cost, the spatial attention module in the CBAM still can occupy a variety of computation costs [30,31]. Therefore, in this paper, we replace the attention module of CBAM with on Maxpool-Convolution-AveragePool component. This simplification is equivalent to cascading the shared spatial perception of the feature abstraction. After it, the RetinaFaceMask is prompted to pay attention to the face and mask features.
Another module of the mask and face detection module is the face detection unit, which uses the MTCNN model. This model is built as a three-layer neural network, which is P-Net, R-Net, O-Net. In the operation, the obtained images are processed by these three networks to detect faces and face landmarks. When input images come, they will be resized continuously to produce the image pyramid. The pyramid is filled into P-Net to obtain lots of candidates that are filtered by R-Net more precisely afterward. Finally, the filtered data is filled into O-Net to calculate the landmarks' position of potential faces. This model realizes face detection and alignment functions.
Boulkenafet et al. [14] propose that face anti-spoofing could be distinguished by analyzing color texture. The color is analyzed by utilizing uniform LBP in the luminance and chrominance channels. Uniform LBP extracts the histogram from a single image band and concatenates these histograms into the final descriptor which be calculated by Support Vector Machine (SVM) to distinguish real face and fake face.
LBP is a feature descriptor of local texture for gray-scale images proposed by Ojala et al. [32]. The traditional extraction approach of the LBP feature descriptor makes the original image be divided into blocks of n*n and each block is divided into cells of a*a. Then, the feature of each cell is extracted by LBP. Considering the center pixel value as a threshold to compare with 8 pixels from the yield of threshold around. The LBP descriptor is defined as Eq (2):
LBP(xc,yc)=∑7p=02ps(ip−ic). | (2) |
(xc, yc) is the center point in the 3*3 area, which pixel value is ic. ip represents the value of other pixels in the area. p is the number of pixel points. s(x) is a symbolic function which is defined as Eq (3):
s(x)={1,x≥00,x<0. | (3) |
s(x)=1, if x≥0, otherwise s(x)=0. The values of each pixel point be calculated by exploiting LBP descriptor. The result is connected to a binary value and converted to a decimal value which is the value of the LBP descriptor. Generating situations are 256 by this approach, but lots of situations are very complex so it is not good for the extraction of facial features. Thereby, Ojala, et al. [33] proposed Uniform LBP to optimize the traditional LBP descriptor for implementing dimensionality reduction through the transition approach. The uniform LBP descriptor is defined as Eq (4):
LBP(i)P,R(x,y)={∑P−1n=0δ(r(i)n−r(i)c)×2n,U(i)≤2P(P−1),U(i)>2. | (4) |
(x,y) is the center point of the neighborhood, rn(n=0,⋯,P−1) is the pixel value of surrounding neighborhood, rc is the pixel value of center point, where R is the radius of the surrounding neighborhood, P is the number of points in the surrounding neighborhood, where U(i) is defined as Eq (5):
U(i)=|δ(r(i)P−1−r(i)c)−δ(r(i)0−r(i)c)|+∑Pn=1|δ(r(i)n−r(i)c)−δ(r(i)n−1−r(i)c)| | (5) |
where, δ(x) is the symbolic function which is defined as Eq (6):
δ(x)={1,x≥00,x<0. | (6) |
δ(x)=1, if x≥0, otherwise δ(x)=0.
Uniform LBP extracts the histogram from a single image band, and then concatenates these histograms into the final descriptor which be calculated by SVM [34] to distinguish real face and fake face. The whole process is shown as Figure 3. The Figure 3 contains two options to complete liveness detection task. The option 1 is face anti-spoofing based on color texture analysis. It extracts the faces in the dataset and crops them to the unified format of 224 * 224 pixels. These unified face frames are converted into the color spaces of HSV and YCbCr. Then the LBP descriptor extracts the feature histogram from color spaces, and connects them in series. In the end, serialized feature histogram is input in SVM to classify as real or fake face.
Option 2 in Figure 3 completes face anti-spoofing based on a lightweight neural network. The advantages of the lightweight neural network [35,36,37,38,39] are high accuracy, smaller parameter, detection faster and can be well applied to intelligent access control systems. Face liveness detection is defined as a binary classification question. Using the face data set of size 224×224 to train a lightweight neural network, and change the linear activation function of the last layer of the network structure to the Tanh activation function. Because the weights of multi-type image classification and living detection two classifications are different, the two-classification model suitable for living detection is used for pre-training. In terms of hyperparameter selection, Epoch is 150, Batch Size is 64, the cross-entropy loss function is used, the optimizer selects random gradient descent, the weight attenuation is 4×10-5, and the Momentum is 0.9. According to the above conditions, the lightweight neural network is trained.
The function of face detection and verification is a hot spot in the field of security. In this paper, we propose a neural network called Face-net. This neural network encodes face images into digital vectors (or called face-net vectors). In order to calculate the confidence between the face image and preset identity, this paper uses Euclidean distance to compare two face-net vectors and determine whether these two vectors belong to the same person. As shown in Figure 4(b) represents distances between images. The distance between the same person's images is basically below one threshold which is demarcated a visa experiment.
As shown in the part (a) of Figure 4 In this paper, Face-net model is designed to realize the face verification and recognition, architecture of Face-net model is shown in Figure 4(a), batch refers to the input face image sample which is found and then is cropped to a fixed size of 160×160 pixel. Deep architecture refers to a deep learning architecture, the deep architecture of Face-net uses the GoogleNet network, which combines the traditional convolutional neural network with Inception structure. This configuration can get the balance between the size and over-fitting characteristics of the deep neural network. In practice, the main disadvantage of this method is the over-high dimensions of output features. So, optimization is conducted by replacing the last layer of the softmax classifier with one layer of L2 feature normalization. Through the normalization of the L2 layer, the revised module will output a 128-dimensional feature vector which is then optimized with triple loss. The triplet loss is one kind of loss function in Figure 4(c). The input of the triplet loss function is three groups of images. These three image groups are called Achor(A), Negative(N) and Positive(P) respectively. The A and P are captured from the same person with different imaging angles. The N is captured by other people. The similarity between image groups is quality by Euclidean distance. When training face-net, the Euclidean distance between A and P will gradually decrease, and the distance between A and N will gradually increase. Through this mechanism, the face-net learns the separability between features, and builds connections between every single image from a specific person. This is the basis for identity verification. The definition of triplet loss is shown as Eq (7):
||xAi−xPi||22+α<||xAi−xNi||22,∀(xAi,xPi,xNi)∈T. | (7) |
In the Eq (6), xAi (Anchor) represents the image of A, xPi (Positive) represents the different image of A, xNi (Negative) represents the image of B. α represents constant, and T represents the set of triplets in the training set. The loss function minimization L is defined as Eq (8).
