Abstract
Despite the fact that face recognition systems have improved significantly, the main concern of these systems remains its security against presentation attacks, so-called spoofing attacks. Therefore, it is important to develop techniques to automatically detect those attacks referred to as presentation attack detection (PAD) mechanisms. It is also important that these PAD mechanisms have to be seamlessly integrated into existing face recognition systems without harming the user experience. In this chapter, we address PAD in face recognition systems by proposing two fast and non-intrusive anti-spoofing methods. The first method is based on the combination of image quality measures (IQMs), while the second one is based on a multi-input architecture that combines a pre-trained CNN model and the local binary patterns (LBP) descriptor. Both approaches are extensively evaluated on different datasets. The obtained results outperformed state-of-the-art approaches. Moreover, our methods are well suited for real-time mobile applications and they are also privacy-compliant.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
A. Anjos, J. Komulainen, S. Marcel, A. Hadid, M. Pietikainen, in Face Anti-Spoofing: Visual Approach, ed. by S. Marcel, M. Nixon, S. Z. Li (Springer, London, 2014), pp. 65–82, Chapter 4
G. Pan, Z. Wu, L. Sun, Liveness detection for face recognition, in Recent advances in face recognition (IntechOpen, Rijeka, 2008), pp. 109–124
H. Jee, S. Jung, J. Yoo, Liveness detection for embedded face recognition system. Int. J. Comput. Electr., Autom., Control Inf. Eng. 2(6), 2142–2145 (2008)
K. Kollreider, H. Fronthaler, M.I. Faraj, J. Bigun, Real-time face detection and motion analysis with application in liveness assessment. IEEE Trans. Inf. Forensics Secur. 2(3), 548–558 (2007)
K. Kollreider, H. Fronthaler, J. Bigun, Non-intrusive liveness detection by face images. Image Vision Comput. 27, 233 (2009)
A. Anjos, S. Marcel, Counter-measures to photo attacks in face recognition: a public database and a baseline, in 2011 International Joint Conference on Biometrics (IJCB) (2011), pp. 1–7.
W. Bao, H. Li, N. Li, W. Jiang, A liveness detection method for face recognition based on optical flow field, in 2009 International Conference on Image Analysis and Signal Processing (IEEE, 2009), pp. 233–236.
A. Lagorio, M. Tistarelli, M. Cadoni, C. Fookes, S. Sridharan, Liveness detection based on 3d face shape analysis, in International Workshop on Biometrics and Forensics (IWBF) (IEEE, 2013), pp. 1–4.
T. Wang, J. Yang, Z. Lei, S. Liao, S. Z. Li, Face liveness detection using 3d structure recovered from a single camera, in International Conference on Biometrics (ICB) (IEEE, 2013), pp. 1–6
E.S. Ng, A.Y.S. Chia, Face verification using temporal affective cues, in IEEE International Conference on Pattern Recognition (ICPR) (IEEE, 2012), pp. 1249–1252
Z. Boulkenafet, J. Komulainen, A. Hadid, Face anti-spoofing based on color texture analysis, in IEEE International Conference on Image Processing (ICIP) (IEEE, 2015), pp. 2636–2640
T.de. Freitas Pereira, A. Anjos, J.M. De Martino, S. Marcel, Can face anti-spoofing countermeasures work in a real world scenario? in International Conference on Biometrics (ICB) (IEEE, 2013), pp. 1–8
J. Galbally, S. Marcel, J. Fierrez, Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans. Image Process. 23(2), 710–724 (2014)
A. Costa Pazo, S. Bhattacharjee, E. Vazquez Fernandez, S. Marcel, The replay-mobile face presentation-attack database, in International Conference of the Biometrics Special Interest Group (BIOSIG) (IEEE, 2016), pp. 1–7
L. Feng, L.M. Po, Y. Li, X. Xu, F. Yuan, T.C.H. Cheung, K.W. Cheung, Integration of image quality and motion cues for face anti-spoofing: a neural network approach. J. Visual Commun. Image Representation 38, 451–460 (2016). https://doi.org/10.1016/j.jvcir.2016.03.019
O. Lucena, A. Junior, V. Hugo G Moia, R. Souza, E. Valle, R. De Alencar Lotufo, Transfer learning using convolutional neural networks for face anti-spoofing, in Image Analysis and Recognition. ICIAR 2017. Lecture Notes in Computer Science, ed. by F. Karray, A. Campilho, F. Cheriet, vol. 10317 (Springer, Cham, 2017).
