Skip to main content

Anti-Spoofing in Face Recognition: Deep Learning and Image Quality Assessment-Based Approaches

  • Chapter
  • First Online:

Part of the book series: Unsupervised and Semi-Supervised Learning ((UNSESUL))

Abstract

Despite the fact that face recognition systems have improved significantly, the main concern of these systems remains its security against presentation attacks, so-called spoofing attacks. Therefore, it is important to develop techniques to automatically detect those attacks referred to as presentation attack detection (PAD) mechanisms. It is also important that these PAD mechanisms have to be seamlessly integrated into existing face recognition systems without harming the user experience. In this chapter, we address PAD in face recognition systems by proposing two fast and non-intrusive anti-spoofing methods. The first method is based on the combination of image quality measures (IQMs), while the second one is based on a multi-input architecture that combines a pre-trained CNN model and the local binary patterns (LBP) descriptor. Both approaches are extensively evaluated on different datasets. The obtained results outperformed state-of-the-art approaches. Moreover, our methods are well suited for real-time mobile applications and they are also privacy-compliant.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. A. Anjos, J. Komulainen, S. Marcel, A. Hadid, M. Pietikainen, in Face Anti-Spoofing: Visual Approach, ed. by S. Marcel, M. Nixon, S. Z. Li (Springer, London, 2014), pp. 65–82, Chapter 4

    Google Scholar 

  2. G. Pan, Z. Wu, L. Sun, Liveness detection for face recognition, in Recent advances in face recognition (IntechOpen, Rijeka, 2008), pp. 109–124

    Google Scholar 

  3. H. Jee, S. Jung, J. Yoo, Liveness detection for embedded face recognition system. Int. J. Comput. Electr., Autom., Control Inf. Eng. 2(6), 2142–2145 (2008)

    Google Scholar 

  4. K. Kollreider, H. Fronthaler, M.I. Faraj, J. Bigun, Real-time face detection and motion analysis with application in liveness assessment. IEEE Trans. Inf. Forensics Secur. 2(3), 548–558 (2007)

    Article  Google Scholar 

  5. K. Kollreider, H. Fronthaler, J. Bigun, Non-intrusive liveness detection by face images. Image Vision Comput. 27, 233 (2009)

    Article  Google Scholar 

  6. A. Anjos, S. Marcel, Counter-measures to photo attacks in face recognition: a public database and a baseline, in 2011 International Joint Conference on Biometrics (IJCB) (2011), pp. 1–7.

    Google Scholar 

  7. W. Bao, H. Li, N. Li, W. Jiang, A liveness detection method for face recognition based on optical flow field, in 2009 International Conference on Image Analysis and Signal Processing (IEEE, 2009), pp. 233–236.

    Google Scholar 

  8. A. Lagorio, M. Tistarelli, M. Cadoni, C. Fookes, S. Sridharan, Liveness detection based on 3d face shape analysis, in International Workshop on Biometrics and Forensics (IWBF) (IEEE, 2013), pp. 1–4.

    Google Scholar 

  9. T. Wang, J. Yang, Z. Lei, S. Liao, S. Z. Li, Face liveness detection using 3d structure recovered from a single camera, in International Conference on Biometrics (ICB) (IEEE, 2013), pp. 1–6

    Google Scholar 

  10. E.S. Ng, A.Y.S. Chia, Face verification using temporal affective cues, in IEEE International Conference on Pattern Recognition (ICPR) (IEEE, 2012), pp. 1249–1252

    Google Scholar 

  11. Z. Boulkenafet, J. Komulainen, A. Hadid, Face anti-spoofing based on color texture analysis, in IEEE International Conference on Image Processing (ICIP) (IEEE, 2015), pp. 2636–2640

    Google Scholar 

  12. T.de. Freitas Pereira, A. Anjos, J.M. De Martino, S. Marcel, Can face anti-spoofing countermeasures work in a real world scenario? in International Conference on Biometrics (ICB) (IEEE, 2013), pp. 1–8

    Google Scholar 

  13. J. Galbally, S. Marcel, J. Fierrez, Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans. Image Process. 23(2), 710–724 (2014)

    Article  MathSciNet  Google Scholar 

  14. A. Costa Pazo, S. Bhattacharjee, E. Vazquez Fernandez, S. Marcel, The replay-mobile face presentation-attack database, in International Conference of the Biometrics Special Interest Group (BIOSIG) (IEEE, 2016), pp. 1–7

    Google Scholar 

  15. L. Feng, L.M. Po, Y. Li, X. Xu, F. Yuan, T.C.H. Cheung, K.W. Cheung, Integration of image quality and motion cues for face anti-spoofing: a neural network approach. J. Visual Commun. Image Representation 38, 451–460 (2016). https://doi.org/10.1016/j.jvcir.2016.03.019

    Article  Google Scholar 

  16. O. Lucena, A. Junior, V. Hugo G Moia, R. Souza, E. Valle, R. De Alencar Lotufo, Transfer learning using convolutional neural networks for face anti-spoofing, in Image Analysis and Recognition. ICIAR 2017. Lecture Notes in Computer Science, ed. by F. Karray, A. Campilho, F. Cheriet, vol. 10317 (Springer, Cham, 2017).