L=∑Mi[||f(xAi)−f(xPi)||22−||f(xAi)−f(xNi)||22+α]+. | (8) |
In the Eq (7), f(x)∈Rd represents a face image x that is embedded in d-dimensional European space. Among them, the second norm on the left represents the intraclass distance, the second norm on the right represents the distance between classes, and α is a constant. The "+" at bottom right represents that when the value in the brackets is greater than zero, the loss is taken, and when it is less than zero, the loss is zero. M is the base. The optimization process is to use the gradient descent method to make the loss function continuously decrease which means the distance within the class continuously decreasing, and the distance between classes continuously increased.
To draw a conclusion, aiming at the possibility of infection and negligence in human supervision in public places, at the meantime, in order to meet the needs of embedded device platform, this paper proposes an intelligent access control framework composed of the mask detection algorithm, MTCNN algorithm, face anti-spoofing based on color texture analysis and Face-net identity verification. This framework can meet the requirements of embedded device applications and effectively solve the security problem of the public place access control system under the background of the spreading coronavirus.
In this section, we present the experimental evaluation of the proposed scheme for the intelligent access control system. The two data sets used in our experimental evaluation are introduced in detail. Experiments are performed on different anti-spoofing datasets. Details are given in the subsequent sections.
In order to evaluate proposed system objectively, we have chosen widely accepted CASIA-FASD [40] and Replay Attack [41] Datasets for experiments, both of which have well-described evaluation protocols. The CASIA-FASD datasets consist of 600 videos including 50 objects, each of the objects has 12 videos including 3 videos of legal access and 9 videos of illegal access. There are 3 different types of videos in the datasets which is low, normal, high, respectively. Illegal access videos have 3 different types of attack methods including warped photo attacks, cut photo attacks, and video attacks. The CASIA-FASD datasets are shown as Figure 5. The Reply-Attack datasets include 1200 videos which have 50 objects. Each of the objects has 24 videos which include 4 videos of legal access and 20 videos of illegal access, each of the videos has about 10 seconds in length. All videos are classified to 3 different backgrounds and 2 different illuminations. Illegal access videos have 3 different types of attack methods including print attack, digital images attack, videos attack. The datasets have 3 parts of datasets including train datasets, development datasets, text datasets.
In order to obtain a face recognition security system with a low calculation amount and a high recognition rate, the live detection is more user-friendly. The experiment verifies the performance of the algorithm by comparing the size of the model parameters, the recognition accuracy, the time required for the system to process a frame of pictures through the entire process, and the CPU occupancy.
This section focuses on the experiments to verify the anti-spoofing performance of the algorithm, using the CASIA-FASD and Replay-Attack datasets to conduct experiments. The datasets are shown in Table 1.
Dataset | Training Set | Testing Set | Total |
CASIA-FASD | 7200 | 10800 | 18000 |
Replay-Attack | 10800 | 14400 | 25200 |
a) The videos contained in the CASIA-FASD and Replay-Attack datasets are read and saved by OpenCV for 30 frames. After each frame is obtained, the image will be aligned and cropped by MTCNN and normalized to a 224×224 RGB picture.
b) This chapter uses datasets for training and testing separately. In the quantitative analysis, the experiment uses accuracy rate, EER, HTER, and receiver operating characteristic (ROC) curve as the evaluation indicators for evaluating the algorithm. When quantitatively analyzing the real-time performance of the face security system, we verify the performance of the algorithm through the time required for the system to process a frame of pictures and CPU occupancy rate.
c) All experiments have been conducted on a computer with PyCharm® installed in Windows 10. The processor model is Intel Core i5-8250U@ 1.60 GHz, and the memory is 8 GB RAM. The algorithm in this chapter is based on PyTorch 1.5 and TensorFlow 1.12 deep-learning framework, using Python 3.7 language implementation.
We did experiments on CASIA and Replay-Attack datasets to compare with the EER, HTER, ROC curves of different algorithms, the time required for the system to process a frame of pictures, and the experimental results of the CPU occupancy rate. The advantages and disadvantages of the algorithm are analyzed.
The CASIA dataset has rich attack methods and complex datasets. The Replay-Attack dataset has a total of 25,200 pictures, the attack method is video attack, the control variable is light, and the data set attack method is relatively simple. From Figures 6 and 7, we can see that under the Replay-Attack dataset with a single attack method, the algorithm can perform better classification, while under the complex CASIA data set, the LBP algorithm can still maintain good classification performance.
The lightweight neural network is limited in the size of the dataset. On the one hand, it is subject to fewer model parameters. Even if it is pre-trained under the live detection model, the network convergence process is still slow; on the other hand, under the multi-image classification It can achieve good accuracy, but live detection pays more attention to the image texture, spectral information, motion information, depth information and other nuances between the real face and the fraudulent face. This is a lightweight neural network for live detection under higher requirements.
It can be seen from Figures 6 and 7, and Table 2 that the size of the model parameters also affects the accuracy of live detection to a certain extent. Figures 8 and 9 verify that the LBP algorithm takes the least time when using SVM for facial feature classification, and the CPU usage is low. Because SVM has a better classification effect for small sample data and has a faster calculation speed.
Algorithm | CASIA | Replay-Attack | Parameter | ||
HTER (%) | EER (%) | HTER (%) | EER (%) | ||
MobileNetV2 | 16.7 | 9.4 | 12.6 | 3.6 | 3.4MB |
MobileNetV3 | 19.3 | 14.4 | 10.9 | 6.5 | 3.87MB |
ShuffleNetV2 | 21.9 | 14.9 | 21.8 | 6.33 | 1.4MB |
SqueezeNet | 28.3 | 19.1 | 24.7 | 13.7 | 736.45KB |
Xception | 20.5 | 9.4 | 20.5 | 4.2 | 20.81MB |
LBP | 9.7 | 5.5 | 10.8 | 5.6 | - |
The overall results of the experiments show that the system fused with the LBP algorithm and the FaceNet algorithm can effectively identify the attacks of forged faces on the face recognition security system while the real-time detection efficiency is high, and the lightweight neural network exists in the real-time live detection feasibility.
In this paper, we have proposed a novel security classification framework based on face recognition which will possibly contribute to ACS in public condition. This framework is composed of a mask detection algorithm and face authentication algorithm with an anti-spoofing function. According to the epidemic prevention problem, the mask detection algorithm is integrated with a dexterous structure which contains a novel context attention head module to focus on the face and mask features, and a series of lightweight units to remove object cross-class. This configuration enables the mask detection module to meet the operation requirement of embedded devices. Besides, we proposed one novel liveness detection method that analyzes the color and texture of image frames using the uniform LBP method. In order to test the performance of the framework, this paper employs CASIA-FASD and Reply-Attack datasets as a benchmark. The test indicates that the HTER is 9.7%, the EER is 5.5%. The average process time of a single frame is 0.12 seconds. The above results demonstrate that this framework has a high anti-spoofing capability and can be employed on the embedded system to complete the mask detection and face authentication task in real-time, which can effectively support the public entry task under an epidemic background.
This work is supported by the National Key Research and Development Program of China (No. 2020YFB1313600).
All authors declare no conflicts of interest in this paper.
[1] |
Eknoyan G (2006) On the origin of genetics and beginnings of medical genetics of diseases of the kidney. Adv Chronic Kidney Dis 13: 174-177. doi: 10.1053/j.ackd.2006.01.004
![]() |
[2] | Keller EF (2002, Print) The Century of the Gene. Cambridge, MA: Harvard UP, 2002. |
[3] |
Portin P (2014) The birth and development of the DNA theory of inheritance: sixty years since the discovery of the structure of DNA. J Genet 93: 293-302. doi: 10.1007/s12041-014-0337-4
![]() |
[4] |
Mullis KB (1990) The unusual origin of the polymerase chain reaction. Sci Am 262: 56-61, 64-5. doi: 10.1038/scientificamerican0490-56
![]() |
[5] | Sweeney BP (2004) Watson and Crick 50 years on. From double helix to pharmacogenomics. Anaesthesia 59: 150-165. |
[6] | Evans CH, Rosier RN (2005) Molecular biology in orthopaedics: the advent of molecular orthopaedics. J Bone Joint Surg Am 87: 2550-2564. |
[7] | Puzas JE, O'Keefe RJ, Lieberman JR (2002) The orthopaedic genome: what does the future hold and are we ready?. J Bone Joint Surg Am 84-A: 133-141. |
[8] | Bayat A, Barton A, Ollier WE (2004) Dissection of complex genetic disease: implications for orthopaedics. Clin Orthop Relat Res (419): 297-305. |
[9] |
Matzko ME, Bowen TR, Smith WR (2012) Orthogenomics: an update. J Am Acad Orthop Surg 20: 536-546. doi: 10.5435/JAAOS-20-08-536
![]() |
[10] |
Riegel M (2014) Human molecular cytogenetics: From cells to nucleotides. Genet Mol Biol 37: 194-209. doi: 10.1590/S1415-47572014000200006
![]() |
[11] |
Langer-Safer PR, Levine M, Ward DC (1982) Immunological method for mapping genes on Drosophila polytene chromosomes. Proc Natl Acad Sci U S A 79: 4381-4385. doi: 10.1073/pnas.79.14.4381
![]() |
[12] |
Kallioniemi A, Kallioniemi OP, Sudar D, et al. (1992) Comparative genomic hybridization for molecular cytogenetic analysis of solid tumors. Science 258: 818-821. doi: 10.1126/science.1359641
![]() |
[13] |
Pinkel D, Segraves R, Sudar D, et al. (1998) High resolution analysis of DNA copy number variation using comparative genomic hybridization to microarrays. Nat Genet 20: 207-211. doi: 10.1038/2524
![]() |
[14] |
Solinas-Toldo S, Lampel S, Stilgenbauer S, et al. (1997) Matrix-based comparative genomic hybridization: biochips to screen for genomic imbalances. Genes Chromosomes Cancer 20: 399-407. doi: 10.1002/(SICI)1098-2264(199712)20:4<399::AID-GCC12>3.0.CO;2-I
![]() |
[15] |
Wiszniewska J, Bi W, Shaw C, et al. (2014) Combined array CGH plus SNP genome analyses in a single assay for optimized clinical testing. Eur J Hum Genet 22: 79-87. doi: 10.1038/ejhg.2013.77
![]() |
[16] |
Shashi V, McConkie-Rosell A, Rosell B, et al. (2014) The utility of the traditional medical genetics diagnostic evaluation in the context of next-generation sequencing for undiagnosed genetic disorders. Genet Med 16: 176-182. doi: 10.1038/gim.2013.99
![]() |
[17] |
Ogilvie J (2010) Adolescent idiopathic scoliosis and genetic testing. Curr Opin Pediatr 22: 67-70. doi: 10.1097/MOP.0b013e32833419ac
![]() |
[18] | Horne JP, Flannery R, Usman S (2014) Adolescent idiopathic scoliosis: diagnosis and management. Am Fam Physician 89: 193-198. |
[19] |
Riseborough EJ, Wynne-Davies R (1973) A genetic survey of idiopathic scoliosis in Boston, Massachusetts. J Bone Joint Surg Am 55: 974-982. doi: 10.2106/00004623-197355050-00006
![]() |
[20] | Kesling KL, Reinker KA (1997) Scoliosis in twins. A meta-analysis of the literature and report of six cases. Spine (Phila Pa 1976) 22: 2009-2014; |
[21] |
Wu J, Qiu Y, Zhang L, et al. (2006) Association of estrogen receptor gene polymorphisms with susceptibility to adolescent idiopathic scoliosis. Spine (Phila Pa 1976) 31: 1131-1136. doi: 10.1097/01.brs.0000216603.91330.6f
![]() |
[22] |
Chen S, Zhao L, Roffey DM, et al. (2014) Association between the ESR1-351A > G single nucleotide polymorphism (rs9340799) and adolescent idiopathic scoliosis: a systematic review and meta-analysis. Eur Spine J 23: 2586-2593. doi: 10.1007/s00586-014-3481-x
![]() |
[23] | Zhao L, Roffey DM, Chen S (2016) Association between the Estrogen Receptor Beta (ESR2) Rs1256120 Single Nucleotide Polymorphism and Adolescent Idiopathic Scoliosis: A Systematic Review and Meta-Analysis. Spine (Phila Pa 1976): Epub ahead of print. |
[24] | Yang P, Liu H, Lin J, et al. (2015) The Association of rs4753426 Polymorphism in the Melatonin Receptor 1B (MTNR1B) Gene and Susceptibility to Adolescent Idiopathic Scoliosis: A Systematic Review and Meta-analysis. Pain Physician 18: 419-431. |
[25] |
Ogura Y, Kou I, Miura S, et al. (2015) A Functional SNP in BNC2 Is Associated with Adolescent Idiopathic Scoliosis. Am J Hum Genet 97: 337-342. doi: 10.1016/j.ajhg.2015.06.012
![]() |
[26] |
Buchan JG, Alvarado DM, Haller GE, et al. (2014) Rare variants in FBN1 and FBN2 are associated with severe adolescent idiopathic scoliosis. Hum Mol Genet 23: 5271-5282. doi: 10.1093/hmg/ddu224
![]() |
[27] |
Liu Z, Wang F, Xu LL, et al. (2015) Polymorphism of rs2767485 in Leptin Receptor Gene is Associated With the Occurrence of Adolescent Idiopathic Scoliosis. Spine (Phila Pa 1976) 40: 1593-1598. doi: 10.1097/BRS.0000000000001095
![]() |
[28] |
Zhou S, Qiu XS, Zhu ZZ, et al. (2012) A single-nucleotide polymorphism rs708567 in the IL-17RC gene is associated with a susceptibility to and the curve severity of adolescent idiopathic scoliosis in a Chinese Han population: a case-control study. BMC Musculoskelet Disord 13: 181-2474-13-181. doi: 10.1186/1471-2474-13-181
![]() |
[29] |
Ryzhkov II, Borzilov EE, Churnosov MI, et al. (2013) Transforming growth factor beta 1 is a novel susceptibility gene for adolescent idiopathic scoliosis. Spine (Phila Pa 1976) 38: E699-704. doi: 10.1097/BRS.0b013e31828de9e1
![]() |
[30] |
Zhang H, Zhao S, Zhao Z, et al. (2014) The association of rs1149048 polymorphism in matrilin-1(MATN1) gene with adolescent idiopathic scoliosis susceptibility: a meta-analysis. Mol Biol Rep 41: 2543-2549. doi: 10.1007/s11033-014-3112-y
![]() |
[31] |
Bae JW, Cho CH, Min WK, et al. (2012) Associations between matrilin-1 gene polymorphisms and adolescent idiopathic scoliosis curve patterns in a Korean population. Mol Biol Rep 39: 5561-5567. doi: 10.1007/s11033-011-1360-7
![]() |
[32] | Yu Y, Chen ZJ, Qiu Y, et al. (2009) Association between matrilin-1 gene polymorphism and bracing effectiveness in adolescent idiopathic scoliosis girls. Zhonghua Wai Ke Za Zhi 47: 1728-1731. |
[33] | Wang B, Chen ZJ, Qiu Y, et al. (2009) Decreased circulating matrilin-1 levels in adolescent idiopathic scoliosis. Zhonghua Wai Ke Za Zhi 47: 1638-1641. |
[34] | Chen ZJ, Qiu Y, Yu Y, et al. (2009) Association between polymorphism of Matrilin-1 gene (MATN1) with susceptibility to adolescent idiopathic scoliosis. Zhonghua Wai Ke Za Zhi 47: 1332-1335. |
[35] |
Montanaro L, Parisini P, Greggi T, et al. (2006) Evidence of a linkage between matrilin-1 gene (MATN1) and idiopathic scoliosis. Scoliosis 1: 21. doi: 10.1186/1748-7161-1-21
![]() |
[36] |
Wang H, Wu Z, Zhuang Q, et al. (2008) Association study of tryptophan hydroxylase 1 and arylalkylamine N-acetyltransferase polymorphisms with adolescent idiopathic scoliosis in Han Chinese. Spine (Phila Pa 1976) 33: 2199-2203. doi: 10.1097/BRS.0b013e31817c03f9
![]() |
[37] |
Gorman KF, Julien C, Moreau A (2012) The genetic epidemiology of idiopathic scoliosis. Eur Spine J 21: 1905-1919. doi: 10.1007/s00586-012-2389-6
![]() |
[38] | Zhu Z, Xu L, Qiu Y (2015) Current progress in genetic research of adolescent idiopathic scoliosis. Ann Transl Med 3: S19. |
[39] |
Pearson TA, Manolio TA (2008) How to interpret a genome-wide association study. JAMA 299: 1335-1344. doi: 10.1001/jama.299.11.1335
![]() |
[40] |
Chettier R, Nelson L, Ogilvie JW, et al. (2015) Haplotypes at LBX1 have distinct inheritance patterns with opposite effects in adolescent idiopathic scoliosis. PLoS One 10: e0117708. doi: 10.1371/journal.pone.0117708
![]() |
[41] |
Ikegawa S (2016) Genomic study of adolescent idiopathic scoliosis in Japan. Scoliosis Spinal Disord 11: 5-016-0067-x. doi: 10.1186/s13013-016-0067-x
![]() |
[42] |
Grauers A, Wang J, Einarsdottir E, et al. (2015) Candidate gene analysis and exome sequencing confirm LBX1 as a susceptibility gene for idiopathic scoliosis. Spine J 15: 2239-2246. doi: 10.1016/j.spinee.2015.05.013
![]() |
[43] |
Jagla K, Dolle P, Mattei MG, et al. (1995) Mouse Lbx1 and human LBX1 define a novel mammalian homeobox gene family related to the Drosophila lady bird genes. Mech Dev 53: 345-356. doi: 10.1016/0925-4773(95)00450-5
![]() |
[44] | Gross MK, Moran-Rivard L, Velasquez T, et al. (2000) Lbx1 is required for muscle precursor migration along a lateral pathway into the limb. Development 127: 413-424. |
[45] |
Schafer K, Neuhaus P, Kruse J, et al. (2003) The homeobox gene Lbx1 specifies a subpopulation of cardiac neural crest necessary for normal heart development. Circ Res 92: 73-80. doi: 10.1161/01.RES.0000050587.76563.A5
![]() |
[46] |
Gross MK, Dottori M, Goulding M (2002) Lbx1 specifies somatosensory association interneurons in the dorsal spinal cord. Neuron 34: 535-549. doi: 10.1016/S0896-6273(02)00690-6
![]() |
[47] |
Xu JF, Yang GH, Pan XH, et al. (2015) Association of GPR126 gene polymorphism with adolescent idiopathic scoliosis in Chinese populations. Genomics 105: 101-107. doi: 10.1016/j.ygeno.2014.11.009
![]() |
[48] |
Kou I, Takahashi Y, Johnson TA, et al. (2013) Genetic variants in GPR126 are associated with adolescent idiopathic scoliosis. Nat Genet 45: 676-679. doi: 10.1038/ng.2639
![]() |
[49] | Zhao L, Roffey DM, Chen S (2015) Genetics of adolescent idiopathic scoliosis in the post-genome-wide association study era. Ann Transl Med 3: S35. |
[50] |
Stankiewicz P, Lupski JR (2010) Structural variation in the human genome and its role in disease. Annu Rev Med 61: 437-455. doi: 10.1146/annurev-med-100708-204735
![]() |
[51] |
Buchan JG, Alvarado DM, Haller G, et al. (2014) Are copy number variants associated with adolescent idiopathic scoliosis?. Clin Orthop Relat Res 472: 3216-3225. doi: 10.1007/s11999-014-3766-8
![]() |
[52] |
Costell M, Gustafsson E, Aszodi A, et al. (1999) Perlecan maintains the integrity of cartilage and some basement membranes. J Cell Biol 147: 1109-1122. doi: 10.1083/jcb.147.5.1109
![]() |
[53] |
Rodgers KD, Sasaki T, Aszodi A, et al. (2007) Reduced perlecan in mice results in chondrodysplasia resembling Schwartz-Jampel syndrome. Hum Mol Genet 16: 515-528. doi: 10.1093/hmg/ddl484
![]() |
[54] |
Stum M, Davoine CS, Vicart S, et al. (2006) Spectrum of HSPG2 (Perlecan) mutations in patients with Schwartz-Jampel syndrome. Hum Mutat 27: 1082-1091. doi: 10.1002/humu.20388
![]() |
[55] | Baschal EE, Wethey CI, Swindle K, et al. (2014) Exome sequencing identifies a rare HSPG2 variant associated with familial idiopathic scoliosis. G3 (Bethesda) 5: 167-174. |
[56] |
Robinson PN, Godfrey M (2000) The molecular genetics of Marfan syndrome and related microfibrillopathies. J Med Genet 37: 9-25. doi: 10.1136/jmg.37.1.9
![]() |
[57] |
Tuncbilek E, Alanay Y (2006) Congenital contractural arachnodactyly (Beals syndrome). Orphanet J Rare Dis 1: 20. doi: 10.1186/1750-1172-1-20
![]() |
[58] | Patten SA, Margaritte-Jeannin P, Bernard JC, et al. (2015) Functional variants of POC5 identified in patients with idiopathic scoliosis. J Clin Invest 125: 1124-1128. |
[59] |
Li W, Li Y, Zhang L, et al. (2016) AKAP2 identified as a novel gene mutated in a Chinese family with adolescent idiopathic scoliosis. J Med Genet 53: 488-493. doi: 10.1136/jmedgenet-2015-103684
![]() |
[60] |
Weinstein SL, Dolan LA, Wright JG, et al. (2013) Effects of bracing in adolescents with idiopathic scoliosis. N Engl J Med 369: 1512-1521. doi: 10.1056/NEJMoa1307337
![]() |
[61] |
Ward K, Ogilvie JW, Singleton MV, et al. (2010) Validation of DNA-based prognostic testing to predict spinal curve progression in adolescent idiopathic scoliosis. Spine (Phila Pa 1976) 35: E1455-1464. doi: 10.1097/BRS.0b013e3181ed2de1
![]() |
[62] |
Roye BD, Wright ML, Matsumoto H, et al. (2015) An Independent Evaluation of the Validity of a DNA-Based Prognostic Test for Adolescent Idiopathic Scoliosis. J Bone Joint Surg Am 97: 1994-1998. doi: 10.2106/JBJS.O.00217
![]() |
[63] | Lee MC (2015) The Distance from Bench to Bedside: Commentary on an article by Benjamin D. Roye, MD, MPH, et al..: "An Independent Evaluation of the Validity of a DNA-Based Prognostic Test for Adolescent Idiopathic Scoliosis". J Bone Joint Surg Am 97: e79. |
[64] |
Tang QL, Julien C, Eveleigh R, et al. (2015) A replication study for association of 53 single nucleotide polymorphisms in ScoliScore test with adolescent idiopathic scoliosis in French-Canadian population. Spine (Phila Pa 1976) 40: 537-543. doi: 10.1097/BRS.0000000000000807
![]() |
[65] | Bohl DD, Telles CJ, Ruiz FK, et al. (2016) A Genetic Test Predicts Providence Brace Success for Adolescent Idiopathic Scoliosis When Failure Is Defined as Progression to >45 Degrees. Clin Spine Surg 29: E146-50. |
[66] |
Xu L, Qiu X, Sun X, et al. (2011) Potential genetic markers predicting the outcome of brace treatment in patients with adolescent idiopathic scoliosis. Eur Spine J 20: 1757-1764. doi: 10.1007/s00586-011-1874-7
![]() |
[67] |
Lowry RB, Bedard T (2016) Congenital limb deficiency classification and nomenclature: The need for a consensus. Am J Med Genet A 170: 1400-1404. doi: 10.1002/ajmg.a.37608
![]() |
[68] | Gold NB, Westgate MN, Holmes LB (2011) Anatomic and etiological classification of congenital limb deficiencies. Am J Med Genet A 155A: 1225-1235. |
[69] | Auerbach AD, Allen RG (1991) Leukemia and preleukemia in Fanconi anemia patients. A review of the literature and report of the International Fanconi Anemia Registry. Cancer Genet Cytogenet 51: 1-12. |
[70] |
Hurst JA, Hall CM, Baraitser M (1991) The Holt-Oram syndrome. J Med Genet 28: 406-410. doi: 10.1136/jmg.28.6.406
![]() |
[71] |
Hall JG (1987) Thrombocytopenia and absent radius (TAR) syndrome. J Med Genet 24: 79-83. doi: 10.1136/jmg.24.2.79
![]() |
[72] | Barham G, Clarke NM (2008) Genetic regulation of embryological limb development with relation to congenital limb deformity in humans. J Child Orthop 2: 1-9. |
[73] |
Zuniga A, Zeller R, Probst S (2012) The molecular basis of human congenital limb malformations. Wiley Interdiscip Rev Dev Biol 1: 803-822. doi: 10.1002/wdev.59
![]() |
[74] | Wang YH, Keenan SR, Lynn J, et al. (2015) Gremlin1 induces anterior-posterior limb bifurcations in developing Xenopus limbs but does not enhance limb regeneration. Mech Dev 138 Pt 3: 256-267. |
[75] | Amprino R, Bonetti DA (1967) Experimental observations in the development of ectoderm-free mesoderm of the limb bud in chick embryos. Nature 214: 826-827. |
[76] |
Brewer JR, Mazot P, Soriano P (2016) Genetic insights into the mechanisms of Fgf signaling. Genes Dev 30: 751-771. doi: 10.1101/gad.277137.115
![]() |
[77] |
Manouvrier-Hanu S, Holder-Espinasse M, Lyonnet S (1999) Genetics of limb anomalies in humans. Trends Genet 15: 409-417. doi: 10.1016/S0168-9525(99)01823-5
![]() |
[78] |
Sun X, Mariani FV, Martin GR (2002) Functions of FGF signalling from the apical ectodermal ridge in limb development. Nature 418: 501-508. doi: 10.1038/nature00902
![]() |
[79] |
Boulet AM, Moon AM, Arenkiel BR, et al. (2004) The roles of Fgf4 and Fgf8 in limb bud initiation and outgrowth. Dev Biol 273: 361-372. doi: 10.1016/j.ydbio.2004.06.012
![]() |
[80] |
Zeller R, Zuniga A (2007) Shh and Gremlin1 chromosomal landscapes in development and disease. Curr Opin Genet Dev 17: 428-434. doi: 10.1016/j.gde.2007.07.006