R. Raghavendra, K.B. Raja, S. Venkatesh, C. Busch, Transferable deep-CNN features for detecting digital and print-scanned morphed face images, in IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (IEEE, 2017), pp. 1822–1830
Y.A. Ur Rehman, P. Lai Man, M. Liu, LiveNet: Improving features generalization for face liveness detection using convolution neural networks. Expert Syst. Appl. 108, 159 (2018). https://doi.org/10.1016/j.eswa.2018.05.004
H.T. Cheng, Y.H. Chao, S.L. Yeh, C.S. Chen, H.M. Wang, Y.P. Hung, An efficient approach to multimodal person identity verification by fusing face and voice information, in IEEE International Conference on Multimedia and Expo (IEEE, 2005), pp. 542–545
J. Komulainen, I. Anina, J. Holappa, E. Boutellaa, A. Hadid, On the robustness of audiovisual liveness detection to visual speech animation, in IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS) (IEEE, 2016), pp. 1–8
A. Melnikov, R. Akhunzyanov, K. Oleg, E. Luckyanets, Audiovisual liveness detection, in Image Analysis and Processing—ICIAP 2015. ICIAP 2015. Lecture Notes in Computer Science, ed. by V. Murino, E. Puppo, vol. 9280 (Springer, Cham, 2015)
P.H. Lee, L.J. Chu, Y.P. Hung, S.W. Shih, C.S. Chen, H.M. Wang, Cascading multimodal verification using face, voice and iris information, in IEEE International Conference on Multimedia and Expo (IEEE, 2007), pp. 847–850
T. Barbu, A. Ciobanu, M. Luca, Multimodal biometric authentication based on voice, face and iris, in E-Health and Bioengineering Conference (EHB) (IEEE, 2015), pp. 1–4
Y. Tian, S. Xiang, Detection of video-based face spoofing using LBP and multiscale DCT, in Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science, ed. by Y. Shi, H. Kim, F. Perez-Gonzalez, F. Liu, vol. 10082 (Springer, Cham, 2017)
S. Bharadwaj, T. Dhamecha, M. Vatsa, R. Singh, Computationally efficient face spoofing detection with motion magnification, in IEEE Conference on Computer Vision and Pattern Recognition Workshops (IEEE, 2013). https://doi.org/10.1109/CVPRW.2013.23
P. Viola, M. Jones, Rapid object detection using a boosted cascade of simple features, in Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), vol. 1 (IEEE, 2001), pp. I–511–I–518
Z. Akhtar, G. Luca Foresti, Face spoof attack recognition using discriminative image patches. J. Electr. Comput. Eng. 2016, 4721849-1–4721849-1 (2016)
A. Mittal, A.K. Moorthy, A.C. Bovik, BRISQUE software release (2011), http://live.ece.utexas.edu/research/quality/BRISQUE_release.zip
A. Mittal, A.K. Moorthy, A.C. Bovik, No reference image quality assessment in the spatial domain. IEEE Trans. Image Process. 21(12), 4695–4708 (2012). https://doi.org/10.1109/TIP.2012.2214050
W. Xue, X. Mou, L. Zhang, Blind image quality prediction using joint statistics of gradient magnitude and Laplacian features. IEEE Trans. Image Process. 23(11), 4850–4862 (2014)
A.K. Moorthy, A.C. Bovik, A modular framework for constructing blind universal quality indices. IEEE Signal Process. Lett. 17, 513 (2009)
A. K. Moorthy, A. C. Bovik, BIQI software release (2009), http://live.ece.utexas.edu/research/quality/biqi.zip
A. Mittal, R. Soundararajan, A. C. Bovik, NIQE software release (2012), http://live.ece.utexas.edu/research/quality/niqe.zip
A. Mittal, R. Soundararajan, A.C. Bovik, Making a completely blind image quality analyzer. IEEE Signal Process. Lett. 20, 209 (2012)
A. Mittal, A.K. Moorthy, A.C. Bovik, Making image quality assessment robust, in Conference Record of the Asilomar Conference on Signals, Systems, and Computers, Monterey, CA (IEEE, 2012), pp. 1718–1722. http://live.ece.utexas.edu/research/quality/robustbrisque_release.zip
D. Kundu, D. Ghadiyaram, A.C. Bovik, B.L. Evans, No-reference quality assessment of high dynamic range images, in 50th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 6-9 Nov 2016 (IEEE, 2016). http://users.ece.utexas.edu/~bevans/papers/2017/crowdsourced/index.html
I. Chingovska, A. Anjos, S. Marcel, On the effectiveness of local binary patterns in face anti-spoofing, in International Conference of Biometrics Special Interest Group (BIOSIG) (IEEE, 2012), pp. 1–7
C.C. Chang, C.J. Lin, LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm
K. Simonyan, A. Zisserman, Very deep convolutional networks for large-scale image recognition, in International Conference on Learning Representations (ICLR) (2015)
T. Ojala, M. Pietikainen, T. Maenpaa, Multiresolution grayscale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Int. 24(7), 971–987 (2002)
T. Ahonen, A. Hadid, M. Pietikäinen, Face recognition with local binary patterns, in Computer Vision - ECCV 2004. ECCV 2004, Lecture Notes in Computer Science, ed. by T. Pajdla, J. Matas, vol. 3021 (Springer, Berlin, 2004), pp. 469–481
B. Amos, B. Ludwiczuk, M. Satyanarayanan, in OpenFace: a general-purpose face recognition library with mobile applications. CMUCS-16-118, Technical report (CMU School of Computer Science, 2016)
E.K. Davis, Dlib-ml: a machine learning toolkit. J. Mach. Learn. Res. 10, 1755–1758 (2009)
C. François (2015) Keras, https://keras.io/
Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, S. Li, A face antispoofing database with diverse attacks, in 5th IAPR International Conference on Biometrics (ICB) (IEEE, 2012)
S.Y. Wang, S.H. Yang, Y.P. Chen, J.W. Huang, Face liveness detection based on skin blood flow analysis. Symmetry 9(12), 305 (2017). https://doi.org/10.3390/sym9120305
I. Manjani, S. Tariyal, M. Vatsa, R. Singh, A. Majumdar, Detecting silicone mask based presentation attack via deep dictionary learning. IEEE Trans. Inf. Forensics Security 12(7), 1713–1723 (2017). https://doi.org/10.1109/TIFS.2017.2676720
L. Li, X. Feng, Z. Boulkenafet, Z. Xia, M. Li, A. Hadid, An original face anti-spoofing approach using partial convolutional neural network, in 6th International Conference on In Image Processing Theory Tools and Applications (IPTA), Oulu, Finland (2016), pp. 1–6
M.B. López, A. Nieto, J. Boutellier, J. Hannuksela, O. Silvén, Evaluation of real-time LBP computing in multiple architectures. J Real-Time Image Process 13(2), 375–396 (2017)
J. Johnson (2017), https://github.com/jcjohnson/cnn-benchmarks#vgg-paper
P. Wang, J. Cheng, Accelerating convolutional neural networks for mobile applications, in 24th ACM International Conference on Multimedia (ACM, 2016), pp. 541–545
A.G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang, T. Weyand, M. Andreetto, H. Adam, MobileNets: efficient convolutional neural networks for mobile vision applications (2017). https://arxiv.org/pdf/1704.04861.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Elloumi, W., Chetouani, A., Charrada, T.B., Fourati, E. (2020). Anti-Spoofing in Face Recognition: Deep Learning and Image Quality Assessment-Based Approaches. In: Jiang, R., Li, CT., Crookes, D., Meng, W., Rosenberger, C. (eds) Deep Biometrics. Unsupervised and Semi-Supervised Learning. Springer, Cham. https://doi.org/10.1007/978-3-030-32583-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-32583-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-32582-4
Online ISBN: 978-3-030-32583-1
eBook Packages: EngineeringEngineering (R0)