    Google Scholar 

  17. R. Raghavendra, K.B. Raja, S. Venkatesh, C. Busch, Transferable deep-CNN features for detecting digital and print-scanned morphed face images, in IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (IEEE, 2017), pp. 1822–1830

    Google Scholar 

  18. Y.A. Ur Rehman, P. Lai Man, M. Liu, LiveNet: Improving features generalization for face liveness detection using convolution neural networks. Expert Syst. Appl. 108, 159 (2018). https://doi.org/10.1016/j.eswa.2018.05.004

    Article  Google Scholar 

  19. H.T. Cheng, Y.H. Chao, S.L. Yeh, C.S. Chen, H.M. Wang, Y.P. Hung, An efficient approach to multimodal person identity verification by fusing face and voice information, in IEEE International Conference on Multimedia and Expo (IEEE, 2005), pp. 542–545

    Google Scholar 

  20. J. Komulainen, I. Anina, J. Holappa, E. Boutellaa, A. Hadid, On the robustness of audiovisual liveness detection to visual speech animation, in IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS) (IEEE, 2016), pp. 1–8

    Google Scholar 

  21. A. Melnikov, R. Akhunzyanov, K. Oleg, E. Luckyanets, Audiovisual liveness detection, in Image Analysis and Processing—ICIAP 2015. ICIAP 2015. Lecture Notes in Computer Science, ed. by V. Murino, E. Puppo, vol. 9280 (Springer, Cham, 2015)

    Chapter  Google Scholar 

  22. P.H. Lee, L.J. Chu, Y.P. Hung, S.W. Shih, C.S. Chen, H.M. Wang, Cascading multimodal verification using face, voice and iris information, in IEEE International Conference on Multimedia and Expo (IEEE, 2007), pp. 847–850

    Google Scholar 

  23. T. Barbu, A. Ciobanu, M. Luca, Multimodal biometric authentication based on voice, face and iris, in E-Health and Bioengineering Conference (EHB) (IEEE, 2015), pp. 1–4

    Google Scholar 

  24. Y. Tian, S. Xiang, Detection of video-based face spoofing using LBP and multiscale DCT, in Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science, ed. by Y. Shi, H. Kim, F. Perez-Gonzalez, F. Liu, vol. 10082 (Springer, Cham, 2017)

    Chapter  Google Scholar 

  25. S. Bharadwaj, T. Dhamecha, M. Vatsa, R. Singh, Computationally efficient face spoofing detection with motion magnification, in IEEE Conference on Computer Vision and Pattern Recognition Workshops (IEEE, 2013). https://doi.org/10.1109/CVPRW.2013.23

  26. P. Viola, M. Jones, Rapid object detection using a boosted cascade of simple features, in Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), vol. 1 (IEEE, 2001), pp. I–511–I–518

    Google Scholar 

  27. Z. Akhtar, G. Luca Foresti, Face spoof attack recognition using discriminative image patches. J. Electr. Comput. Eng. 2016, 4721849-1–4721849-1 (2016)

    Google Scholar 

  28. A. Mittal, A.K. Moorthy, A.C. Bovik, BRISQUE software release (2011), http://live.ece.utexas.edu/research/quality/BRISQUE_release.zip

  29. A. Mittal, A.K. Moorthy, A.C. Bovik, No reference image quality assessment in the spatial domain. IEEE Trans. Image Process. 21(12), 4695–4708 (2012). https://doi.org/10.1109/TIP.2012.2214050

    Article  MathSciNet  MATH  Google Scholar 

  30. W. Xue, X. Mou, L. Zhang, Blind image quality prediction using joint statistics of gradient magnitude and Laplacian features. IEEE Trans. Image Process. 23(11), 4850–4862 (2014)

    Article  MathSciNet  Google Scholar 

  31. A.K. Moorthy, A.C. Bovik, A modular framework for constructing blind universal quality indices. IEEE Signal Process. Lett. 17, 513 (2009)

    Article  Google Scholar 

  32. A. K. Moorthy, A. C. Bovik, BIQI software release (2009), http://live.ece.utexas.edu/research/quality/biqi.zip

  33. A. Mittal, R. Soundararajan, A. C. Bovik, NIQE software release (2012), http://live.ece.utexas.edu/research/quality/niqe.zip