![]() |
[81] |
Khokha MK, Hsu D, Brunet LJ, et al. (2003) Gremlin is the BMP antagonist required for maintenance of Shh and Fgf signals during limb patterning. Nat Genet 34: 303-307. doi: 10.1038/ng1178
![]() |
[82] |
Dimitrov BI, Voet T, De Smet L, et al. (2010) Genomic rearrangements of the GREM1-FMN1 locus cause oligosyndactyly, radio-ulnar synostosis, hearing loss, renal defects syndrome and Cenani--Lenz-like non-syndromic oligosyndactyly. J Med Genet 47: 569-574. doi: 10.1136/jmg.2009.073833
![]() |
[83] |
Gong Y, Krakow D, Marcelino J, et al. (1999) Heterozygous mutations in the gene encoding noggin affect human joint morphogenesis. Nat Genet 21: 302-304. doi: 10.1038/6821
![]() |
[84] |
Walsh DW, Godson C, Brazil DP, et al. (2010) Extracellular BMP-antagonist regulation in development and disease: tied up in knots. Trends Cell Biol 20: 244-256. doi: 10.1016/j.tcb.2010.01.008
![]() |
[85] | Garavelli L, Wischmeijer A, Rosato S, et al. (2011) Al-Awadi-Raas-Rothschild (limb/pelvis/uterus-hypoplasia/aplasia) syndrome and WNT7A mutations: genetic homogeneity and nosological delineation. Am J Med Genet A 155A: 332-336. |
[86] |
Mortlock DP, Innis JW (1997) Mutation of HOXA13 in hand-foot-genital syndrome. Nat Genet 15: 179-180. doi: 10.1038/ng0297-179
![]() |
[87] |
Goodman FR (2002) Limb malformations and the human HOX genes. Am J Med Genet 112: 256-265. doi: 10.1002/ajmg.10776
![]() |
[88] |
Duboc V, Logan MP (2011) Regulation of limb bud initiation and limb-type morphology. Dev Dyn 240: 1017-1027. doi: 10.1002/dvdy.22582
![]() |
[89] | King M, Arnold JS, Shanske A, et al. (2006) T-genes and limb bud development. Am J Med Genet A 140: 1407-1413. |
[90] |
Liu C, Nakamura E, Knezevic V, et al. (2003) A role for the mesenchymal T-box gene Brachyury in AER formation during limb development. Development 130: 1327-1337. doi: 10.1242/dev.00354
![]() |
[91] |
Bamshad M, Lin RC, Law DJ, et al. (1997) Mutations in human TBX3 alter limb, apocrine and genital development in ulnar-mammary syndrome. Nat Genet 16: 311-315. doi: 10.1038/ng0797-311
![]() |
[92] |
Davenport TG, Jerome-Majewska LA, Papaioannou VE (2003) Mammary gland, limb and yolk sac defects in mice lacking Tbx3, the gene mutated in human ulnar mammary syndrome. Development 130: 2263-2273. doi: 10.1242/dev.00431
![]() |
[93] |
Rallis C, Del Buono J, Logan MP (2005) Tbx3 can alter limb position along the rostrocaudal axis of the developing embryo. Development 132: 1961-1970. doi: 10.1242/dev.01787
![]() |
[94] |
Don EK, de Jong-Curtain TA, Doggett K, et al. (2016) Genetic basis of hindlimb loss in a naturally occurring vertebrate model. Biol Open 5: 359-366. doi: 10.1242/bio.016295
![]() |
[95] |
Ahn DG, Kourakis MJ, Rohde LA, et al. (2002) T-box gene tbx5 is essential for formation of the pectoral limb bud. Nature 417: 754-758. doi: 10.1038/nature00814
![]() |
[96] |
Kiefer SM, Robbins L, Barina A, et al. (2008) SALL1 truncated protein expression in Townes-Brocks syndrome leads to ectopic expression of downstream genes. Hum Mutat 29: 1133-1140. doi: 10.1002/humu.20759
![]() |
[97] |
Kohlhase J, Wischermann A, Reichenbach H, et al. (1998) Mutations in the SALL1 putative transcription factor gene cause Townes-Brocks syndrome. Nat Genet 18: 81-83. doi: 10.1038/ng0198-81
![]() |
[98] | Al-Qattan MM (2011) WNT pathways and upper limb anomalies. J Hand Surg Eur Vol 36: 9-22. |
[99] |
Sowinska-Seidler A, Socha M, Jamsheer A (2014) Split-hand/foot malformation-molecular cause and implications in genetic counseling. J Appl Genet 55: 105-115. doi: 10.1007/s13353-013-0178-5
![]() |
[100] |
Naveed M, Nath SK, Gaines M, et al. (2007) Genomewide linkage scan for split-hand/foot malformation with long-bone deficiency in a large Arab family identifies two novel susceptibility loci on chromosomes 1q42.2-q43 and 6q14.1. Am J Hum Genet 80: 105-111. doi: 10.1086/510724
![]() |
[101] | Gurnett CA, Dobbs MB, Nordsieck EJ, et al. (2006) Evidence for an additional locus for split hand/foot malformation in chromosome region 8q21.11-q22.3. Am J Med Genet A 140: 1744-1748. |
[102] | Jiang B, Zhang Z, Zheng P, et al. (2014) Apoptotic genes expression in placenta of clubfoot-like fetus pregnant rats. Int J Clin Exp Pathol 7: 677-684. |
[103] |
Alderman BW, Takahashi ER, LeMier MK (1991) Risk indicators for talipes equinovarus in Washington State, 1987-1989. Epidemiology 2: 289-292. doi: 10.1097/00001648-199107000-00009
![]() |
[104] | Chung CS, Nemechek RW, Larsen IJ, et al. (1969) Genetic and epidemiological studies of clubfoot in Hawaii. General and medical considerations. Hum Hered 19: 321-342. |
[105] |
Moorthi RN, Hashmi SS, Langois P, et al. (2005) Idiopathic talipes equinovarus (ITEV) (clubfeet) in Texas. Am J Med Genet A 132A: 376-380. doi: 10.1002/ajmg.a.30505
![]() |
[106] |
Miedzybrodzka Z (2003) Congenital talipes equinovarus (clubfoot): a disorder of the foot but not the hand. J Anat 202: 37-42. doi: 10.1046/j.1469-7580.2003.00147.x
![]() |
[107] |
Irani RN, Sherman MS (1972) The pathological anatomy of idiopathic clubfoot. Clin Orthop Relat Res 84: 14-20. doi: 10.1097/00003086-197205000-00004
![]() |
[108] |
