Abstract
Facial biometrics tend to be spontaneous, instinctive and less human intrusive. It is regularly employed in the authentication of authorized users and personnel to protect data from violation attacks. A face spoofing attack usually comprises the illegal attempt to access valuable undisclosed information as a trespasser attempts to impersonate an individual holding desirable authentication clearance. In search of such violations, many investigators have devoted their efforts to studying either visual liveness detection or patterns generated during media recapture as predominant indicators to block spoofing violations. This work contemplates low-power devices through the aggregation of Fourier transforms, different classification methods and handcrafted descriptors to estimate whether face samples correspond to falsification attacks. To the best of our knowledge, the proposed method consists of low computational cost and is one of the few methods associating features derived from both spatial and frequency image domains. We conduct experiments on recent and well-known datasets under same and cross-database settings with artificial neural networks, support vector machines and partial least squares ensembles. Results show that although our methodology is geared for resource-limited single-board computers, it can produce significant results, outperforming state-of-the-art approaches.
Similar content being viewed by others
Notes
Prices taken from BestBuy Retail store, and official Raspberry Pi and Nvidia resellers in July 2020.
References
Bhattacharjee S, Mohammadi A, Marcel S (2018) Spoofing deep face recognition with custom silicone masks. In: Conference on biometrics: theory applications and systems. IEEE, New York
Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche S, Ouafi A et al (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: International joint conference on biometrics. IEEE, New York, pp 688–696
Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: International conference on image processing. IEEE, New York, pp 2636–2640
Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. Trans Inf Forensics Secur 11(8):1818–1830
Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) Oulu-NPU: a mobile face presentation attack database with real-world variations. In: International conference on automatic face & gesture recognition. IEEE, New York
Breiman L (1996) Bagging predictors. Mach Learn 24(2):123–140
Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: International conference of biometrics special interest group, EPFL-CONF-192369
Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: Conference on computer vision and pattern recognition, vol 1. IEEE, New York, pp 886–893
Efitorov A, Dolenko S, Dolenko T, Laptinskiy K, Burikov S (2019) Use of wavelet neural networks to solve inverse problems in spectroscopy of multi-component solutions. In: International conference on neuroinformatics. Springer, London, pp 285–294
Feng L, Po LM, Li Y, Xu X, Yuan F, Cheung TCH, Cheung KW (2016) Integration of image quality and motion cues for face anti-spoofing: a neural network approach. J Vis Commun Image Represent 38:451–460
Garcia DC, de Queiroz RL (2015) Face-spoofing 2D-detection based on moiré-pattern analysis. Trans Inf Forensics Secur 10(4):778–786
Gardner MW, Dorling S (1998) Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences. Atmos Environ 32(14–15):2627–2636
Goutte C, Gaussier E (2005) A probabilistic interpretation of precision, recall and f-score, with implication for evaluation. In: European conference on information retrieval. Springer, London, pp 345–359
Haralick RM, Shanmugam K, Dinstein IH (1973) Textural features for image classification. Trans Syst Man Cybern 6:610–621
Information Technology-biometric Presentation Attack Detection—Part 1: Framework (2016) International Organization for Standardization. Technical report, ISO/IEC JTC 1/SC 37 Biometrics
Ilin R, Kozma R, Werbos PJ (2008) Beyond feedforward models trained by backpropagation: a practical training tool for a more efficient universal approximator. IEEE Trans Neural Netw 19(6):929–937
Kumar S, Singh S, Kumar J (2017) A comparative study on face spoofing attacks. In: International conference on computing, communication and automation. IEEE, New York, pp 1104–1108
Li L, Feng X, Boulkenafet Z, Xia Z, Li M, Hadid A (2016) An original face anti-spoofing approach using partial convolutional neural network. In: International conference on image processing theory, tools and applications. IEEE, New York, pp 1–6
Liu S, Yang B, Yuen PC, Zhao G (2016) A 3D mask face anti-spoofing database with real world variations. In: Conference on computer vision and pattern recognition workshop
Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: Conference on computer vision and pattern recognition, pp 389–398
Määttä J, Hadid A, Pietikäinen M (2011) Face spoofing detection from single images using micro-texture analysis. In: International joint conference on biometrics. IEEE, New York, pp 1–7
Manjani I, Tariyal S, Vatsa M, Singh R, Majumdar A (2017) Detecting silicone mask-based presentation attack via deep dictionary learning. Trans Inf Forensics Secur 12(7):1
Menotti D, Chiachia G, Pinto A, Schwartz WR, Pedrini H, Falcao AX, Rocha A (2015) Deep representations for iris, face, and fingerprint spoofing detection. Trans Inf Forensics Secur 10(4):864–879
Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. Trans Pattern Anal Mach Intell 24(7):971–987
Pereira T, Anjos A, Martino JM, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: International conference on biometrics. IEEE, New York, pp 1–8
Pinto A, Pedrini H, Schwartz WR, Rocha A (2015) Face spoofing detection through visual codebooks of spectral temporal cubes. Trans Image Process 24(12):4726–4740
Pinto A, Schwartz WR, Pedrini H, de Rezende Rocha A (2015) Using visual rhythms for detecting video-based facial spoof attacks. Trans Inf Forensics Secur 10(5):1025–1038
Plataniotis KN, Venetsanopoulos AN (2013) Color image processing and applications. Springer, London
Rosipal R, Krämer N (2005) Overview and recent advances in partial least squares. In: International statistical and optimization perspectives workshop. Springer, London, pp 34–51
Schwartz WR, Rocha A, Pedrini H (2011) Face spoofing detection through partial least squares and low-level descriptors. In: International joint conference on biometrics. IEEE, New York, pp 1–8
Siddiqui TA, Bharadwaj S, Dhamecha TI, Agarwal A, Vatsa M, Singh R, Ratha N (2016) Face anti-spoofing with multifeature videolet aggregation. In: International conference on pattern recognition. IEEE, New York, pp 1035–1040
Steinwart I, Christmann A (2008) Support vector machines. Springer, London
Valle E, Lotufo R (2017) Transfer learning using convolutional neural networks for face anti-spoofing. In: International conference image analysis and recognition, vol 10317. Springer, London, p 27
Vareto RH, Diniz MA, Schwartz WR (2019) Face spoofing detection on low-power devices using embeddings with spatial and frequency-based descriptors. In: Iberoamerican congress on pattern recognition. Springer, London, pp 187–197
Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. Trans Inf Forensics Secur 10(4):746–761
Xiong Q, Liang YC, Li KH, Gong Y (2015) An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems. Trans Inf Forensics Secur 10(5):1
Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: International conference on biometrics. IEEE, New York, pp 26–31
Acknowledgements
The authors would like to thank the National Council for Scientific and Technological Development—CNPq (Grants 438629/2018-3 and 309953/2019-7), the Minas Gerais Research Foundation—FAPEMIG (Grants APQ-00567-14 and PPM-00540-17) and the Coordination for the Improvement of Higher Education Personnel—CAPES (DeepEyes Project).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Vareto, R.H., Schwartz, W.R. Face spoofing detection via ensemble of classifiers toward low-power devices. Pattern Anal Applic 24, 511–521 (2021). https://doi.org/10.1007/s10044-020-00937-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10044-020-00937-x