Skip to main content
Log in

Face spoofing detection based on chromatic ED-LBP texture feature

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Face spoofing detection, also known as liveness detection, is a challenging and one of the most active research areas in computer vision. In this paper, a novel texture descriptor, namely equilibrium difference local binary pattern (ED-LBP), is proposed for the representation and recognition of face texture. First, the adjacent pixels discrepancy in a facial image is fully considered and the discrepancy information is encoded into LBP. This novel texture feature extraction method has the advantage of getting more elaborate texture information without increasing the feature dimension. Second, the texture signatures in different color channels are fully investigated. More specifically, the feature histograms are calculated over each image band separately. Third, by the integration of the chromatic ED-LBP histograms and the two-level spatial pyramid, the local structure information of face is encoded in our approach which can well describe the differences between facial videos of valid users and impostors. Finally, the ED-LBP histograms from different color spaces are usually cascaded into a united feature vector which is feed into SVM for classification identification. Extensive experiments on four challenging and publicly available face anti-spoofing databases, namely CASIA FASD, Replay-Attack, Replay-Mobile, and OULU-NPU, demonstrate the effectiveness of our proposed approach. The results indicate that our methods are superior to state-of-the-art techniques and can effectively resist photo and video spoofing attacks in face recognition (FR).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Shao, C., Song, X., Shu, X., Wu, X.: Converted-face identification: using synthesized images to replace original images for recognition. Multimed. Tools Appl. 76(5), 6641–6661 (2017)

    Article  Google Scholar 

  2. Shao, C., Song, X., Feng, Z., Wu, X., Zheng, Y.: Dynamic dictionary optimization for sparse-representation-based face classification using local difference images. Inf. Sci. 14, 1–14 (2017)

    Article  Google Scholar 

  3. Song, X., Liu, Z., Yang, X., Yang, J.: A parameterized fuzzy adaptive K-SVD approach for the multi-classes study of pursuit algorithms. Neurocomputing 123, 131–139 (2014)

    Article  Google Scholar 

  4. Parmar, D.N., Mehta, B.B.: Face recognition methods & applications. Int. J. Comput. Appl. Technol. 4(1), 84–86 (2014)

    Google Scholar 

  5. Li, L., Feng, X., Jiang, X., Xia, Z., Hadid, A.: Face anti-spoofing via deep local binary patterns. In IEEE International Conference on Image Processing (ICIP). pp. 101–105 (2017)

  6. Atoum, Y., Liu, Y., Jourabloo, A., Liu, X.: Face anti-spoofing using patch and depth-based CNNs. In IEEE International Joint Conference on Biometrics (IJCB). pp. 319–328 (2017)

  7. Zhang, L., Peng, F., Qin, L., Long, M.: Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination. J. Vis. Commun. Image Represent. 51, 56–69 (2018)

    Article  Google Scholar 

  8. Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. In IEEE International Conference on Image Processing (ICIP). pp. 2636–2640 (2015)

  9. Boulkenafet, Z., Komulainen, J., Hadid, A.: Face spoofing detection using colour texture analysis. IEEE Trans. Inf. Forensics Secur. 11(8), 1818–1830 (2016)

    Article  Google Scholar 

  10. Edmunds, T., Caplier, A.: Motion-based countermeasure against photo and video spoofing attacks in face recognition. J. Vis. Commun. Image Represent. 50, 314–332 (2018)

    Article  Google Scholar 

  11. Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG). pp. 1–7 (2012)

  12. de Freitas Pereira, T., Komulainen, J., Anjos, A., De Martino, J.M., Hadid, A., Pietikäinen, M., Marcel, S.: Face liveness detection using dynamic texture. EURASIP J. Image Video Process. 2014(1), 1–15 (2014)

    Article  Google Scholar 

  13. Peng, F., Qin, L.L., Long, M.: CCoLBP: Chromatic co-occurrence of local binary pattern for face presentation attack detection. In 27th International Conference on Computer Communication and Networks (ICCCN). pp. 1–9 (2018)

  14. Feng, L., Po, L.M., Li, Y., Xu, X., Fang, Y., Cheung, C.H., Cheung, K.W.: Integration of image quality and motion cues for face anti-spoofing: a neural network approach. J. Vis. Commun. Image Represent. 38, 451–460 (2016)

    Article  Google Scholar 

  15. Pan, G., Sun, L., Wu, Z., Lao, S.: Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In 11th International Conference on Computer Vision (ICCV). pp. 1–8 (2007)

  16. Patel, K., Han, H., Jain, A.K.: Cross-database face anti-spoofing with robust feature representation. In Chinese Conference on Biometric Recognition. pp. 611–619 (2016)

  17. Kollreider, K., Fronthaler, H., Bigun, J.: Non-intrusive liveness detection by face images. Image Vis. Comput 27(3), 233–324 (2009)

    Article  Google Scholar 

  18. Anjos, A., Chakka, M.M., Marcel, S.: Motion-based counter-measures to photo attacks in face recognition. IET Biom. 3(3), 147–158 (2014)

    Article  Google Scholar 

  19. Pereira, T.D.F., Anjos, A., Martino, J.M.D., Marcel, S.: LBP-TOP based countermeasure against face spoofing attacks. International workshop on computer vision with local binary pattern variants (ACCV), 7728, 121–132 (2014)

  20. Pinto, A., Pedrini, H., Schwartz, W.R., Rocha, A.: Face spoofing detection through visual codebooks of spectral temporal cubes. IEEE Trans. Image Process. 24(12), 4726–4740 (2015)

    Article  MathSciNet  Google Scholar 

  21. Nowara, E.M., Sabharwal, A., Veeraraghavan, A.: Ppgsecure: Biometric presentation attack detection using photopletysmograms. In 2017 12th IEEE International Conference on Automatic Face Gesture Recognition (FG 2017). pp. 56–62 (2017)

  22. Liu, Y., Jourabloo, A., Liu, X.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. In Conference on Computer Vision and Pattern Recognition (CVPR). pp. 389–398 (2018)

  23. Galbally, J., Marcel, S., Fierrez, J.: Image quality assessment for fake biometric detection: application to iris, fin-gerprint, and face recognition. IEEE Trans. Image Process. 23(2), 710–724 (2014)

    Article  MathSciNet  Google Scholar 

  24. Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746–761 (2015)

    Article  Google Scholar 

  25. Patel, K., Han, H., Jain, A.K.: Secure face unlock: spoof detection on smartphones. IEEE Trans. Inf. Forensics Secur. 11(10), 2268–2283 (2016)

    Article  Google Scholar 

  26. Määttä, J., Hadid, A., Pietikäinen, M.: Face spoofing detection from single images using micro-texture analysis. In International Joint Conference on Biometrics (IJCB). pp. 1–7 (2011)

  27. Gragnaniello, D., Poggi, G., Sansone, C., Verdoliva, L.: An investigation of local descriptors for biometric spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 849–863 (2015)

    Article  Google Scholar 

  28. Boulkenafet, Z., Komulainen, J., Hadid, A.: Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Process. Lett. 24(2), 141–145 (2017)

    Google Scholar 

  29. Li, L., Feng, X., Xia, Z., Jiang, X., Hadid, A.: Face spoofing detection with local binary pattern network. J. Vis. Commun. Image Represent. 54, 182–192 (2018)

    Article  Google Scholar 

  30. Y. Tian, S. Xiang, J. University: LBP and multilayer DCT based anti-spoofing countermeasure in face liveness detection. J. Comput. Res. Dev. 55(3), 643–650 (2018)

    Google Scholar 

  31. Zhao, X., Lin, Y., Heikkila, J.: Dynamic texture recognition using volume local binary count patterns with an application to 2D face spoofing detection. IEEE Trans. Multimed. 20(3), 552–566 (2018)

    Article  Google Scholar 

  32. Kose, N., Dugelay, J.: Classification of captured and recaptured images to detect photograph spoofing. In International Conference on Informatics, Electronics Vision (ICIEV). pp. 1027–1032 (2012)

  33. Guo, Z., Zhang, L., Zhang, D.: Rotation invariant texture classification using LBP variance (LBPV) with global matching. Pattern Recogn. 43(3), 706–719 (2010a)

    Article  Google Scholar 

  34. Shu, X., Pan, L., Wu, X.: Multi-scale contour flexibility shape signature for Fourier descriptor. J. Vis. Commun. Image Represent. 26, 161–167 (2015)

    Article  Google Scholar 

  35. Guo, Z., Zhang, L., Zhang, D.: A completed modeling of local binary pattern operator for texture classification. IEEE Trans. Image Process. 19(6), 1657–1663 (2010b)

    Article  MathSciNet  Google Scholar 

  36. Song, X., Zhao, X., Fang, L., Lin, T.: Discriminative representation combinations for accurate face spoofing detection. Pattern Recogn. 85, 220–231 (2019)

    Article  Google Scholar 

  37. Tu, X., Zhang, H., Xie, M., Luo, Y., Zhang, Y., Zheng, M.: Enhance the motion cues for face anti-spoofing using CNN-LSTM architecture. CoRR, abs/1901.05635, (2019)

  38. Sun, W., Song, Y., Chen, C., Huang, J., Kot, A.C.: Face spoofing detection based on local ternary label supervision in fully convolutional networks. IEEE Trans. Inf. Forensics Secur. 15, 3181–3196 (2020). https://doi.org/10.1109/TIFS.2020.2985530

    Article  Google Scholar 

  39. Ali, Z., Park, U.: Face spoofing attack detection using spatial frequency and gradient-based descriptor. KSII Trans. Internet Inf. Syst. 13(2), 892–911 (2019)

    Google Scholar 

  40. Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.Z.: A face antispoofing database with diverse attacks. In International Conference on Biometrics (ICB). pp. 26–31 (2012)

  41. Costa-Pazo, A., Bhattacharjee, S., Vazquez-Fernandez, E., Marcel, S.: The replay-mobile face presentation-attack database. In International Conference on Biometrics Special Interests Group. pp. 209–216 (2016)

  42. Boulkenafet, Z., Komulainen, J., Li, L., Feng, X., Hadid, A.: OULU-NPU: A mobile face presentation attack database with real-world variations. In IEEE International Conference on Automatic Face and Gesture Recognition. pp. 612–618 (2017)

  43. Peng, F., Qin, L., Long, M.: Face presentation attack detection using guided scale texture. Multimed. Tools Appl. 22(7), 8883–8909 (2018)

    Article  Google Scholar 

  44. Tan, X., Triggs, B.: Enhanced local texture feature sets for face recognition under difficult lighting conditions. IEEE Trans. Image Process. 19(6), 1635–1650 (2010)

    Article  MathSciNet  Google Scholar 

  45. Li, H., He, P., Wang, S., Rocha, A., Jiang, X., Kot, A.C.: Learning generalized deep feature representation for face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 13(10), 2639–2652 (2018)

    Article  Google Scholar 

  46. Tu, X., Zhang, H., Xie, M., Luo, Y., Zhang, Y., Ma, Z.: Enhance the motion cues for face anti-spoofing using CNN-LSTM architecture. CoRR, abs/1901.05635 (2019)

Download references

Acknowledgements

This work is partially supported by National Science Foundation of China (61772244, 61876072), the project was funded by the Open Project Program of Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education (JYB201711).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Shu.

Additional information

Communicated by B.-K. Bao.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shu, X., Tang, H. & Huang, S. Face spoofing detection based on chromatic ED-LBP texture feature. Multimedia Systems 27, 161–176 (2021). https://doi.org/10.1007/s00530-020-00719-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-020-00719-9

Keywords

Navigation