Abstract
Biometric-based human authentication can provide acceptable level of security to mobile devices such as a tablets and smartphones. Face is one of the most popular choices for biometrics on mobile device since the user can conveniently capture his face image by taking a selfie. Like any other security system, selfie face recognition is also vulnerable to attacks wherein an imposter can present photograph of a genuine user to gain an access to the mobile device. Liveness detection is an essential counter-measure to spoof attacks. In adverse scenarios, an attacker can physically force the user to provide his facial image to unlock the phone. In such cases, facial expression detection can act as a counter-measure. This chapter investigates face-based human recognition techniques on mobile devices and highlight methods having liveness and threat awareness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Akhtar Z, Michelon C, Foresti GL (2014) Liveness detection for biometric authentication in mobile applications. In: 2014 International Carnahan conference on security technology (ICCST), IEEE, pp 1–6
Alotaibi A, Mahmood A (2017) Deep face liveness detection based on nonlinear diffusion using convolution neural network. Signal Image Video Process 11(4):713–720
Bharadwaj S, Dhamecha TI, Vatsa M, Singh R (2013) Computationally efficient face spoofing detection with motion magnification. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 105–110
Boughrara H, Chtourou M, Amar C-B, Chen L (2016) Facial expression recognition based on a mlp neural network using constructive training algorithm. Multimedia Tools Appl 75(2):709–731
Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. IEEE Trans Inf Forensics Secur 11(8):1818–1830
Di Martino JM, Qiu Q, Nagenalli T, Sapiro G (2018) Liveness detection using implicit 3d features. arXiv:1804.06702
Galbally J, Marcel S (2014) Face anti-spoofing based on general image quality assessment. In: 2014 22nd International conference on pattern recognition (ICPR). IEEE, pp 1173–1178
Hassan MA, Mustafa MN, Wahba A (2017) Automatic liveness detection for facial images. In: 2017 12th International conference on computer engineering and systems (ICCES). IEEE, pp 215–220
Huang K-K, Dai D-Q, Ren C-X, Yu-Feng Y, Lai Z-R (2017) Fusing landmark-based features at kernel level for face recognition. Pattern Recogn 63:406–415
Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Technol 14(1):4–20
Jain R, Kant C (2015) Attacks on biometric systems: an overview. Int J Adv Sci Res 1(07):283–288
Killioğlu M, Taşkiran M, Kahraman N (2017) Anti-spoofing in face recognition with liveness detection using pupil tracking. In: 2017 IEEE 15th international symposium on applied machine intelligence and informatics (SAMI). IEEE, pp 000087–000092
Kim KW, Hong HG, Nam GP, Park KR (2017) A study of deep CNN-based classification of open and closed eyes using a visible light camera sensor. Sensors 17(7):1534
Li L, Correia PL, Hadid A (2017) Face recognition under spoofing attacks: countermeasures and research directions. IET Biometrics 7(1):3–14
Li Y, Chang M-C, Farid H, Lyu S (2018) In ictu oculi: Exposing ai generated fake face videos by detecting eye blinking. arXiv:1806.02877
Liao W-H, Young T-J (2010) Texture classification using uniform extended local ternary patterns. In: 2010 IEEE international symposium on multimedia (ISM). IEEE, pp 191–195
Liu M-Y, Breuel T, Kautz J (2017) Unsupervised image-to-image translation networks. Adv Neural Inf Process Syst 700–708
Liu X, Lu R, Liu W (2017) Face liveness detection based on enhanced local binary patterns. In: Chinese automation congress (CAC), 2017. IEEE, pp 6301–6305
Luan X, Wang H, Ou W, Liu L (2017) Face liveness detection with recaptured feature extraction. In: 2017 International conference on security, pattern analysis, and cybernetics (SPAC). IEEE, pp 429–432
Lyons MJ, Budynek J, Akamatsu S (1999) Automatic classification of single facial images. IEEE Trans Pattern Anal Mach Intell 21(12):1357–1362
Määttä J, Hadid A, Pietikäinen M (2011) Face spoofing detection from single images using micro-texture analysis. In: 2011 international joint conference on biometrics (IJCB). IEEE, pp 1–7
Määttä J, Hadid A, Pietikäinen M (2012) Face spoofing detection from single images using texture and local shape analysis. IET Biometrics 1(1):3–10
Manglik PK, Misra U, Maringanti HB et al (2004) Facial expression recognition. In: 2004 IEEE international conference on systems, man and cybernetics, vol 3. IEEE, pp 2220–2224
Marcolin F, Vezzetti E (2017) Novel descriptors for geometrical 3d face analysis. Multimedia Tools Appl 76(12):13805–13834
Meng W, Wong DS, Furnell S, Zhou J (2015) Surveying the development of biometric user authentication on mobile phones. IEEE Commun Surv Tutorials 17(3):1268–1293
Ming Z, Chazalon J, Luoman MM, Visani M, Burie JC Facelivenet: end-to-end networks combining face verification with interactive facial expression-based liveness detection
Pan G, Sun L, Wu Z, Lao S (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera
Patel K, Han H, Jain AK (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268–2283
Pinto A, Pedrini H, Schwartz WR, Rocha A (2015) Face spoofing detection through visual codebooks of spectral temporal cubes. IEEE Trans Image Process 24(12):4726–4740
Poh N, Blanco-Gonzalo R, Wong R, Sanchez-Reillo R (2016) Blind subjects faces database. IET Biometrics 5(1):20–27
Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634
Rattani A, Derakhshani R (2018) A survey of mobile face biometrics. Comput Electr Eng 72:39–52
Rivera AR, Castillo JR, Chae OO (2013) Local directional number pattern for face analysis: face and expression recognition. IEEE Trans Image Process 22(5):1740–1752
Sarode N, Bhatia S (2010) Facial expression recognition. Int J Comput Sci Eng 2(5):1552–1557
Siddiqui TA, Bharadwaj S, Dhamecha TI, Agarwal A, Vatsa M, Singh R, Ratha N (2016) Face anti-spoofing with multifeature videolet aggregation. In: 2016 23rd International conference on pattern recognition (ICPR). IEEE, pp 1035–1040
Singh M, Arora AS (2018) A novel face liveness detection algorithm with multiple liveness indicators. Wirel Pers Commun 100(4):1677–1687
Szegedy C, Ioffe S, Vanhoucke V, Alemi AA (2017) Inception-v4, inception-resnet and the impact of residual connections on learning. In: AAAI, vol 4, p 12
Tirunagari S, Poh N, Windridge D, Iorliam A, Suki N, Ho ATS (2015) Detection of face spoofing using visual dynamics. IEEE Trans Inf Forensics Secur 10(4):762–777
Tiwari K, Choudhary SK, Gupta P (2016) An efficient face recognition system with liveness and threat detection for smartphones. In: International conference on intelligent computing. Springer, pp 397–406
Tiwari K, Gupta P (2014) No-reference fingerprint image quality assessment. In: International conference on intelligent computing. Springer, pp 846–854
Tiwari K, Gupta P (2017) Certain challenges in biometrics system development. In: International conference on computational intelligence, cyber security, and computational models. Springer, pp 113–123
Trewin S, Swart C, Koved L, Martino J, Singh K, Ben-David S (2012) Biometric authentication on a mobile device: a study of user effort, error and task disruption. In: Proceedings of the 28th annual computer security applications conference. ACM, pp 159–168
Uludag U, Jain AK (2004) Attacks on biometric systems: a case study in fingerprints. In: Security, steganography, and watermarking of multimedia contents VI, vol 5306. International Society for Optics and Photonics, pp 622–634
Vezzetti E, Marcolin F, Tornincasa S, Ulrich L, Dagnes N (2017) 3d geometry-based automatic landmark localization in presence of facial occlusions. Multimedia Tools Appl 77:1–29
Wang S-Y, Yang S-H, Chen Y-P, Huang J-W (2017) Face liveness detection based on skin blood flow analysis. Symmetry 9(12):305
Wayman J, Jain A, Maltoni D, Maio D (2005) An introduction to biometric authentication systems. In: Biometric systems. Springer, pp 1–20
Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
There are certain parameters that are used for evaluating the performance of a face recognition system. Some of the commonly used measures are listed below.
-
One-eye detection rate: It refers to the rate of correctly detected blinks to the total number of blinks in test data. In this, right and left eyes are calculated separately.
-
Two-eye detection rate: It is same as one-eye detection rate, but it accounts for the simultaneous blinks of both the eyes for one blink activity.
-
False Acceptance Rate (FAR) and False Rejection Rate (FRR): FAR is the likelihood of the system to accept an unauthorized user as an authorized one. FRR, on the other hand, indicates the possibility of the system rejecting an authorized person by considering it as an imposter.
-
Equal Error Rate: It refers to the value where FAR and FRR are equal and is used to determine their threshold values. The lower the value of EER, higher would be accuracy of a biometric system.
-
Half Total Error Rate (HTER): It is computed by averaging the false acceptance rate and false rejection rate.
-
Area Under the Curve (AUC): A receiver operating characteristic curve (ROC curve) represents a graphical plot of true positive rate (TPR) against the false positive rate (FPR) at different threshold settings. The area under the ROC curve (AUC) refers to the probability of a randomly chosen positive example being classified as positive with greater suspicion than a randomly selected negative example.
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Arora, G., Tiwari, K., Gupta, P. (2019). Liveness and Threat Aware Selfie Face Recognition. In: Rattani, A., Derakhshani, R., Ross, A. (eds) Selfie Biometrics. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-030-26972-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-26972-2_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-26971-5
Online ISBN: 978-3-030-26972-2
eBook Packages: Computer ScienceComputer Science (R0)