Bacino CA, Hecht JT (2014) Etiopathogenesis of equinovarus foot malformations. Eur J Med Genet 57: 473-479. doi: 10.1016/j.ejmg.2014.06.001
![]() |
[109] |
Parker SE, Mai CT, Strickland MJ, et al. (2009) Multistate study of the epidemiology of clubfoot. Birth Defects Res A Clin Mol Teratol 85: 897-904. doi: 10.1002/bdra.20625
![]() |
[110] |
Rogers JM (2009) Tobacco and pregnancy. Reprod Toxicol 28: 152-160. doi: 10.1016/j.reprotox.2009.03.012
![]() |
[111] |
Lambers DS, Clark KE (1996) The maternal and fetal physiologic effects of nicotine. Semin Perinatol 20: 115-126. doi: 10.1016/S0146-0005(96)80079-6
![]() |
[112] |
Hecht JT, Ester A, Scott A, et al. (2007) NAT2 variation and idiopathic talipes equinovarus (clubfoot). Am J Med Genet A 143A: 2285-2291. doi: 10.1002/ajmg.a.31927
![]() |
[113] |
Sommer A, Blanton SH, Weymouth K, et al. (2011) Smoking, the xenobiotic pathway, and clubfoot. Birth Defects Res A Clin Mol Teratol 91: 20-28. doi: 10.1002/bdra.20742
![]() |
[114] | 114. Engell V, Damborg F, Andersen M, et al. (2006) Club foot: a twin study. J Bone Joint Surg Br 88: 374-376. |
[115] |
de Andrade M, Barnholtz JS, Amos CI, et al. (1998) Segregation analysis of idiopathic talipes equinovarus in a Texan population. Am J Med Genet 79: 97-102. doi: 10.1002/(SICI)1096-8628(19980901)79:2<97::AID-AJMG4>3.0.CO;2-K
![]() |
[116] |
Honein MA, Paulozzi LJ, Moore CA (2000) Family history, maternal smoking, and clubfoot: an indication of a gene-environment interaction. Am J Epidemiol 152: 658-665. doi: 10.1093/aje/152.7.658
![]() |
[117] |
Gurnett CA, Alaee F, Kruse LM, et al. (2008) Asymmetric lower-limb malformations in individuals with homeobox PITX1 gene mutation. Am J Hum Genet 83: 616-622. doi: 10.1016/j.ajhg.2008.10.004
![]() |
[118] |
Alvarado DM, McCall K, Aferol H, et al. (2011) Pitx1 haploinsufficiency causes clubfoot in humans and a clubfoot-like phenotype in mice. Hum Mol Genet 20: 3943-3952. doi: 10.1093/hmg/ddr313
![]() |
[119] |
Yong BC, Xun FX, Zhao LJ, et al. (2016) A systematic review of association studies of common variants associated with idiopathic congenital talipes equinovarus (ICTEV) in humans in the past 30 years. Springerplus 5: 896-016-2353-8. eCollection 2016. doi: 10.1186/s40064-016-2353-8
![]() |
[120] |
Rodriguez-Esteban C, Tsukui T, Yonei S, et al. (1999) The T-box genes Tbx4 and Tbx5 regulate limb outgrowth and identity. Nature 398: 814-818. doi: 10.1038/19769
![]() |
[121] | Alvarado DM, Aferol H, McCall K, et al. (2010) Familial isolated clubfoot is associated with recurrent chromosome 17q23.1q23.2 microduplications containing TBX4. Am J Hum Genet 87: 154-160. |
[122] | Lu W, Bacino CA, Richards BS, et al. (2012) Studies of TBX4 and chromosome 17q23.1q23.2: an uncommon cause of nonsyndromic clubfoot. Am J Med Genet A 158A: 1620-1627. |
[123] |
Alnemri ES, Livingston DJ, Nicholson DW, et al. (1996) Human ICE/CED-3 protease nomenclature. Cell 87: 171. doi: 10.1016/S0092-8674(00)81334-3
![]() |
[124] |
Heck AL, Bray MS, Scott A, et al. (2005) Variation in CASP10 gene is associated with idiopathic talipes equinovarus. J Pediatr Orthop 25: 598-602. doi: 10.1097/01.bpo.0000173248.96936.90
![]() |
[125] |
Ester AR, Tyerman G, Wise CA, et al. (2007) Apoptotic gene analysis in idiopathic talipes equinovarus (clubfoot). Clin Orthop Relat Res 462: 32-37. doi: 10.1097/BLO.0b013e318073c2d9
![]() |
[126] |
Daher S, Guimaraes AJ, Mattar R, et al. (2008) Bcl-2 and Bax expressions in pre-term, term and post-term placentas. Am J Reprod Immunol 60: 172-178. doi: 10.1111/j.1600-0897.2008.00609.x
![]() |
[127] |
Peebles DM (2004) Fetal consequences of chronic substrate deprivation. Semin Fetal Neonatal Med 9: 379-386. doi: 10.1016/j.siny.2004.03.008
![]() |
[128] |
Sundberg K, Bang J, Smidt-Jensen S, et al. (1997) Randomised study of risk of fetal loss related to early amniocentesis versus chorionic villus sampling. Lancet 350: 697-703. doi: 10.1016/S0140-6736(97)02449-5
![]() |
[129] |
Cederholm M, Haglund B, Axelsson O (2005) Infant morbidity following amniocentesis and chorionic villus sampling for prenatal karyotyping. BJOG 112: 394-402. doi: 10.1111/j.1471-0528.2005.00413.x
![]() |
[130] |
Mark M, Rijli FM, Chambon P (1997) Homeobox genes in embryogenesis and pathogenesis. Pediatr Res 42: 421-429. doi: 10.1203/00006450-199710000-00001
![]() |
[131] |
McGinnis W, Krumlauf R (1992) Homeobox genes and axial patterning. Cell 68: 283-302. doi: 10.1016/0092-8674(92)90471-N
![]() |
[132] |
Dobbs MB, Gurnett CA, Pierce B, et al. (2006) HOXD10 M319K mutation in a family with isolated congenital vertical talus. J Orthop Res 24: 448-453. doi: 10.1002/jor.20052
![]() |
[133] |
Shrimpton AE, Levinsohn EM, Yozawitz JM, et al. (2004) A HOX gene mutation in a family with isolated congenital vertical talus and Charcot-Marie-Tooth disease. Am J Hum Genet 75: 92-96. doi: 10.1086/422015
![]() |
[134] | Weymouth KS, Blanton SH, Bamshad MJ, et al. (2011) Variants in genes that encode muscle contractile proteins influence risk for isolated clubfoot. Am J Med Genet A 155A: 2170-2179. |
[135] |
McKillop DF, Geeves MA (1993) Regulation of the interaction between actin and myosin subfragment 1: evidence for three states of the thin filament. Biophys J 65: 693-701. doi: 10.1016/S0006-3495(93)81110-X
![]() |
[136] | Gordon AM, Homsher E, Regnier M (2000) Regulation of contraction in striated muscle. Physiol Rev 80: 853-924. |
[137] |
Weymouth KS, Blanton SH, Powell T, et al. (2016) Functional Assessment of Clubfoot Associated HOXA9, TPM1, and TPM2 Variants Suggests a Potential Gene Regulation Mechanism. Clin Orthop Relat Res 474: 1726-1735. doi: 10.1007/s11999-016-4788-1
![]() |
[138] |
Castaneda C, Nalley K, Mannion C, et al. (2015) Clinical decision support systems for improving diagnostic accuracy and achieving precision medicine. J Clin Bioinforma 5: 4-015-0019-3. eCollection 2015. doi: 10.1186/s13336-015-0019-3
![]() |
[139] |
Rehm HL (2013) Disease-targeted sequencing: a cornerstone in the clinic. Nat Rev Genet 14: 295-300. doi: 10.1038/nrg3463
![]() |
[140] |
Richards S, Aziz N, Bale S, et al. (2015) Standards and guidelines for the interpretation of sequence variants: a joint consensus recommendation of the American College of Medical Genetics and Genomics and the Association for Molecular Pathology. Genet Med 17: 405-424. doi: 10.1038/gim.2015.30
![]() |
[141] |
Green RC, Berg JS, Grody WW, et al. (2013) ACMG recommendations for reporting of incidental findings in clinical exome and genome sequencing. Genet Med 15: 565-574. doi: 10.1038/gim.2013.73
![]() |
1. | Chaoxu Mu, Ke Wang, Shiqian Ma, Zhiqiang Chong, Zhen Ni, Adaptive composite frequency control of power systems using reinforcement learning, 2022, 7, 2468-2322, 671, 10.1049/cit2.12103 | |
2. | Yongxin Shao, Zhetao Sun, Aihong Tan, Tianhong Yan, Efficient three-dimensional point cloud object detection based on improved Complex-YOLO, 2023, 17, 1662-5218, 10.3389/fnbot.2023.1092564 | |
3. | Zewei Su, Lanfang Dong, Xuejie Ji, Guoming Li, Xierong Zhu, 2022, Chapter 39, 978-3-031-24666-1, 440, 10.1007/978-3-031-24667-8_39 | |
4. | Yuan Yuan, Jie Liu, Wenzheng Chi, Guodong Chen, Lining Sun, A Gaussian Mixture Model Based Fast Motion Planning Method Through Online Environmental Feature Learning, 2023, 70, 0278-0046, 3955, 10.1109/TIE.2022.3177758 | |
5. | Lanfang Dong, PuZhao Hu, Xiao Xiao, YingChao Tang, Meng Mao, Guoming Li, 2022, Chapter 42, 978-3-031-24666-1, 475, 10.1007/978-3-031-24667-8_42 | |
6. | Xiao Zhang, Yun He, Zhigang Xu, Zainan Jiang, Yong Liu, Wenbo Feng, Junwu Wu, Actuation delay compensation of robots in semi-physical test, 2023, 16, 1662-5218, 10.3389/fnbot.2022.1099656 | |
7. | Yurui Xu, Xiao Wu, Hang Su, Xiaorui Liu, 2022, Multimodal Emotion Recognition Based on Feature Fusion, 978-1-6654-8306-3, 7, 10.1109/ICARM54641.2022.9959098 | |
8. | Amruta Rout, Golak Bihari Mahanta, Bibhuti Bhusan Biswal, Renin Francy T., Sri Vardhan Raj, Deepak B.B.V.L., Application of fuzzy logic in multi-sensor-based health service robot for condition monitoring during pandemic situations, 2024, 44, 2754-6969, 96, 10.1108/RIA-07-2023-0091 | |
9. | Jia Li, Yu-qian Zhou, Qiu-yan Zhang, Metric networks for enhanced perception of non-local semantic information, 2023, 17, 1662-5218, 10.3389/fnbot.2023.1234129 | |
10. | Tolga Özer, Ömer Türkmen, Low-cost AI-based solar panel detection drone design and implementation for solar power systems, 2023, 43, 2754-6969, 605, 10.1108/RIA-03-2023-0022 | |
11. | Mebrouka Madi, Mohammed Khammari, Mohamed-Chaker Larabi, CNN-LPQ: convolutional neural network combined to local phase quantization based approach for face anti-spoofing, 2024, 1573-7721, 10.1007/s11042-024-18880-y | |
12. | Lanfang Dong, Yongsheng Chen, Yuhang Zhang, 2022, Design and Implementation of a Highly Compatible Intelligent Video Analysis Framework, 978-1-6654-7267-8, 845, 10.1109/CYBER55403.2022.9907177 | |
13. | Jianqiang Li, Xiaoxiao Song, Yanning Lin, Junya Wang, Dongying Guo, Jie Chen, Integrating medical rules to assist attention for sleep apnea detection, 2023, 41, 0263-5747, 2519, 10.1017/S0263574723000516 | |
14. | People Identification Through Facial Recognition and Anti-Spoofing Using Deep Learning, 2023, 2394-4099, 253, 10.32628/IJSRSET2310539 | |
15. | Yang Hong, Zhiyu Ding, Yuan Yuan, Wenzheng Chi, Lining Sun, Obstacle Avoidance Learning for Robot Motion Planning in Human–Robot Integration Environments, 2023, 15, 2379-8920, 2169, 10.1109/TCDS.2023.3242373 |
Dataset | Training Set | Testing Set | Total |
CASIA-FASD | 7200 | 10800 | 18000 |
Replay-Attack | 10800 | 14400 | 25200 |
Algorithm | CASIA | Replay-Attack | Parameter | ||
HTER (%) | EER (%) | HTER (%) | EER (%) | ||
MobileNetV2 | 16.7 | 9.4 | 12.6 | 3.6 | 3.4MB |
MobileNetV3 | 19.3 | 14.4 | 10.9 | 6.5 | 3.87MB |
ShuffleNetV2 | 21.9 | 14.9 | 21.8 | 6.33 | 1.4MB |
SqueezeNet | 28.3 | 19.1 | 24.7 | 13.7 | 736.45KB |
Xception | 20.5 | 9.4 | 20.5 | 4.2 | 20.81MB |
LBP | 9.7 | 5.5 | 10.8 | 5.6 | - |
Dataset | Training Set | Testing Set | Total |
CASIA-FASD | 7200 | 10800 | 18000 |
Replay-Attack | 10800 | 14400 | 25200 |
Algorithm | CASIA | Replay-Attack | Parameter | ||
HTER (%) | EER (%) | HTER (%) | EER (%) | ||
MobileNetV2 | 16.7 | 9.4 | 12.6 | 3.6 | 3.4MB |
MobileNetV3 | 19.3 | 14.4 | 10.9 | 6.5 | 3.87MB |
ShuffleNetV2 | 21.9 | 14.9 | 21.8 | 6.33 | 1.4MB |
SqueezeNet | 28.3 | 19.1 | 24.7 | 13.7 | 736.45KB |
Xception | 20.5 | 9.4 | 20.5 | 4.2 | 20.81MB |
LBP | 9.7 | 5.5 | 10.8 | 5.6 | - |