  34. A. Mittal, R. Soundararajan, A.C. Bovik, Making a completely blind image quality analyzer. IEEE Signal Process. Lett. 20, 209 (2012)

    Article  Google Scholar 

  35. A. Mittal, A.K. Moorthy, A.C. Bovik, Making image quality assessment robust, in Conference Record of the Asilomar Conference on Signals, Systems, and Computers, Monterey, CA (IEEE, 2012), pp. 1718–1722. http://live.ece.utexas.edu/research/quality/robustbrisque_release.zip

  36. D. Kundu, D. Ghadiyaram, A.C. Bovik, B.L. Evans, No-reference quality assessment of high dynamic range images, in 50th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 6-9 Nov 2016 (IEEE, 2016). http://users.ece.utexas.edu/~bevans/papers/2017/crowdsourced/index.html

  37. I. Chingovska, A. Anjos, S. Marcel, On the effectiveness of local binary patterns in face anti-spoofing, in International Conference of Biometrics Special Interest Group (BIOSIG) (IEEE, 2012), pp. 1–7

    Google Scholar 

  38. C.C. Chang, C.J. Lin, LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm

  39. K. Simonyan, A. Zisserman, Very deep convolutional networks for large-scale image recognition, in International Conference on Learning Representations (ICLR) (2015)

    Google Scholar 

  40. T. Ojala, M. Pietikainen, T. Maenpaa, Multiresolution grayscale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Int. 24(7), 971–987 (2002)

    Article  Google Scholar 

  41. T. Ahonen, A. Hadid, M. Pietikäinen, Face recognition with local binary patterns, in Computer Vision - ECCV 2004. ECCV 2004, Lecture Notes in Computer Science, ed. by T. Pajdla, J. Matas, vol. 3021 (Springer, Berlin, 2004), pp. 469–481

    Google Scholar 

  42. B. Amos, B. Ludwiczuk, M. Satyanarayanan, in OpenFace: a general-purpose face recognition library with mobile applications. CMUCS-16-118, Technical report (CMU School of Computer Science, 2016)

    Google Scholar 

  43. E.K. Davis, Dlib-ml: a machine learning toolkit. J. Mach. Learn. Res. 10, 1755–1758 (2009)

    Google Scholar 

  44. C. François (2015) Keras, https://keras.io/

  45. Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, S. Li, A face antispoofing database with diverse attacks, in 5th IAPR International Conference on Biometrics (ICB) (IEEE, 2012)

    Google Scholar 

  46. S.Y. Wang, S.H. Yang, Y.P. Chen, J.W. Huang, Face liveness detection based on skin blood flow analysis. Symmetry 9(12), 305 (2017). https://doi.org/10.3390/sym9120305

    Article  Google Scholar 

  47. I. Manjani, S. Tariyal, M. Vatsa, R. Singh, A. Majumdar, Detecting silicone mask based presentation attack via deep dictionary learning. IEEE Trans. Inf. Forensics Security 12(7), 1713–1723 (2017). https://doi.org/10.1109/TIFS.2017.2676720

    Article  Google Scholar 

  48. L. Li, X. Feng, Z. Boulkenafet, Z. Xia, M. Li, A. Hadid, An original face anti-spoofing approach using partial convolutional neural network, in 6th International Conference on In Image Processing Theory Tools and Applications (IPTA), Oulu, Finland (2016), pp. 1–6

    Google Scholar 

  49. M.B. López, A. Nieto, J. Boutellier, J. Hannuksela, O. Silvén, Evaluation of real-time LBP computing in multiple architectures. J Real-Time Image Process 13(2), 375–396 (2017)

    Article  Google Scholar 

  50. J. Johnson (2017), https://github.com/jcjohnson/cnn-benchmarks#vgg-paper

  51. P. Wang, J. Cheng, Accelerating convolutional neural networks for mobile applications, in 24th ACM International Conference on Multimedia (ACM, 2016), pp. 541–545

    Google Scholar 

  52. A.G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang, T. Weyand, M. Andreetto, H. Adam, MobileNets: efficient convolutional neural networks for mobile vision applications (2017). https://arxiv.org/pdf/1704.04861.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wael Elloumi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Elloumi, W., Chetouani, A., Charrada, T.B., Fourati, E. (2020). Anti-Spoofing in Face Recognition: Deep Learning and Image Quality Assessment-Based Approaches. In: Jiang, R., Li, CT., Crookes, D., Meng, W., Rosenberger, C. (eds) Deep Biometrics. Unsupervised and Semi-Supervised Learning. Springer, Cham. https://doi.org/10.1007/978-3-030-32583-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-32583-1_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-32582-4

  • Online ISBN: 978-3-030-32583-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics