Skip to main content
Log in

An efficient face anti-spoofing and detection model using image quality assessment parameters

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Biometric authentication poses a significant problem as reconstructed sample or fake self-manufactured samples used by intruders for accessing the actual real legitimate traits. The other prime concern for biometrics is the increasing demand for safety in mobile devices, such as smartphones and tablets etc. So, in the present scenario security for biometrics has gained considerable attention due to various inherent qualities of biometrics. For detection of valid user in a face recognition system with photographs, videos, and 3D models, face liveness detection system is a great technique against spoofing attacks for differentiating between the fake traits from the real traits. In this paper, a novel fake biometric detection technique utilizing liveness detection is proposed for detecting deceitful access attempts in the biometric face system. The prime objective of the paper is to propose a low-complexity fake biometric detection using different image quality assessment parameters i.e. Mean Square Error, Signal to Noise Ratio,SC etc. on the extracted features of the images. The authenticity of the proposed model is confirmed by analyzing the values of MSE, which are 5.8% and 8.49% more than the threshold value of nose and eye features. The same results have also been shown for other 11 different image quality assessment parameters. The experiments were done on the database prepared using the image samples of the 500 male and female students having age between 20 to 30 years.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Avcibas et al (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221–229

    Article  MathSciNet  Google Scholar 

  2. Bayram S et al (2006) Image manipulation detection. J Electron Imaging 15(4):041102–041102

    Article  Google Scholar 

  3. Bledsoe WW (1964) The model method in facial recognition, Panoramic Research Inc., Palo Alto. CA, Technical Report, Technical Report PRI: 15

  4. Boulkenafet Z et al (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE

  5. Chakka MM et al (2011) Competition on countermeasures to 2-d facial spoofing attacks." Biometrics (IJCB), 2011 International Joint Conference on. IEEE

  6. Champod C et al (2014) Forgeries of fingerprints in forensic science. Handbook of Biometric Anti-Spoofing. Springer, London, pp 13–34

    Google Scholar 

  7. Chan PPK et al (2017) Face liveness detection using a flash against 2D spoofing attack. IEEE Trans Inform Forensics Secur 13(2):521–534

    Article  Google Scholar 

  8. Chen H et al (2019) EchoFace: acoustic sensor-based media attack detection for face authentication. IEEE Internet Things J 7(3):2152–2159

    Article  Google Scholar 

  9. Davis et al (1952) Automatic recognition of spoken digits. J Acoustical Soc Am 24(6):637–642

    Article  Google Scholar 

  10. Galbally J et al (2012) Iris liveness detection based on quality related features." Biometrics (ICB), 2012 5th IAPR International Conference on. IEEE

  11. Galbally J, Alonso-Fernandez F, Fierrez J, Ortega-Garcia J (2012) A high-performance fingerprint liveness detection method based on quality related features. Futur Gener Comput Syst 28(1):311–321

    Article  Google Scholar 

  12. Galbally et al (2014) Biometric antispoofing methods: a survey in face recognition. IEEE Access 2:1530–1552

    Article  Google Scholar 

  13. Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724

    Article  MathSciNet  Google Scholar 

  14. Ghiani L et al (2013) Livdet 2013 fingerprint liveness detection competition 2013. Biometrics (ICB), 2013 International Conference on. IEEE

  15. Goswami G et al (2012) Face recognition captcha." 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications, and Systems (BTAS). IEEE

  16. Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20

    Article  Google Scholar 

  17. Jain AK, Ross A, Pankanti S (2006) Biometrics: a tool for information security. IEEE Trans Inform Forensics Secur 1(2):125–143

    Article  Google Scholar 

  18. Kelly, et al (1970) Visual identification of people by computer. No. CS-168. Stanford University, Calif Dept of Computer Science

  19. Kim Y, Yoo J-H, Choi K (2011) A motion and similarity-based fake detection method for biometric face recognition systems. IEEE Trans Consum Electron 57(2):756–762

    Article  Google Scholar 

  20. Kim W, Suh S, Han J-J (2015) Face liveness detection from a single image via diffusion speed model. IEEE Trans Image Process 24(8):2456–2465

    Article  MathSciNet  Google Scholar 

  21. Kollreider K, Fronthaler H, Faraj MI, Bigun J (2007) Real-time face detection and motion analysis with application in “liveness” assessment. IEEE Trans Inform Forensics Secur 2(3):548–558

    Article  Google Scholar 

  22. Korshunov P et al (2016) Overview of BTAS 2016 speaker anti-spoofing competition. 2016 IEEE 8th international conference on biometrics theory, applications, and systems (BTAS). IEEE

  23. Le C et al (2009) A survey of biometrics security systems. EEUU. Washington University in St. Louis

  24. Lyu et al (2006) Steganalysis using higher-order image statistics. IEEE Trans Inform Forensics Secur 1(1):111–119

    Article  Google Scholar 

  25. Maltoni D et al (2009) Handbook of fingerprint recognition. Springer Science & Business Media

  26. Marcel S et al (2014) Li. Handbook of biometric anti-spoofing, vol 1. Springer, New York

    Google Scholar 

  27. Marcel S et al (2014) Handbook of biometric anti-spoofing, vol 1. Springer, New York

    Google Scholar 

  28. Marcialis S et al (2009) Liveness detection competition 2009. Biometric Technol Today 17(3):7–9

    Article  Google Scholar 

  29. Nguyen MH et al (2008) Image-based shaving. Computer graphics forum. Vol. 27. No. 2. Blackwell Publishing Ltd, Oxford

    Google Scholar 

  30. O'Brien J 2013 The scientific Sherlock Holmes: cracking the case with science and forensics. Oxford University Press

  31. Pan G et al (2007) Eyeblink-based anti-spoofing in face recognition from a generic web camera. 2007 IEEE 11th International Conference on Computer Vision. IEEE

  32. Phillips PJ et al. (2003.) Face recognition vendor test (FRVT) 2002: Overview and summary." Online: http://www.rvt.Org/FRVT2002/documents.htm

  33. Ravibabu V et al (2014) A vary approach to face veritable recognition mechanisms for Android mobile against spoofing. 2014 IEEE Int Confer Computational Intelligence and Computing Research. IEEE

  34. Smith DF et al (2015) Binary watermarks: a practical method to address face recognition replay attacks on consumer mobile devices." IEEE International Conference on Identity, Security, and Behavior Analysis (ISBA 2015). IEEE

  35. Sun W, Song Y, Chen C, Huang J, Kot AC (2020) Face spoofing detection based on local ternary label supervision in fully convolutional networks. IEEE Trans Inform Forensics Secur 15:3181–3196

    Article  Google Scholar 

  36. Yambay D, et al (2012) LivDet 2011—Fingerprint liveness detection competition 2011. Biometrics (ICB), 2012 5th IAPR International Conference on. IEEE

  37. Yambay D et al (2014) Livdet-iris 2013-iris liveness detection competition 2013. Biometrics (IJCB), 2014 IEEE International Joint Conference on. IEEE

  38. Yambay D et al (2017) LivDet-Iris 2015-Iris Liveness Detection Competition 2015. 2017 IEEE International Conference on Identity, Security, and Behavior Analysis (ISBA). IEEE

  39. Yambay D et al (2017) LivDet iris 2017—Iris liveness detection competition 2017." 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE

  40. Yambay D et al (2018) LivDet 2017-Fingerprint Systems Liveness Detection Competition. 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE

  41. Zhang D, Shu W (1999) Two novel characteristics in palmprint verification: datum point invariance and line feature matching. Pattern Recogn 32(4):691–702

    Article  Google Scholar 

  42. Zhang Y, Shi D, Zhan X, Cao D, Zhu K, Li Z (2019) Slim-ResCNN: a deep residual convolutional neural network for fingerprint Liveness detection. IEEE Access 7:91476–91487

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

The major author contributions are following:

Aditya Bakshi carried out the all research work and wrote this manuscript.

Dr. Sunanda has suggested some changes in formatting of the manuscript.

Corresponding author

Correspondence to Aditya Bakshi.

Ethics declarations

Conflict of interest

The author declares that there is no conflict of interest regarding the publication of this paper.

Data availability

No data were used to support this study.

Code availability

There is no significant code available for this paper.

Ethics approval

Not applicable.

Consent for publication

Yes. Consent has been given by an individual for the publication of their data or image.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bakshi, A., Gupta, S. An efficient face anti-spoofing and detection model using image quality assessment parameters. Multimed Tools Appl 81, 35047–35068 (2022). https://doi.org/10.1007/s11042-020-10045-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10045-x

Keywords

Navigation