ABSTRACT
Facial recognition is a popular biometric authentica-tion technique, but it is rarely used in practice for de-vice unlock or website / app login in smartphones, alt-hough most of them are equipped with a front-facing camera. Security issues (e.g. 2D media attack and vir-tual camera attack) and ease of use are two important factors that impede the prevalence of facial authentica-tion in mobile devices. In this paper, we propose a new sensor-assisted facial authentication method to over-come these limitations. Our system uses motion and light sensors to defend against 2D media attacks and virtual camera attacks without the penalty of authenti-cation speed. We conduct experiments to validate our method. Results show 95-97% detection rate and 2-3% false alarm rate over 450 trials in real-settings, indicat-ing high security obtained by the scheme ten times faster than existing 3D facial authentications (3 sec-onds compared to 30 seconds).
- R. Jenkins and A. Burton, 100% accuracy in automatic face recognition. Science, 319 (5862): 435, January 2008.Google ScholarCross Ref
- A. F. Abate, M. Nappi, D. Riccio, and G. Sabatino. 2D and 3D face recognition: a survey. Pattern Recognition Letters, 28(14): 1885--1906, 2007. Google ScholarDigital Library
- G. Pan, L. Sun, Z. Wu, and S. Lao, Eyeblink-based anti-spoofing in face recognition from a generic webcamera. IEEE 11th International Conference on Computer Vision, 2007.Google ScholarCross Ref
- www.androidauthority.com/android-jelly-bean-face-unlock-blink-hacking -105556/Google Scholar
- www.youtube.com/watch?v=UKIZBbvloO8Google Scholar
- C. Queirolo, L. Silva, O. Bellon, and M. Pamplona. 3D face recognition using simulated annealing and the surface interpenetration measure. IEEE Trans. on Pattern Analysis and Machine Intelligence, 32(2): 206--219, 2010. Google ScholarDigital Library
- V. Blanz and T. Vetter. Face recognition based on fitting a 3D morphable model. IEEE Trans. on Pattern Analysis and Machine Intelligence, 25(9): 1063--1074, 2003. Google ScholarDigital Library
- http://www.manycam.comGoogle Scholar
- G. Pan, L. Sun, Z. Wu, and Y. Wang. Monocular camera-based face liveness detection by combining eye-blink and scene context. Journal of Telecommunication Systems, 2009.Google Scholar
- J. Li, Y. Wang, T. Tan, and A. K. Jain. Live face de-tection based on the analysis of fourier spectra. Bio-metric Technology for Human Identification, 2004.Google ScholarCross Ref
- J. Bai, T. Ng, X. Gao, and Y. Shi. Is physics-based liveness detection truly possible with a single image?. IEEE International Symposium on Circuits and Sys-tems, 2010.Google ScholarCross Ref
- X. Tan, Y. Li, J. Liu, and L. Jiang. Face liveness de-tection from a single image with sparse low rank bi-linear discriminative model. Computer Vision ECCV, vol. 6316, pp. 504--517, 2010. Google ScholarDigital Library
- W. Bao, H. Li, N. Li, and W. Jiang. A liveness detec-tion method for face recognition based on optical field. IEEE International Conference on Image Analysis and Signal Processing, 2009.Google Scholar
- Y. Wang, J. Liu, and X. Tang. Robust 3D face recog-nition by local shape difference boosting. IEEE Trans. on Pattern Analysis and Machine Intelligence, 32(10): 1858--1870, 2010. Google ScholarDigital Library
- B. Amberg, R. Knothe, and T. Vetter. Expression in-variant 3D face recognition with a morphable model. 8th IEEE International Conference on Automatic Face and Gesture Recognition, 2008.Google Scholar
- http://uniqul.com/news/17-launchGoogle Scholar
- http://www.guthspot.se/video/deshaker.htmGoogle Scholar
- F. Vella, A. Castorina, M. Mancuso, and G. Messina. Digital image stabilization by adaptive block motion vectors filtering. IEEE Trans. on Consumer Electron-ics, 48(3): 796--801, 2002. Google ScholarDigital Library
- Y. Xu and S. Qin, A new approach to video stabiliza-tion with iterative smoothing. IEEE International Conference on Signal Processing, 2010.Google ScholarCross Ref
- P. Viola and M. Jones. Robust real-time face detection. International Journal of Computer Vision, (57)2: 137--154, 2004. Google ScholarDigital Library
- G. Sandbach, S. Zaferiou, M. Pantic, and L. Yin. Static and dynamic 3D facial expression recognition: A comprehensive survey. Image and Vision Compu-ting, 2012. Google ScholarDigital Library
- S. Shirazi, A. P. Moghadam, H. Ketabdar, and A. Schmidt. Assessing the vulnerability of magnetic ges-tural authentication to video-based shoulder surfing attacks. In Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, pages 2045--2048. ACM, 2012. Google ScholarDigital Library
- B. Biggio, Z. Akthar, G. Fumera, G. L. Marcialis, and F. Roli. Security evaluation of biometric authentica-tion systems under realistic spoofing attacks. IET bi-ometrics, 1(1): 11--24, 2012.Google Scholar
- K. H. Kamer, A. Yüksel, A. Jahnbekam, M. Roshan-del, and D. Skirpo. Magisign: User identifica-tion/authentication based on 3d around device mag-netic signatures. In Proceedings of 4th International Conference on Mobile Ubiquitous Computing, Sys-tems, Services and Technologies, pages 31--34. 2010.Google Scholar
Index Terms
- Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones
Recommendations
Fusion of face recognition and facial expression detection for authentication: a proposed model
IMCOM '17: Proceedings of the 11th International Conference on Ubiquitous Information Management and CommunicationThe paper presents a novel model of hybrid biometric-based authentication. Currently, the recognition accuracy of a single biometric verification system is often much reduced due to many factors such as the environment, user mode and physiological ...
PalmHashing: a novel approach for dual-factor authentication
Many systems require a reliable personal authentication infrastructure to recognise the identity of a claimant before granting access to him/her. Conventional secure measures include the possession of an identity card or special knowledge like password ...
A survey of attacks on iris biometric systems
Biometric recognition has several applications that provide reliable solutions to the user authentication problem. Its widespread use and popularity is itself making it prone to several vulnerabilities. Iris is emerging as one of the most popular and ...
Comments