Abstract
Presentation attack detection approaches have achieved great progress on various attack types while adversarial learning technology has become a new threat to these approaches. Now few works are devoted to developing a robust detection method for both physical spoofing faces and digital adversarial faces. In this paper, we find that fake face images from printed photos and replayed videos have a different optical characteristic from the real ones, and the adversarial samples generated by various attacking methods retain this characteristic. By exploring this characteristic, we propose the Spectral Characteristic Presentation Attack Detection (SCPAD), a new approach that detects presentation attacks by reconstructing the color space of input images, which also performs well on adversarial samples. More specifically, a new HSCbb color space is manually constructed by studying the difference in albedo intensity between real faces and fake faces. Then the difference between real and spoofing faces can be effectively magnified and modeled by color texture features with the shallow convolutional network. The experimental results show that our proposed method consistently outperforms the state-of-the-art methods on adversarial faces and also achieves competitive performance on fake faces.









Similar content being viewed by others
References
Adeniyi JK, Adeniyi AE, Oguns YJ, Egbedokun GO, Ajagbe KD, Obuzor PC, Ajagbe SA (2022) Comparison of the performance of machine learning techniques in the prediction of employee. ParadigmPlus 3(3):1–15
Ajagbe SA, Oki OA, Oladipupo MA, Nwanakwaugwu A (2022) Inves-tigating the efficiency of deep learning models in bioinspired object detection. In 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), pp 1–6 . https://doi.org/10.1109/ICECET55527.2022.9872568
Ajagbe SA, Amuda KA, Oladipupo MA, Oluwaseyi FA, Okesola KI (2021) Multi-classication of alzheimer disease on magnetic resonance images (mri) using deep convolutional neural network (dcnn) approaches. Int J Adv Comput Res 11(53):51
Arora G, Tiwari K, Gupta P (2019) Liveness and threat aware sele face recognition. Sele Biometrics. Springer, Berlin, pp 197–210
Atoum Y, Liu Y, Jourabloo A, Liu X (2017) Face anti-spoong using patch and depth-based cnns. In 2017 IEEE international joint conference on biometrics (IJCB), pp 319–328 IEEE
Bisogni C, Cascone L, Dugelay J-L, Pero C (2021) Adversarial attacks through architectures and spectra in face recognition. Pattern Recogn Lett 147:55–62
Bobbia S, Macwan R, Benezeth Y, Mansouri A, Dubois J (2019) Unsupervised skin tissue segmentation for remote photoplethysmography. Pattern Recogn Lett 124(JUN.):82–90
Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoong detection using colour texture analysis. IEEE Trans Inform Forensics Secur 11(8):1818–1830
Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoong detection using colour texture analysis. IEEE Trans Inform Forensics Secur 11(8):1818–1830
Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) Oulu-npu: A mobile face presentation attack database with real-world variations. In 2017 12th IEEE International conference on automatic Face & Gesture recognition (FG 2017), pp 612–618 IEEE
Cai G, Su S, Leng C, Wu J, Wu Y, Li S (2019) Cover patches: A general feature extraction strategy for spoong detection. Concurr Comput Pract Experience 31(23):4641
Chen D, Xu R, Han B (2019) Patch selection denoiser: An effective approach defending against one-pixel attacks. In International conference on neural information processing, pp 286–296 . Springer
Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoong. In 2012 BIOSIG-proceedings of the Inter-national conference of biometrics special interest group (BIOSIG), pp1–7 . IEEE
Dong Y, Fu QA, Yang X, Pang T, Zhu J (2020) Benchmarking adversarial robustness on image classication. In 2020 IEEE/CVF conference on computer vision and pattern recognition (CVPR)
Fang M, Damer N, Kirchbuchner F, Kuijper A (2022) Learnable multi-level frequency decomposition and hierarchical attention mechanism for generalized face presentation attack detection. In Proceedings of the IEEE/CVF winter conference on applications of computer vision, pp 3722–3731
Feng H, Hong Z, Yue H, Chen Y, Wang K, Han J, Liu J, Ding E (2020) Learning generalized spoof cues for face anti-spoofing. arXiv preprint arXiv:2005.03922
George A, Marcel S (2021) Cross modal focal loss for rgbd face anti-spoong. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 7882–7891
Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572
Hernandez-Ortega J, Fierrez J, Morales A, Galbally J (2019) Introduction to face presentation attack detection. Handbook of biometric anti-spoong. Springer, Berlin, pp 187–206
Hernandez-Ortega J, Fierrez J, Morales A, Tome P (2018) Time analy-sis of pulse-based face anti-spoong in visible and nir. In Proceedings of the IEEE conference on computer vision and pattern recognition Workshops, pp 544–552
Inoue S, Kotori Y, Takishiro M (2012) Paper gloss analysis by specular reection point spread function (part i)-measurement method for psf of paper on specular reection phenomenon. Jpn TAPPI J 66(8):879–886
Kurakin A, Goodfellow IJ, Bengio S (2018) Adversarial examples in the physical world. In Articial intelligence safety and security, Chapman and Hall/CRC, London pp 99–112
Lin B, Li X, Yu Z, Zhao G (2019) Face liveness detection by rppg features and contextual patch-based cnn. In: Proceedings of the 2019 3rd Interna-tional conference on biometric engineering and applications, pp 61–68
Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoong: Binary or auxiliary supervision. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp 389–398
Li L, Xia Z, Jiang X, Roli F, Feng X (2018) Face presentation attack detection in learned color-liked space. arXiv preprint arXiv:1810.13170
Li L, Xia Z, Jiang X, Roli F, Feng X (2020) Compactnet: learning a compact space for face presentation attack detection. Neurocomputing 409
Luo Z, Wu S-T (2015) Oled versus lcd: Who wins. Opt. Photonics News 2015:19–21
Moosavi-Dezfooli S-M, Fawzi A, Frossard P (2016) Deepfool: a simple and accurate method to fool deep neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2574–2582
Mygdalis V, Pitas I (2022) Hyperspherical class prototypes for adversarial robustness. Pattern Recog 125:108527
Patel K, Han H, Jain AK (2016) Secure face unlock: Spoof detection on smartphones. IEEE Trans Inform Forensics Secur 11(10):2268–2283
Perdana RN, Ardiyanto I, Nugroho HA (2021) A review on face anti-spoong. IJITEE (International Journal of Information Technology and Electrical Engineering) 1
Quan R, Wu Y, Yu X, Yang Y (2021) Progressive transfer learning for face anti-spoong. IEEE Trans Image Process 30:3946–3955. https://doi.org/10.1109/TIP.2021.3066912
Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In International conference on learning representations
Su J, Vargas DV, Sakurai K (2019) One pixel attack for fooling deep neural networks. IEEE Trans Evol Comput 23(5):828–841
Svaasand LO, Norvang L, Fiskerstrand E, Stopps E, Berns M, Nelson J (1995) Tissue parameters determining the visual appearance of normal skin and port-wine stains. Lasers Med Sci 10(1):55–65
Wang S-Y, Yang S-H, Chen Y-P, Huang J-W (2017) Face liveness detection based on skin blood ow analysis. Symmetry 9(12):305
Wang Y, Song X, Xu T, Feng Z, Wu X-J (2021) From rgb to depth:domain transfer network for face anti-spoong. IEEE Trans Inform Forensics Secur 16:4280–4290
Wang C-Y, Lu Y, Yang S-T, Lai S-H (2022) Patchnet: A simple face anti-spoong framework via fine-grained patch recognition. IEEE/CVF conference on computer vision and pattern recognition (CVPR) 2022:20249–20258
Wang Z, Zhao C, Qin Y, Zhou Q, Qi G, Wan J, Lei Z (2018) Exploiting temporal and depth information for multi-frame face anti-spoong. arXiv preprint arXiv:1811.05118
Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inform Forensics Secur 10(4):746–761
Xiong Z, Xu H, Li W, Cai Z (2021) Multi-source adversarial sample attack on autonomous vehicles. IEEE Trans Vehr Technol 70(3):2822–2835
Yu H, Ng T-T, Sun Q (2008) Recaptured photo detection using specularity distribution. In 2008 15th IEEE International conference on image processing, pp 3140–3143 IEEE
Yu Z, Zhao C, Wang Z, Qin Y, Su Z, Li X, Zhou F, Zhao G (2020) Searching central difference convolutional networks for face anti-spoofing. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 5295–5305
Zeng X, Liu C, Wang Y-S, Qiu W, Xie L, Tai Y-W, Tang C-K, Yuille AL (2019) Adversarial attacks beyond the image space. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 4302–4311
Zhang X, Feng X, Xia Z (2019) Analysis of factors on bvp signal extraction based on imaging principle. In Proceedings of the 2019 3rd International conference on biometric engineering and applications, pp 48–55
Zhang P, Zou F, Wu Z, Dai N, Mark S, Fu M, Zhao J, Li K (2019) Feathernets: Convolutional neural networks as light as feather for face anti-spoofing. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops, pp 0–0
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflicts of interest
This work was supported by the National Natural Science Foundation of China (No. No.62002199), the Natural Science Foundation of Shandong Province (No.ZR2020QF109), the Key Research and Development Program of Shaanxi (Nos. 2021ZDLGY15-01, 2021ZDLGY09-04, and 2021GY-004), and Shenzhen Science and Techonlogy Program (No. GJHZ20200731095204013)
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Dang, C., Xia, Z., Dai, J. et al. SCPAD: An approach to explore optical characteristics for robust static presentation attack detection. Multimed Tools Appl 83, 14503–14520 (2024). https://doi.org/10.1007/s11042-023-15870-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15870-4