Abstract
With the wide applications of face recognition, spoofing attack is becoming a big threat to their security. Conventional face recognition systems usually adopt behavioral challenge-response or texture analysis methods to resist spoofing attacks, however, these methods require high user cooperation and are sensitive to the imaging quality and environments. In this chapter, we present a multi-spectral face recognition system working in VIS (Visible) and NIR (Near Infrared) spectrums, which is robust to various spoofing attacks and user cooperation free. First, we introduce the structure of the system from several aspects including: imaging device, face landmarking, feature extraction, matching, VIS, and NIR sub-systems. Then the performance of the multi-spectral system and each subsystem is evaluated and analyzed. Finally, we describe the multi-spectral image-based anti-spoofing module, and report its performance under photo attacks. Experiments on a spoofing database show the excellent performance of the proposed system both in recognition rate and anti-spoofing ability. Compared with conventional VIS face recognition system, the multi-spectral system has two advantages: (1) By combining the VIS and NIR spectrums, the system can resist VIS photo and NIR photo attacks easily. And users’ cooperation is no longer needed, making the system user friendly and fast. (2) Due to the precise key-point localization, Gabor feature extraction and unsupervised learning, the system is robust to pose, illumination and expression variations. Generally, its recognition rate is higher than the VIS subsystem.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Mask is also a good choice, but usually it is too expensive to produce client-like masks. So the massive usage of masks rarely appears in the literature.
References
Duc N, Minh B (2009) Your face is not your password. Black Hat Conference
Li J, Wang Y, Tan T, Jain AK (2004) Live face detection based on the analysis of fourier spectra. In: Jain AK, Ratha NK (eds) Society of photo-optical instrumentation engineers (SPIE) conference series, vol 5404, pp 296–303
Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. Proceedings of the 11th European conference on computer vision: Part VI., ECCV’10. Springer, Berlin, pp 504–517
Maatta J, Hadid A, Pietikainen M (2011) Face spoofing detection from single images using micro-texture analysis. In: Biometrics (IJCB), 2011 international joint conference on, pp 1–7
Pan G, Sun L, Wu Z, Lao S (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: Computer vision, 2007. ICCV 2007. IEEE 11th international conference on, pp 1–8
Kollreider K, Fronthaler H, Bigun J (2008) Verifying liveness by multiple experts in face biometrics. In: Computer vision and pattern recognition workshops, 2008. CVPRW ’08. IEEE computer society conference on, pp 1–6
Kollreider K, Fronthaler H, Bigun J (2005) Evaluating liveness by face images and the structure tensor. In: Automatic identification advanced technologies, 2005. Fourth IEEE workshop on, pp 75–80
Chetty G, Wagner M (2004) Liveness verification in audio-video speaker authentication. In: In proceeding of the 10th ASSTA conference, pp 358–363. Macquarie University Press
Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: Biometrics (IJCB), 2011 international joint conference on, pp 1–7
Bai J, Ng TT, Gao X, Shi YQ (2010) Is physics-based liveness detection truly possible with a single image? In: Circuits and systems (ISCAS), Proceedings of 2010 IEEE international symposium on, pp 3425–3428
Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li S (2012) A face antispoofing database with diverse attacks. In: Biometrics (ICB), 2012 5th IAPR international conference on, pp 26–31
Pavlidis I, Symosek P (2000) The imaging issue in an automatic face/disguise detection system. In: Computer vision beyond the visible spectrum: methods and applications, 2000. Proceedings of the IEEE workshop on, pp 15–24
Kim Y, Na J, Yoon S, Yi J (2009) Masked fake face detection using radiance measurements. J Opt Soc Amer A 26(4)
OSU thermal imagery database. http://www.cse.ohiostate.edu/otcbvs-bench/
Yi D, Lei Z, Hu Y, Li SZ (2013) Fast matching by 2 lines of code for large scale face recognition systems. CoRR abs/1302.7180
Li SZ, Chu R, Liao S, Zhang L (2007) Illumination invariant face recognition using near-infrared images. IEEE Transactions on pattern analysis and machine intelligence 26(Special issue on biometrics: progress and directions)
Viola P, Jones M (2011) Robust real time object detection. IEEE ICCV workshop on statistical and computational theories of vision. Vancouver, Canada
Cootes TF, Taylor CJ, Cooper DH, Graham J (1995) Active shape models: their training and application. CVGIP: image underst 61:38–59
Fukunaga K (1990) Introduction to statistical pattern recognition, 2nd edn. Academic Press, Boston
Ahonen T, Hadid A, Pietikainen M (2004) Face recognition with local binary patterns. In: Proceedings of the European conference on computer vision. Prague, Czech, pp 469–481
Yi D, Lei Z, Li SZ (2011) A robust eye localization method for low quality face images. In: International joint conference on biometrics (IJCB). Washington, pp 15–21
Saragih J, Lucey S, Cohn J (2011) Deformable model fitting by regularized landmark mean-shift. Int J Comput Vis 91:200–215
Milborrow S, Morkel J, Nicolls F (2010) The MUCT landmarked face database. Pattern recognition association of South Africa (2010). Http://www.milbo.org/
Rother C, Kolmogorov V, Blake A (2004) Grabcut: interactive foreground extraction using iterated graph cuts. ACM Trans Graph 23(3):309–314
Phillips PJ, Moon H, Rizvi SA, Rauss PJ (2000) The FERET evaluation methodology for face recognition algorithms 22(10):1090–1104
Okada K, Steffens J, Maurer T, Hong H, Elagin E, Neven H, von der Malsburg C (1998) The Bochum/USC face recognition system and how it fared in the FERET phase III test
Belhumeur P, Hespanha J, Kriegman D (1997) Eigenfaces vs. fisherfaces: recognition using class specific linear projection. IEEE Trans PAMI 19(7):711–720
Acknowledgments
This work was supported by the Chinese National Natural Science Foundation Project #61070146, #61105023, #61103156, #61105037, National IoT R&D Project #2150510, European Union FP7 Project #257289 (TABULA RASA http://www.tabularasa-euproject.org), and AuthenMetric R&D Funds.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag London
About this chapter
Cite this chapter
Yi, D., Lei, Z., Zhang, Z., Li, S.Z. (2014). Face Anti-spoofing: Multi-spectral Approach. In: Marcel, S., Nixon, M., Li, S. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, London. https://doi.org/10.1007/978-1-4471-6524-8_5
Download citation
DOI: https://doi.org/10.1007/978-1-4471-6524-8_5
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-6523-1
Online ISBN: 978-1-4471-6524-8
eBook Packages: Computer ScienceComputer Science (R0)