Skip to main content
Log in

SCPAD: An approach to explore optical characteristics for robust static presentation attack detection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Presentation attack detection approaches have achieved great progress on various attack types while adversarial learning technology has become a new threat to these approaches. Now few works are devoted to developing a robust detection method for both physical spoofing faces and digital adversarial faces. In this paper, we find that fake face images from printed photos and replayed videos have a different optical characteristic from the real ones, and the adversarial samples generated by various attacking methods retain this characteristic. By exploring this characteristic, we propose the Spectral Characteristic Presentation Attack Detection (SCPAD), a new approach that detects presentation attacks by reconstructing the color space of input images, which also performs well on adversarial samples. More specifically, a new HSCbb color space is manually constructed by studying the difference in albedo intensity between real faces and fake faces. Then the difference between real and spoofing faces can be effectively magnified and modeled by color texture features with the shallow convolutional network. The experimental results show that our proposed method consistently outperforms the state-of-the-art methods on adversarial faces and also achieves competitive performance on fake faces.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Adeniyi JK, Adeniyi AE, Oguns YJ, Egbedokun GO, Ajagbe KD, Obuzor PC, Ajagbe SA (2022) Comparison of the performance of machine learning techniques in the prediction of employee. ParadigmPlus 3(3):1–15

    Article  Google Scholar 

  2. Ajagbe SA, Oki OA, Oladipupo MA, Nwanakwaugwu A (2022) Inves-tigating the efficiency of deep learning models in bioinspired object detection. In 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), pp 1–6 . https://doi.org/10.1109/ICECET55527.2022.9872568

  3. Ajagbe SA, Amuda KA, Oladipupo MA, Oluwaseyi FA, Okesola KI (2021) Multi-classication of alzheimer disease on magnetic resonance images (mri) using deep convolutional neural network (dcnn) approaches. Int J Adv Comput Res 11(53):51

    Article  Google Scholar 

  4. Arora G, Tiwari K, Gupta P (2019) Liveness and threat aware sele face recognition. Sele Biometrics. Springer, Berlin, pp 197–210

    Chapter  Google Scholar 

  5. Atoum Y, Liu Y, Jourabloo A, Liu X (2017) Face anti-spoong using patch and depth-based cnns. In 2017 IEEE international joint conference on biometrics (IJCB), pp 319–328 IEEE

  6. Bisogni C, Cascone L, Dugelay J-L, Pero C (2021) Adversarial attacks through architectures and spectra in face recognition. Pattern Recogn Lett 147:55–62

    Article  Google Scholar 

  7. Bobbia S, Macwan R, Benezeth Y, Mansouri A, Dubois J (2019) Unsupervised skin tissue segmentation for remote photoplethysmography. Pattern Recogn Lett 124(JUN.):82–90

    Article  Google Scholar 

  8. Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoong detection using colour texture analysis. IEEE Trans Inform Forensics Secur 11(8):1818–1830

    Article  Google Scholar 

  9. Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoong detection using colour texture analysis. IEEE Trans Inform Forensics Secur 11(8):1818–1830

    Article  Google Scholar 

  10. Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) Oulu-npu: A mobile face presentation attack database with real-world variations. In 2017 12th IEEE International conference on automatic Face & Gesture recognition (FG 2017), pp 612–618 IEEE

  11. Cai G, Su S, Leng C, Wu J, Wu Y, Li S (2019) Cover patches: A general feature extraction strategy for spoong detection. Concurr Comput Pract Experience 31(23):4641

    Article  Google Scholar 

  12. Chen D, Xu R, Han B (2019) Patch selection denoiser: An effective approach defending against one-pixel attacks. In International conference on neural information processing, pp 286–296 . Springer

  13. Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoong. In 2012 BIOSIG-proceedings of the Inter-national conference of biometrics special interest group (BIOSIG), pp1–7 . IEEE

  14. Dong Y, Fu QA, Yang X, Pang T, Zhu J (2020) Benchmarking adversarial robustness on image classication. In 2020 IEEE/CVF conference on computer vision and pattern recognition (CVPR)

  15. Fang M, Damer N, Kirchbuchner F, Kuijper A (2022) Learnable multi-level frequency decomposition and hierarchical attention mechanism for generalized face presentation attack detection. In Proceedings of the IEEE/CVF winter conference on applications of computer vision, pp 3722–3731

  16. Feng H, Hong Z, Yue H, Chen Y, Wang K, Han J, Liu J, Ding E (2020) Learning generalized spoof cues for face anti-spoofing. arXiv preprint arXiv:2005.03922

  17. George A, Marcel S (2021) Cross modal focal loss for rgbd face anti-spoong. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 7882–7891

  18. Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572

  19. Hernandez-Ortega J, Fierrez J, Morales A, Galbally J (2019) Introduction to face presentation attack detection. Handbook of biometric anti-spoong. Springer, Berlin, pp 187–206

    Chapter  Google Scholar 

  20. Hernandez-Ortega J, Fierrez J, Morales A, Tome P (2018) Time analy-sis of pulse-based face anti-spoong in visible and nir. In Proceedings of the IEEE conference on computer vision and pattern recognition Workshops, pp 544–552

  21. Inoue S, Kotori Y, Takishiro M (2012) Paper gloss analysis by specular reection point spread function (part i)-measurement method for psf of paper on specular reection phenomenon. Jpn TAPPI J 66(8):879–886

    Article  Google Scholar 

  22. Kurakin A, Goodfellow IJ, Bengio S (2018) Adversarial examples in the physical world. In Articial intelligence safety and security, Chapman and Hall/CRC, London pp 99–112

  23. Lin B, Li X, Yu Z, Zhao G (2019) Face liveness detection by rppg features and contextual patch-based cnn. In: Proceedings of the 2019 3rd Interna-tional conference on biometric engineering and applications, pp 61–68

  24. Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoong: Binary or auxiliary supervision. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp 389–398

  25. Li L, Xia Z, Jiang X, Roli F, Feng X (2018) Face presentation attack detection in learned color-liked space. arXiv preprint arXiv:1810.13170

  26. Li L, Xia Z, Jiang X, Roli F, Feng X (2020) Compactnet: learning a compact space for face presentation attack detection. Neurocomputing 409

  27. Luo Z, Wu S-T (2015) Oled versus lcd: Who wins. Opt. Photonics News 2015:19–21

    Google Scholar 

  28. Moosavi-Dezfooli S-M, Fawzi A, Frossard P (2016) Deepfool: a simple and accurate method to fool deep neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2574–2582

  29. Mygdalis V, Pitas I (2022) Hyperspherical class prototypes for adversarial robustness. Pattern Recog 125:108527

    Article  Google Scholar 

  30. Patel K, Han H, Jain AK (2016) Secure face unlock: Spoof detection on smartphones. IEEE Trans Inform Forensics Secur 11(10):2268–2283

    Article  Google Scholar 

  31. Perdana RN, Ardiyanto I, Nugroho HA (2021) A review on face anti-spoong. IJITEE (International Journal of Information Technology and Electrical Engineering) 1

  32. Quan R, Wu Y, Yu X, Yang Y (2021) Progressive transfer learning for face anti-spoong. IEEE Trans Image Process 30:3946–3955. https://doi.org/10.1109/TIP.2021.3066912

    Article  Google Scholar 

  33. Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In International conference on learning representations

  34. Su J, Vargas DV, Sakurai K (2019) One pixel attack for fooling deep neural networks. IEEE Trans Evol Comput 23(5):828–841

    Article  Google Scholar 

  35. Svaasand LO, Norvang L, Fiskerstrand E, Stopps E, Berns M, Nelson J (1995) Tissue parameters determining the visual appearance of normal skin and port-wine stains. Lasers Med Sci 10(1):55–65

    Article  Google Scholar 

  36. Wang S-Y, Yang S-H, Chen Y-P, Huang J-W (2017) Face liveness detection based on skin blood ow analysis. Symmetry 9(12):305

    Article  Google Scholar 

  37. Wang Y, Song X, Xu T, Feng Z, Wu X-J (2021) From rgb to depth:domain transfer network for face anti-spoong. IEEE Trans Inform Forensics Secur 16:4280–4290

    Article  Google Scholar 

  38. Wang C-Y, Lu Y, Yang S-T, Lai S-H (2022) Patchnet: A simple face anti-spoong framework via fine-grained patch recognition. IEEE/CVF conference on computer vision and pattern recognition (CVPR) 2022:20249–20258

    Google Scholar 

  39. Wang Z, Zhao C, Qin Y, Zhou Q, Qi G, Wan J, Lei Z (2018) Exploiting temporal and depth information for multi-frame face anti-spoong. arXiv preprint arXiv:1811.05118

  40. Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inform Forensics Secur 10(4):746–761

    Article  Google Scholar 

  41. Xiong Z, Xu H, Li W, Cai Z (2021) Multi-source adversarial sample attack on autonomous vehicles. IEEE Trans Vehr Technol 70(3):2822–2835

    Article  Google Scholar 

  42. Yu H, Ng T-T, Sun Q (2008) Recaptured photo detection using specularity distribution. In 2008 15th IEEE International conference on image processing, pp 3140–3143 IEEE

  43. Yu Z, Zhao C, Wang Z, Qin Y, Su Z, Li X, Zhou F, Zhao G (2020) Searching central difference convolutional networks for face anti-spoofing. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 5295–5305

  44. Zeng X, Liu C, Wang Y-S, Qiu W, Xie L, Tai Y-W, Tang C-K, Yuille AL (2019) Adversarial attacks beyond the image space. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 4302–4311

  45. Zhang X, Feng X, Xia Z (2019) Analysis of factors on bvp signal extraction based on imaging principle. In Proceedings of the 2019 3rd International conference on biometric engineering and applications, pp 48–55

  46. Zhang P, Zou F, Wu Z, Dai N, Mark S, Fu M, Zhao J, Li K (2019) Feathernets: Convolutional neural networks as light as feather for face anti-spoofing. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops, pp 0–0

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Zhaoqiang Xia or Xiaoyi Feng.

Ethics declarations

Conflicts of interest

This work was supported by the National Natural Science Foundation of China (No. No.62002199), the Natural Science Foundation of Shandong Province (No.ZR2020QF109), the Key Research and Development Program of Shaanxi (Nos. 2021ZDLGY15-01, 2021ZDLGY09-04, and 2021GY-004), and Shenzhen Science and Techonlogy Program (No. GJHZ20200731095204013)

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dang, C., Xia, Z., Dai, J. et al. SCPAD: An approach to explore optical characteristics for robust static presentation attack detection. Multimed Tools Appl 83, 14503–14520 (2024). https://doi.org/10.1007/s11042-023-15870-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15870-4

Keywords

Navigation