Skip to main content

Face Anti-spoofing Based on Cooperative Pose Analysis

  • Conference paper
  • First Online:
  • 2138 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 13021))

Abstract

Face anti-spoofing has been vital to preventing face recognition systems from fake faces. However, most state-of-the-art passive methods treat face anti-spoofing as a classification problem, relying on purposive databases and well-designed backend algorithms. In this paper, we propose a novel active face anti-spoofing framework named Cooperative Pose Analysis (CPA), in which a higher cooperation degree is required in the manner of head pose changes. And we propose a new pose representation named Pose Aware Quadrilateral (PAQ), which is sensitive to pose changes of living faces and easy to identify spoof faces such as printed and twisted photographs. The proposed PAQ is easily accessed by utilizing a lightweight projective Spatial Transformer Network [11]. The whole system does not require much computational or storage resources and is easy to deploy and use. Experiments on both datasets and human subjects are conducted and indicate the effectiveness of our work.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Atoum, Y., et al.: Face anti-spoofing using patch and depth-based CNNs. In: IJCB, pp. 319–328 (2017)

    Google Scholar 

  2. Boulkenafet, Z., et al.: Face spoofing detection using colour texture analysis. IEEE Trans. Inf. Forensics Secur. 11(8), 1818–1830 (2016)

    Article  Google Scholar 

  3. Boulkenafet, Z., et al.: Face anti-spoofing based on color texture analysis. In: ICIP, pp. 2636–2640 (2015)

    Google Scholar 

  4. Boulkenafet, Z., et al.: Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Process. Lett. 24(2), 141–145 (2016)

    Google Scholar 

  5. Boulkenafet, Z., et al.: OULU-NPU: a mobile face presentation attack database with real-world variations. In: FG, pp. 612–618 (2017)

    Google Scholar 

  6. Busch, C.: Standards for biometric presentation attack detection. In: Marcel, S., Nixon, M., Fierrez, J., Evans, N. (eds.) Handbook of Biometric Anti-Spoofing, pp. 503–514. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-92627-8_22

    Chapter  Google Scholar 

  7. Chingovska, I., et al.: On the effectiveness of local binary patterns in face anti-spoofing. In: BIOSIG, pp. 1–7 (2012)

    Google Scholar 

  8. de Freitas Pereira, T., Anjos, A., De Martino, J.M., Marcel, S.: LBPTOP based countermeasure against face spoofing attacks. In: Park, J.-I., Kim, J. (eds.) ACCV 2012. LNCS, vol. 7728, pp. 121–132. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37410-4_11

    Chapter  Google Scholar 

  9. de Freitas Pereira, T., et al.: Can face anti-spoofing countermeasures work in a real world scenario? In: ICB, pp. 1–8 (2013)

    Google Scholar 

  10. Gan, J., et al.: 3D convolutional neural network based on face anti-spoofing. In: ICMIP, pp. 1–5 (2017)

    Google Scholar 

  11. Jaderberg, M., et al.: Spatial transformer networks. In: NIPS 28, pp. 2017–2025 (2015)

    Google Scholar 

  12. Kollreider, K., et al.: Real-time face detection and motion analysis with application in “liveness’’ assessment. IEEE Trans. Inf. Forensics Secur. 2(3), 548–558 (2007)

    Article  Google Scholar 

  13. Komulainen, J., et al.: Context based face anti-spoofing. In: BTAS, pp. 1–8 (2013)

    Google Scholar 

  14. Li, L., et al.: An original face anti-spoofing approach using partial convolutional neural network. In: IPTA, pp. 1–6 (2016)

    Google Scholar 

  15. Liu, S., Yuen, P.C., Zhang, S., Zhao, G.: 3D mask face anti-spoofing with remote photoplethysmography. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9911, pp. 85–100. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46478-7_6

    Chapter  Google Scholar 

  16. Liu, Y., et al.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: CVPR, pp. 389–398 (2018)

    Google Scholar 

  17. Maaten, L.V.D., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9, 2579–2605 (2008)

    Google Scholar 

  18. Maksymenko, S.: Anti-spoofing techniques for face recognition solutions. [EB/OL] (2020)

    Google Scholar 

  19. Nowara, E.M., et al.: PPGSecure: biometric presentation attack detection using photopletysmograms. In: FG, pp. 56–62 (2017)

    Google Scholar 

  20. Nyheter: Face anti-spoofing methods in face recognition systems. [EB/OL] (2019)

    Google Scholar 

  21. Pan, G., et al.: Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: ICCV, pp. 1–8 (2007)

    Google Scholar 

  22. Patel, K., Han, H., Jain, A.K.: Cross-database face antispoofing with robust feature representation. In: You, Z., Zhou, J., Wang, Y., Sun, Z., Shan, S., Zheng, W., Feng, J., Zhao, Q. (eds.) CCBR 2016. LNCS, vol. 9967, pp. 611–619. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46654-5_67

    Chapter  Google Scholar 

  23. Patel, K., et al.: Secure face unlock: spoof detection on smartphones. IEEE Trans. Inf. Forensics Secur. 11(10), 2268–2283 (2016)

    Article  Google Scholar 

  24. Shao, R., et al.: Deep convolutional dynamic texture learning with adaptive channel-discriminability for 3d mask face anti-spoofing. In: IJCB, pp. 748–755 (2017)

    Google Scholar 

  25. Tan, X., Li, Y., Liu, J., Jiang, L.: Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010. LNCS, vol. 6316, pp. 504–517. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15567-3_37

    Chapter  Google Scholar 

  26. Wang, Z., et al.: Deep spatial gradient and temporal depth learning for face anti-spoofing. In: CVPR, pp. 5042–5051 (2020)

    Google Scholar 

  27. Wen, D., et al.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746–761 (2015)

    Article  Google Scholar 

  28. Wolf, L., et al.: Face recognition in unconstrained videos with matched background similarity. In: CVPR 2011, pp. 529–534 (2011)

    Google Scholar 

  29. Yang, X., et al.: Face anti-spoofing: model matters, so does data. In: CVPR, pp. 3507–3516 (2019)

    Google Scholar 

  30. Yi, D., et al.: Learning face representation from scratch. arXiv preprint arXiv:1411.7923 (2014)

  31. Zhang, S., et al.: Faceboxes: a CPU real-time face detector with high accuracy. In: IJCB, pp. 1–9 (2017)

    Google Scholar 

  32. Zhong, Y., et al.: Toward end-to-end face recognition through alignment learning. IEEE Signal Process. Lett. 24(8), 1213–1217 (2017)

    Article  Google Scholar 

Download references

Acknowledgement

This work is supported by the National Natural Science Foundation of China (No. 61673234, No. U20B2062), and Beijing Science and Technology Planning Project (No. Z191100007419001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiansheng Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lin, P., Wang, X., Chen, J., Ma, H., Ma, H. (2021). Face Anti-spoofing Based on Cooperative Pose Analysis. In: Ma, H., et al. Pattern Recognition and Computer Vision. PRCV 2021. Lecture Notes in Computer Science(), vol 13021. Springer, Cham. https://doi.org/10.1007/978-3-030-88010-1_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-88010-1_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-88009-5

  • Online ISBN: 978-3-030-88010-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics