Skip to main content

Face Anti-spoofing: Multi-spectral Approach

  • Chapter
  • First Online:

Part of the book series: Advances in Computer Vision and Pattern Recognition ((ACVPR))

Abstract

With the wide applications of face recognition, spoofing attack is becoming a big threat to their security. Conventional face recognition systems usually adopt behavioral challenge-response or texture analysis methods to resist spoofing attacks, however, these methods require high user cooperation and are sensitive to the imaging quality and environments. In this chapter, we present a multi-spectral face recognition system working in VIS (Visible) and NIR (Near Infrared) spectrums, which is robust to various spoofing attacks and user cooperation free. First, we introduce the structure of the system from several aspects including: imaging device, face landmarking, feature extraction, matching, VIS, and NIR sub-systems. Then the performance of the multi-spectral system and each subsystem is evaluated and analyzed. Finally, we describe the multi-spectral image-based anti-spoofing module, and report its performance under photo attacks. Experiments on a spoofing database show the excellent performance of the proposed system both in recognition rate and anti-spoofing ability. Compared with conventional VIS face recognition system, the multi-spectral system has two advantages: (1) By combining the VIS and NIR spectrums, the system can resist VIS photo and NIR photo attacks easily. And users’ cooperation is no longer needed, making the system user friendly and fast. (2) Due to the precise key-point localization, Gabor feature extraction and unsupervised learning, the system is robust to pose, illumination and expression variations. Generally, its recognition rate is higher than the VIS subsystem.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Mask is also a good choice, but usually it is too expensive to produce client-like masks. So the massive usage of masks rarely appears in the literature.

References

  1. Duc N, Minh B (2009) Your face is not your password. Black Hat Conference

    Google Scholar 

  2. Li J, Wang Y, Tan T, Jain AK (2004) Live face detection based on the analysis of fourier spectra. In: Jain AK, Ratha NK (eds) Society of photo-optical instrumentation engineers (SPIE) conference series, vol 5404, pp 296–303

    Google Scholar 

  3. Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. Proceedings of the 11th European conference on computer vision: Part VI., ECCV’10. Springer, Berlin, pp 504–517

    Google Scholar 

  4. Maatta J, Hadid A, Pietikainen M (2011) Face spoofing detection from single images using micro-texture analysis. In: Biometrics (IJCB), 2011 international joint conference on, pp 1–7

    Google Scholar 

  5. Pan G, Sun L, Wu Z, Lao S (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: Computer vision, 2007. ICCV 2007. IEEE 11th international conference on, pp 1–8

    Google Scholar 

  6. Kollreider K, Fronthaler H, Bigun J (2008) Verifying liveness by multiple experts in face biometrics. In: Computer vision and pattern recognition workshops, 2008. CVPRW ’08. IEEE computer society conference on, pp 1–6

    Google Scholar 

  7. Kollreider K, Fronthaler H, Bigun J (2005) Evaluating liveness by face images and the structure tensor. In: Automatic identification advanced technologies, 2005. Fourth IEEE workshop on, pp 75–80

    Google Scholar 

  8. Chetty G, Wagner M (2004) Liveness verification in audio-video speaker authentication. In: In proceeding of the 10th ASSTA conference, pp 358–363. Macquarie University Press

    Google Scholar 

  9. Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: Biometrics (IJCB), 2011 international joint conference on, pp 1–7

    Google Scholar 

  10. Bai J, Ng TT, Gao X, Shi YQ (2010) Is physics-based liveness detection truly possible with a single image? In: Circuits and systems (ISCAS), Proceedings of 2010 IEEE international symposium on, pp 3425–3428

    Google Scholar 

  11. Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li S (2012) A face antispoofing database with diverse attacks. In: Biometrics (ICB), 2012 5th IAPR international conference on, pp 26–31

    Google Scholar 

  12. Pavlidis I, Symosek P (2000) The imaging issue in an automatic face/disguise detection system. In: Computer vision beyond the visible spectrum: methods and applications, 2000. Proceedings of the IEEE workshop on, pp 15–24

    Google Scholar 

  13. Kim Y, Na J, Yoon S, Yi J (2009) Masked fake face detection using radiance measurements. J Opt Soc Amer A 26(4)

    Google Scholar 

  14. OSU thermal imagery database. http://www.cse.ohiostate.edu/otcbvs-bench/

  15. Yi D, Lei Z, Hu Y, Li SZ (2013) Fast matching by 2 lines of code for large scale face recognition systems. CoRR abs/1302.7180

    Google Scholar 

  16. Li SZ, Chu R, Liao S, Zhang L (2007) Illumination invariant face recognition using near-infrared images. IEEE Transactions on pattern analysis and machine intelligence 26(Special issue on biometrics: progress and directions)

    Google Scholar 

  17. Viola P, Jones M (2011) Robust real time object detection. IEEE ICCV workshop on statistical and computational theories of vision. Vancouver, Canada

    Google Scholar 

  18. Cootes TF, Taylor CJ, Cooper DH, Graham J (1995) Active shape models: their training and application. CVGIP: image underst 61:38–59

    Google Scholar 

  19. Fukunaga K (1990) Introduction to statistical pattern recognition, 2nd edn. Academic Press, Boston

    MATH  Google Scholar 

  20. Ahonen T, Hadid A, Pietikainen M (2004) Face recognition with local binary patterns. In: Proceedings of the European conference on computer vision. Prague, Czech, pp 469–481

    Google Scholar 

  21. Yi D, Lei Z, Li SZ (2011) A robust eye localization method for low quality face images. In: International joint conference on biometrics (IJCB). Washington, pp 15–21

    Google Scholar 

  22. Saragih J, Lucey S, Cohn J (2011) Deformable model fitting by regularized landmark mean-shift. Int J Comput Vis 91:200–215

    Article  MATH  MathSciNet  Google Scholar 

  23. Milborrow S, Morkel J, Nicolls F (2010) The MUCT landmarked face database. Pattern recognition association of South Africa (2010). Http://www.milbo.org/

    Google Scholar 

  24. Rother C, Kolmogorov V, Blake A (2004) Grabcut: interactive foreground extraction using iterated graph cuts. ACM Trans Graph 23(3):309–314

    Article  Google Scholar 

  25. Phillips PJ, Moon H, Rizvi SA, Rauss PJ (2000) The FERET evaluation methodology for face recognition algorithms 22(10):1090–1104

    Google Scholar 

  26. Okada K, Steffens J, Maurer T, Hong H, Elagin E, Neven H, von der Malsburg C (1998) The Bochum/USC face recognition system and how it fared in the FERET phase III test

    Google Scholar 

  27. Belhumeur P, Hespanha J, Kriegman D (1997) Eigenfaces vs. fisherfaces: recognition using class specific linear projection. IEEE Trans PAMI 19(7):711–720

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the Chinese National Natural Science Foundation Project #61070146, #61105023, #61103156, #61105037, National IoT R&D Project #2150510, European Union FP7 Project #257289 (TABULA RASA http://www.tabularasa-euproject.org), and AuthenMetric R&D Funds.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dong Yi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag London

About this chapter

Cite this chapter

Yi, D., Lei, Z., Zhang, Z., Li, S.Z. (2014). Face Anti-spoofing: Multi-spectral Approach. In: Marcel, S., Nixon, M., Li, S. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, London. https://doi.org/10.1007/978-1-4471-6524-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6524-8_5

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6523-1

  • Online ISBN: 978-1-4471-6524-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics