Abstract
In cloud services and Internet-of-Things (IoT) applications, the cybersecurity in video transmission technologies has drawn much attention in recent researches due to the rapid growth of cyber-risks on both individuals and institutions. Unfortunately, the spoofing attack, a kind of cyber-risk, has increased the number of cyber-criminals in data transfer applications without being detected, especially in smart cities. Several applications based on online video communications, such as online testing and video conferences, are involved in smart cities. The video displays various variations of a person, which makes face recognition an important concept in security implementation. The face spoofing attacks are mainly based on the person's face replication by replaying a video or by printed photos. Therefore, video forgery detection and related spoof attack detection have become a new topic in cybersecurity research. From this perspective, this paper presents a deep learning approach for video face forensic detection with a cyber facial spoofing attack using two methodologies. The first methodology is based on a convolutional neural network (CNN) to extract features from the input video frames. The model has five convolutional layers followed by five pooling layers. The second methodology is based on convolutional long short-term memory (ConvLSTM). This model comprises two pooling layers, two convolutional layers, and a convolutional LSTM layer. Each methodology includes a fully-connected layer to interconnect between the feature map resulting from the feature extraction process and the classification layer. A SoftMax layer performs the classification task in each method. This paper aims to achieve an optimum modality for face forensic detection to overcome spoofing attacks. Simulation results reveal that the ConvLSTM with CNN methodology achieves better classification results as the extracted features are more comprehensive than those of other conventional approaches. Also, it achieves an accuracy of 99%, and the works presented in the literature achieve an accuracy levels up to 95%.
Similar content being viewed by others
References
Scarfò, A. (2018). The cyber security challenges in the IoT era. In: Security and resilience in intelligent data-centric systems and communication networks. Academic Press, 53–76
Xiao B, Wei Y, Bi X, Li W, Ma J (2020) Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering. Inf Sci 511:172–191
Fadl, S., Megahed, A., Han, Q., & Qiong, L. (2020). Frame duplication and shuffling forgery detection technique in surveillance videos based on temporal average and gray level co-occurrence matrix. Multimed Tools Appl 1–25
Li L, Correia PL, Hadid A (2018) Face recognition under spoofing attacks: countermeasures and research directions. IET Biometrics 7(1):3–14
Kaiiali M, Ozkaya A, Altun H, Haddad H, Alier M (2016) Designing a secure exam management system (SEMS) for M-learning environments. IEEE Trans Learn Technol 9(3):258–271
Arashloo SR, Kittler J, Christmas W (2017) An anomaly detection approach to face spoofing detection: a new formulation and evaluation protocol. IEEE Access 5:13868–13882
Mohan K, Chandrasekhar P, Jilani SAK (2017) A combined histogram of oriented gradient-local phase quantization (HOG-LPQ) with fuzzy-support vector machine (Fuz-SVM) classifier for object face liveness detection. In: 2017 International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (pp. 531–537). IEEE
Faseela T, Jayasree M (2016) Spoof face recognition in video using KSVM. Proc Technol 24:1285–1291
Li L, Feng X, Boulkenafet Z, Xia Z, Li M, Hadid A (2016) An original face anti-spoofing approach using partial convolutional neural network. In: 2016 Sixth international conference on image processing theory, tools and applications (IPTA) (pp. 1–6). IEEE
Fourati E, Elloumi W, Chetouani A (2020) Anti-spoofing in face recognition-based biometric authentication using image quality assessment. Multimed Tools Appl 79(1–2):865–889
Katika BR, Karthik K (2020) Face anti-spoofing by identity masking using random walk patterns and outlier detection. Pattern Anal Appl. https://doi.org/10.1007/s10044-020-00875-8
Elloumi W, Chetouani A, Charrada TB, Fourati E (2020) Anti-spoofing in face recognition: deep learning and image quality assessment-based approaches. In: Jiang R, Li C-T, Crookes D, Meng W, Rosenberger C (eds) Deep biometrics. Springer, Cham, pp 51–69
Anjos A, & Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: 2011 international joint conference on Biometrics (IJCB) (pp. 1–7). IEEE
Galbally J, Marcel S, Fierrez J (2013) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724
Erdogmus N, Marcel S (2014) Spoofing face recognition with 3D masks. IEEE Trans Inf Forensics Secur 9(7):1084–1097
Patel K, Han H, Jain AK (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268–2283
Liu S, Yang B, Yuen PC, Zhao G (2016) A 3D mask face anti-spoofing database with real world variations. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops (pp. 100–106).
Feng L, Po LM, Li Y, Xu X, Yuan F, Cheung TCH, Cheung KW (2016) Integration of image quality and motion cues for face anti-spoofing: a neural network approach. J Vis Commun Image Represent 38:451–460
Lucena O, Junior A, Moia V, Souza R, Valle E, Lotufo R (2017) Transfer learning using convolutional neural networks for face anti-spoofing. In: International conference image analysis and recognition. (pp. 27–34). Springer, Cham
George A, Mostaani Z, Geissenbuhler D, Nikisins O, Anjos A, Marcel S (2019) Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE Trans Inf Forensics Secur 15:42–55
Tolosana R, Gomez-Barrero M, Busch C, Ortega-Garcia J (2019) Biometric presentation attack detection: beyond the visible spectrum. IEEE Trans Inf Forensics Secur 15:1261–1275
Scherhag U, Rathgeb C, Merkle J, Breithaupt R, Busch C (2019) Face recognition systems under morphing attacks: a survey. IEEE Access 7:23012–23026
Liu A, Wan J, Escalera S, Jair Escalante H, Tan Z, Yuan Q, Li SZ (2019). Multi-modal face anti-spoofing attack detection challenge at cvpr2019. In Proceedings of the IEEE Conference on computer vision and pattern recognition workshops (pp. 0–0).
Tolosana R, Vera-Rodriguez R, Fierrez J, Morales A, Ortega-Garcia J (2020) Deepfakes and beyond: a survey of face manipulation and fake detection. arXiv preprint http://arxiv.org/abs/2001.00179
Liu YC, Bianchin G, Pasqualetti F (2020) Secure trajectory planning against undetectable spoofing attacks. Automatica 112:108655
Mahmoud AA, El-Shafai W, Taha TE, El-Rabaie ESM, Zahran O, El-Fishawy AS, Abd El-Samie FE (2020) A statistical framework for breast tumor classification from ultrasonic images. Multimed Tools Appl 80:5977
Whittington JC, Bogacz R (2019) Theories of error back-propagation in the brain. Trends Cognit Sci. https://doi.org/10.1016/j.tics.2018.12.005
El-Gindy SAE, Hamad A, El-Shafai W, Khalaf AA, El-Dolil SM, Taha TE, Abd El-Samie FE (2021) Efficient communication and EEG signal classification in wavelet domain for epilepsy patients. J Ambient Intell Humaniz Comput 22:1–16
Labati RD, Muñoz E, Piuri V, Sassi R, Scotti F (2019) Deep-ECG: convolutional neural networks for ECG biometric recognition. Pattern Recogn Lett 126:78–85
Shan W, Yi Y, Huang R, Xie Y (2019) Robust contrast enhancement forensics based on convolutional neural networks. Signal Process Image Commun 71:138–146
El-Hag NA, Sedik A, El-Shafai W, El-Hoseny HM, Khalaf AA, El-Fishawy AS, El-Banby GM (2020) Classification of retinal images based on convolutional neural network. Microsc Res Tech 84:394
Xu Q, Zhang M, Gu Z, Pan G (2019) Overfitting remedy by sparsifying regularization on fully-connected layers of CNNs. Neurocomputing 328:69–74
Bappy JH, Simons C, Nataraj L, Manjunath BS, Roy-Chowdhury AK (2019) Hybrid lstm and encoder–decoder architecture for detection of image forgeries. IEEE Trans Image Process 28(7):3286–3300
Sutskever, I., Vinyals, O., & Le, Q. V. (2014). Sequence to sequence learning with neural networks. Adv Neural Inf Process Syst pp 3104–3112
Bhunia AK, Konwer A, Bhunia AK, Bhowmick A, Roy PP, Pal U (2019) Script identification in natural scene image and video frames using an attention based convolutional-LSTM network. Pattern Recogn 85:172–184
Bock S, Weiß M (2019) A proof of local convergence for the Adam optimizer. In: 2019 International Joint Conference On Neural Networks (IJCNN) (pp. 1–8). IEEE.
Smith DF, Wiliem A, Lovell BC (2015) Face recognition on consumer devices: reflections on replay attacks. IEEE Trans Inf Forensics Secur 10(4):736–745
Chui KT, Tsang KF, Chi HR, Ling BWK, Wu CK (2016) An accurate ECG-based transportation safety drowsiness detection scheme. IEEE Trans Ind Inf 12(4):1438–1452
Acknowledgements
This work was supported by the Deanship of Scientific Research, Taif University Researchers Supporting Project number (TURSP-2020/08), Taif University, Taif, Saudi Arabia.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sedik, A., Faragallah, O.S., El-sayed, H.S. et al. An efficient cybersecurity framework for facial video forensics detection based on multimodal deep learning. Neural Comput & Applic 34, 1251–1268 (2022). https://doi.org/10.1007/s00521-021-06416-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-021-06416-6