Abstract
Aiming to counter presentation attack (also known as spoofing attack) in face recognition system, a face presentation attack detection (also known as spoofing detection or liveness detection) scheme based on guided scale texture is proposed. In order to minimize the influence of the redundant noise contamination, guided scale space is proposed to reduce the redundancy of the original facial texture and to extract more powerful facial edges. Based on the guided scale space, two guided scale texture descriptors are proposed to extract liveness detection features, and they are guided scale based local binary pattern (GS-LBP) and local guided binary pattern (LGBP). GS-LBP takes advantage of the edge-preserving property of the guided scale space, and joint quantization is used in LGBP to encode the neighboring relationships of the original face and the guided scale face without using additional features. With the guided scale texture features, presentation attack detection is accomplished by the use of a linear support vector machine classifier. Experiments are done with public MSU MFSD, CASIA FASD, Replay-Attack and Replay-Mobile databases, and the results indicate its effectiveness. The proposed method can effectively be applied for countering photo attack and video attack in face recognition systems.














Similar content being viewed by others
References
Alotaibi, A., Mahmood, A. (2016) Deep face liveness detection based on nonlinear diffusion using convolution neural network. SIViP, in press, doi: 10.1007/s11760-016-1014-2
Anjos A, Chakka MM, Marcel S (2014) Motion-based counter-measures to photo attacks in face recognition. IET Biom 3(3):147–158
Arashloo SR, Kittler J, Christmas W (2015) Face spoofing detection based on multiple descriptor fusion using multiscale dynamic binarized statistical image features. IEEE Trans Inf Forensics Secur 10(11):2396–2407
Bharadwaj S, Dhamecha TI, Vatsa M, Singh R (2014) Face anti-spoofing via motion magnification and multifeature videolet aggregation. IIITD-TR-2014-002.
Biggio B, Fumera G, Marcialis GL, Roli F (2017) Statistical meta-analysis of presentation attacks for secure Multibiometric systems. IEEE Trans Pattern Anal Mach Intell 39(3):561–575
Blasco J, Chen TM, Tapiador J, Peris-Lopez P (2016) A survey of wearable biometric recognition systems. ACM Comput Surv 49(3):43
Boulkenafet Z, Komulainen J, Hadid A. (2015) Face anti-spoofing based on color texture analysis. In: IEEE international conference on image processing (ICIP), pp. 2636–2640
Boulkenafet, Z., Komulainen, J., Feng, X., Hadid, A. (2016) Scale space texture analysis for face anti-spoofing. In: IEEE international conference on biometrics (ICB), pp. 1–6
Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. IEEE Trans Inf Forensics Secur 11(8):1818–1830
Boulkenafet Z, Komulainen J, Hadid A (2017) Face anti-spoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Process Lett 24(2):141–145
Caetano Garcia D, de Queiroz RL (2015) Face-spoofing 2D-detection based on Moiré-pattern analysis. IEEE Trans Inf Forensics Secur 10(4):778–786
Chierchia G, Cozzolino D, Poggi G, Sansone C, Verdoliva L (2014) Guided filtering for PRNU-based localization of small-size image forgeries. In: IEEE international conference on acoustics, speech and Signal processing (ICASSP), pp. 6231–6235
Chingovska I, Anjos A, Marcel S. (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: IEEE international conference of the biometrics special interest group (BIOSIG), pp. 1–7
Chingovska I, Rabello dos Anjos A, Marcel S (2014) Biometrics evaluation under spoofing attacks. IEEE Trans Inf Forensics Secur 9(12):2264–2276
Costa-Pazo A, Bhattacharjee S, Vazquez-Fernandez E, Marcel S. (2016) The REPLAY-MOBILE face presentation-attack database. In: IEEE biometrics international conference of the special interest group (BIOSIG), pp. 1–7
de Freitas Pereira T, Komulainen J, Anjos A, De Martino JM, Hadid A, Pietikäinen M, Marcel S (2014) Face liveness detection using dynamic texture. EURASIP Journal on Image and Video Processing 2014(1):1–15
de Freitas Pereira T, Anjos A, De Martino JM, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario?. In: IEEE international conference on biometrics (ICB), pp. 1–8
Erdogmus N, Marcel S (2014) Spoofing face recognition with 3D masks. IEEE Trans Inf Forensics Secur 9(7):1084–1097
Face++: https://www.faceplusplus.com.cn/face-detection/ Accessed 19 January 2017
Fan RE, Chang KW, Hsieh CJ, Wang XR, Lin CJ (2008) LIBLINEAR: a library for large linear classification. J Mach Learn Res 9:1871–1874
Farmanbar, M., Toygar, Ö. (2017) Spoof detection on face and palmprint biometrics. SIViP, in press, doi: 10.1007/s11760-017-1082-y
Feng L, Po LM, Li Y, Xu X, Yuan F, Cheung TCH, Cheung KW (2016) Integration of image quality and motion cues for face anti-spoofing: a neural network approach. J Vis Commun Image Represent 38:451–460
Galbally J, Marcel S. (2014) Face anti-spoofing based on general image quality assessment. In: IEEE international conference on pattern recognition (ICPR), pp. 1173–1178
Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724
Gomez-Barrero M, Galbally J, Fierrez J (2014) Efficient software attack to multimodal biometric systems and its application to face and iris fusion. Pattern Recogn Lett 36:243–253
Hadid A (2014) Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions. IEEE Conference on Computer Vision and Pattern Recognition Workshops, In, pp 113–118
Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process Mag 32(5):20–30
He K, Sun J, Tang X. (2010) Guided image filtering. In: European conference on computer Vision (ECCV), pp. 1–14
He K, Sun J, Tang X (2013) Guided image filtering. IEEE Trans Pattern Anal Mach Intell 35(6):1397–1409
Information Technology—Biometric Presentation Attack Detection—Part 1 (2015): Framework, ISO/IEC JTC1 SC37 biometrics, ISO/IEC Standard WD 30107-1
Information Technology—Biometric Presentation Attack Detection—Part 3 (2015): Testing and reporting, ISO/IEC JTC1 SC37 biometrics, ISO/IEC Standard WD 30107-3
Ji Z, Zhu H, Wang Q (2016) LFHOG: a discriminative descriptor for live face detection from light field image. In: IEEE international conference on image processing (ICIP), pp. 1474–1478
Kim W, Suh S, Han JJ (2015) Face liveness detection from a single image via diffusion speed model. IEEE Trans Image Process 24(8):2456–2465
Labati RD, Genovese A, Muñoz E, Piuri V, Scotti F, Sforza G (2016) Biometric recognition in automated border control: a survey. ACM Comput Surv 49(2):24
Lei Z, Liao S, Pietikainen M, Li SZ (2011) Face recognition by exploring information jointly in space, scale and orientation. IEEE Trans Image Process 20(1):247–256
Li Y, Xu K, Yan Q, Li Y, Deng RH (2014) Understanding OSN-based facial disclosure against face authentication systems. In: ACM symposium on information, computer and communications security (ASIACCS), pp. 413–424
Li Y, Li Y, Yan Q, Kong H, Deng RH. (2015) Seeing your face is not enough: an inertial sensor-based liveness detection for face authentication. In: ACM SIGSAC conference on computer and communications security (CCS), pp. 1558–1569
Li, Y., Li, Y., Xu, K., Yan, Q., Deng, R. (2016) Empirical study of face authentication systems under OSNFD attacks. IEEE Trans Dependable Secure Comput, in press, doi: 10.1109/TDSC.2016.2550459
Liu S, Yuen PC, Zhang S, Zhao G. (2016) 3D mask face anti-spoofing with remote Photoplethysmography. In: European conference on computer Vision (ECCV), pp. 85–100
Määttä J, Hadid A, Pietikainen M (2011) Face spoofing detection from single images using micro-texture analysis. In: IEEE international joint conference on biometrics (IJCB), pp. 1–7
Maatta J, Hadid A, Pietikainen M (2012) Face spoofing detection from single images using texture and local shape analysis. IET Biometrics 1(1):3–10
Manjani, I., Tariyal, S., Vatsa, M., Singh, R., Majumdar, A. (2017) Detecting silicone mask based presentation attack via deep dictionary learning. IEEE Trans Inf Forensics Secur, in press, doi:10.1109/TIFS.2017.2676720
Marcel S, Nixon MS, Li SZ (2014) Handbook of biometric anti-spoofing. Springer, New York
Marcialis GL, Biggio B, Fumera G (2014) Anti-spoofing: Multimodal. In: Encyclopedia of biometrics. Springer, New York, pp 1–4
Ojala T, Pietikäinen M, Mäenpää T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971–987
Pan G, Sun L, Wu Z, Lao S. (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: IEEE international conference on computer Vision (ICCV), pp. 1–8
Patel K, Han H, Jain AK (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268–2283
Peng F, Zhou DL, Long M, Sun XM (2017) Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis. AEU Int J Electron Commun 71:72–81
Phan QT, Dang-Nguyen DT, Boato G, De Natale FG. (2016) FACE spoofing detection using LDP-TOP. In: IEEE international conference on image processing (ICIP), pp. 404–408
Pinto A, Schwartz WR, Pedrini H, de Rezende Rocha A (2015) Using visual rhythms for detecting video-based facial spoof attacks. IEEE Trans Inf Forensics Secur 10(5):1025–1038
Pinto A, Pedrini H, Robson Schwartz W, Rocha A (2015) Face spoofing detection through visual codebooks of spectral temporal cubes. IEEE Trans Image Process 24(12):4726–4740
Raghavendra R, Raja KB, Busch C (2015) Presentation attack detection for face recognition using light field camera. IEEE Trans Image Process 24(3):1060–1075
Rajoub BA, Zwiggelaar R (2014) Thermal facial analysis for deception detection. IEEE Trans Inf Forensics Secur 9(6):1015–1023
Ramachandra R, Busch C (2017) Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput Surv 50(1):8
Steiner H, Kolb A, Jung N (2016) Reliable face anti-spoofing using multispectral SWIR imaging. In: IEEE international conference on biometrics (ICB), pp. 1–8
Tirunagari S, Poh N, Windridge D, Iorliam A, Suki N, Ho AT (2015) Detection of face spoofing using visual dynamics. IEEE Trans Inf Forensics Secur 10(4):762–777
Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761
Wild P, Radu P, Chen L, Ferryman J (2016) Robust multimodal face and fingerprint fusion in the presence of spoofing attacks. Pattern Recogn 50:17–25
Xu Y, Price T, Frahm JM, Monrose F (2016) Virtual U: defeating face liveness detection by building virtual models from your public photos. USENIX Security Symposium, In, pp 497–512
Yang J, Lei Z, Li SZ. (2014) Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601
Zeng H, Kang X (2015) Fast source camera identification using content adaptive guided image filter. J Forensic Sci 61(2):520–526
Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ. (2012) A face antispoofing database with diverse attacks. In: IAPR international conference on biometrics (ICB), pp. 26–31
Zhang LB, Peng F, Long M. (2016) Source camera identification based on guided image estimation and block weighted average. In: international workshop on digital watermarking (IWDW), pp. 106–118
Zhang LB, Peng F, Long M. (2016) Identifying source camera using guided image estimation and block weighted average. J Vis Commun Image Represent, in press, doi:10.1016/j.jvcir.2016.12.013
Li AA, Nie WZ, Gao Y, Su YT. (2016) Multi-modal clique-graph matching for view-based 3D model retrieval. IEEE Trans Image Process 25(5):2103–2116
Liu AA, Su YT, NieWZ, Kankanhalli M. (2017) Hierarchical clustering multi-task learning for joint human action grouping and recognition. IEEE Trans Pattern Anal Mach Intell 39(1):102–114
Acknowledgements
This work was supported in part by project supported by National Natural Science Foundation of China (Grant No. 61572182, 61370225), project supported by Hunan Provincial Natural Science Foundation of China (Grant No. 15JJ2007), and supported by the Scientific Research Plan of Hunan Provincial Science and Technology Department of China (2014FJ4161).
The authors would like to thank Idiap research institute, Institute of Automation, Chinese Academy of Sciences (CASIA) and Michigan State University for providing the benchmark databases, and also thank Le-Bing Zhang with Hunan University for his kind proofreading of this manuscript.
The authors would like to thank the anonymous reviewers for their kind suggestions and comments.
Author information
Authors and Affiliations
Corresponding author
About this article
Cite this article
Peng, F., Qin, L. & Long, M. Face presentation attack detection using guided scale texture. Multimed Tools Appl 77, 8883–8909 (2018). https://doi.org/10.1007/s11042-017-4780-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4780-0