Abstract
With the wide deployment of the face recognition system, many face attacks, such as print attack, video attack and 3D face mask, have emerged. Face anti-spoofing is very important to protect face recognition system from attack. This paper proposes a structure of generative adversarial networks with skip connection for face anti-spoofing. First, we obtain the latent spatial features of faces by training generative adversarial networks to reconstruct both real and spoof faces; second, we use the convolution neural networks to detect the spoofing faces. In this paper, the proposed method is evaluated by three public databases. The results suggest that our approach achieves as high as 98% accuracy on both CASIA-FASD and REPLAY-ATTACK databases.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pan, G., Sun, L., Wu. Z., Lao, S.: Eyeblink-based antispoofing in face recognition from a generic webcamera. In: IEEE International Conference on Computer Vision, pp. 1–8 (2007)
De Marsico, M., Nappi, M., Riccio, D., Dugelay, J.L.: Moving face spoofing detection via 3D projective invariants. In: 5th IAPR International Conference on Biometrics, pp. 73–78 (2012)
Kollreider, K., Fronthaler, H., Faraj, M.I., Bigun, J.: Realtime face detection and motion analysis with application in liveness assessment. IEEE Trans. Inf. Forensics Secur. 2(3), 548–558 (2007)
Boulkenafet, Z., Komulainen, J., Hadid, A.: Face spoofing detection using colour texture analysis. IEEE Trans. Inf. Forensics Secur. 11(8), 1818–1830 (2016)
Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746–761 (2015)
Liu, Y., Jourabloo, A., Liu, X.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 389–398 (2018)
Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B.: Generative adversarial nets. In: 27th International Conference on Neural Information Processing Systems, pp. 2672–2680 (2014)
Yan, X., Yang, J., Sohn, K., Lee, H.: Attribute2Image: conditional image generation from visual attributes. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9908, pp. 776–791. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46493-0_47
Huang, X., Li, Y., Poursaeed, O., Hopcroft, J.E.: Stacked generative adversarial networks. In: IEEE Conference on Computer Vision & Pattern Recognition (2017)
Zhu, J.Y., Park, T., Isola, P., Efros, A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: IEEE International Conference on Computer Vision (2017)
Isola, P., Zhu, J.Y., Zhou, T., Efros, A.: Image-to-image translation with conditional adversarial networks. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 5967–5976. Honolulu, HI (2017)
Choi, Y., Choi, M., Kim, M.: StarGAN: unified generative adversarial networks for multi-domain image-to-image translation. In: IEEE Conference on Computer Vision and Pattern Recognition (2018)
Ledig, C., Theis, L.: Photo-realistic single image super-resolution using a generative adversarial network. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 105–114. Honolulu, HI (2017)
Mirza, M., Osindero, S.: Conditional generative adversarial nets. J. arXiv preprint (2014). arXiv:1411.1784
Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Medical Image Computing and Computer-Assisted Intervention, pp. 234–241 (2015)
Jourabloo, A., Liu, Y., Liu, X.: Face de-spoofing: anti-spoofing via noise modeling. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11217, pp. 297–315. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01261-8_18
He, K., Zhang, X., Ren, S.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)
Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.Z.: A face antispoofing database with diverse attacks. In: 5th IEEE IAPR International Conference on Biometrics, pp. 26–31 (2012)
Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: IEEE Biometrics Special Interest Group, pp. 1–7 (2012)
Boulkenafet, Z., Komulainen, J., Li, L.: OULU-NPU: a mobile face presentation attack database with real-world variations. In: 12th IEEE International Conference on Automatic Face & Gesture Recognition. pp. 612–618. IEEE Computer Society (2017)
Bengio, S., Mariéthoz, J.: A statistical significance test for person authentication. In The Speaker and Language Recognition Workshop (Odyssey), Toledo, pp. 237–244 (2004)
Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. In: IEEE Transactions on Information Forensics and Security, pp. 746–761 (2015)
Li, L., Feng, X., Boulkenafet, Z.: An original face anti-spoofing approach using partial convolutional neural network. In: IEEE International Conference on Image Processing Theory, Tools and Applications, pp. 1–6. (2017)
Rehman, Y.A.U., Po, L.M., Liu, M.: LiveNet: improving features generalization for face anti-spoofing using convolution neural networks. J. Expert Systems with Applications, pp. 159–169 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Xia, J., Tang, Y., Jia, X., Shen, L., Lai, Z. (2019). Latent Spatial Features Based on Generative Adversarial Networks for Face Anti-spoofing. In: Sun, Z., He, R., Feng, J., Shan, S., Guo, Z. (eds) Biometric Recognition. CCBR 2019. Lecture Notes in Computer Science(), vol 11818. Springer, Cham. https://doi.org/10.1007/978-3-030-31456-9_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-31456-9_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-31455-2
Online ISBN: 978-3-030-31456-9
eBook Packages: Computer ScienceComputer Science (R0)