skip to main content
10.1145/3591106.3592289acmconferencesArticle/Chapter ViewAbstractPublication PagesicmrConference Proceedingsconference-collections
research-article

FaceLivePlus: A Unified System for Face Liveness Detection and Face Verification

Published:12 June 2023Publication History

ABSTRACT

Face verification is a trending way to verify someone’s identity in broad applications. But such systems are vulnerable to face spoofing attacks via, for example, a fraudulent copy of a photo, making it necessary to include face liveness detection as an additional safeguard. Among most existing studies, the face liveness detection is realized in a separate machine learning model in addition to the model for face verification. Such a two-model configuration may face challenges when deployed onto platforms with limited computation power and storage (e.g. mobile phone, IoT devices), especially considering each model may have millions of parameters. Inspired by the fact that humans can verify a person’s identity and liveness at a single glance from a face, we develop a novel system, named FaceLivePlus, to learn a single and universal face descriptor for the two tasks (face verification and liveness detection) so that the computational workload and storage space can be halved. To achieve this, we formulate the underlying relationship between the two tasks, and seamlessly embed this relationship in a distance ranking deep model. The model directly works on features rather than classification labels, which makes the system well generalized on unseen data. Extensive experiments show that our average half total error rate (HTER) has at least 15% and 8% improvement from the state-of-the-arts on two benchmark datasets. We anticipate this approach could become a new direction for face authentication.

References

  1. Sheng Hua Bao, Min Li, Wei Hong Qian, and Zhong Su. 2017. Secure face authentication with liveness detection for mobile. US Patent 9,684,779.Google ScholarGoogle Scholar
  2. Zinelabidine Boulkenafet, Jukka Komulainen, and Abdenour Hadid. 2016. Face spoofing detection using colour texture analysis. IEEE Transactions on Information Forensics and Security 11, 8 (2016), 1818–1830.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Zinelabinde Boulkenafet, Jukka Komulainen, Lei Li, Xiaoyi Feng, and Abdenour Hadid. 2017. OULU-NPU: A mobile face presentation attack database with real-world variations. In FG. 612–618.Google ScholarGoogle Scholar
  4. Qiong Cao, Li Shen, Weidi Xie, Omkar M Parkhi, and Andrew Zisserman. 2018. Vggface2: A dataset for recognising faces across pose and age. In FG. 67–74.Google ScholarGoogle Scholar
  5. Hakan Cevikalp and Bill Triggs. 2010. Face recognition based on image sets. In CVPR. 2567–2573.Google ScholarGoogle Scholar
  6. Zhao Chen, Vijay Badrinarayanan, Chen-Yu Lee, and Andrew Rabinovich. 2018. Gradnorm: Gradient normalization for adaptive loss balancing in deep multitask networks. In International Conference on Machine Learning. 794–803.Google ScholarGoogle Scholar
  7. Ivana Chingovska, André Anjos, and Sébastien Marcel. 2012. On the Effectiveness of Local Binary Patterns in Face Anti-spoofing. IEEE BIOSIG 2012.Google ScholarGoogle Scholar
  8. Ivana Chingovska, André Anjos, and Sébastien Marcel. 2012. On the effectiveness of local binary patterns in face anti-spoofing. In BIOSIG. 1–7.Google ScholarGoogle Scholar
  9. Ivana Chingovska, Amir Mohammadi, André Anjos, and Sébastien Marcel. 2019. Evaluation Methodologies for Biometric Presentation Attack Detection. In Handbook of Biometric Anti-Spoofing. Springer, 457–480.Google ScholarGoogle Scholar
  10. Sumit Chopra, Raia Hadsell, and Yann LeCun. [n.d.]. Learning a similarity metric discriminatively, with application to face verification. In CVPR.Google ScholarGoogle Scholar
  11. Tiago de Freitas Pereira, Jukka Komulainen, André Anjos, José Mario De Martino, Abdenour Hadid, Matti Pietikäinen, and Sébastien Marcel. 2014. Face liveness detection using dynamic texture. EURASIP Journal on Image and Video Processing 2014, 1 (2014), 2.Google ScholarGoogle ScholarCross RefCross Ref
  12. Jiankang Deng, Jia Guo, Niannan Xue, and Stefanos Zafeiriou. 2019. Arcface: Additive angular margin loss for deep face recognition. In CVPR. 4690–4699.Google ScholarGoogle Scholar
  13. Nesli Erdogmus and Sebastien Marcel. 2013. Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect. In BTAS. IEEE, 1–6.Google ScholarGoogle Scholar
  14. Litong Feng, Lai-Man Po, Yuming Li, Xuyuan Xu, Fang Yuan, Terence Chun-Ho Cheung, and Kwok-Wai Cheung. 2016. Integration of image quality and motion cues for face anti-spoofing: A neural network approach. Journal of Visual Communication and Image Representation 38 (2016), 451–460.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Javier Galbally, Sébastien Marcel, and Julian Fierrez. 2014. Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition. IEEE transactions on image processing 23, 2 (2014), 710–724.Google ScholarGoogle Scholar
  16. Shiming Ge, Shengwei Zhao, Xindi Gao, and Jia Li. 2019. Fewer-Shots and Lower-Resolutions: Towards Ultrafast Face Recognition in the Wild. In ACM MM. 229–237.Google ScholarGoogle Scholar
  17. Michelle Guo, Albert Haque, De-An Huang, Serena Yeung, and Li Fei-Fei. 2018. Dynamic task prioritization for multitask learning. In ECCV.Google ScholarGoogle Scholar
  18. Junlin Hu, Jiwen Lu, and Yap-Peng Tan. 2014. Discriminative deep metric learning for face verification in the wild. In CVPR. 1875–1882.Google ScholarGoogle Scholar
  19. Iasonas Kokkinos. 2017. Ubernet: Training a universal convolutional neural network for low-, mid-, and high-level vision using diverse datasets and limited memory. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 6129–6138.Google ScholarGoogle ScholarCross RefCross Ref
  20. Huafeng Kuang, Rongrong Ji, Hong Liu, Shengchuan Zhang, Xiaoshuai Sun, Feiyue Huang, and Baochang Zhang. 2019. Multi-modal Multi-layer Fusion Network with Average Binary Center Loss for Face Anti-spoofing. In ACM MM. 48–56.Google ScholarGoogle Scholar
  21. Chien Eao Lee, Lilei Zheng, Ying Zhang, Vrizlynn LL Thing, and Ying Yu Chu. 2018. Towards building a remote anti-spoofing face authentication system. In TENCON 2018-2018 IEEE Region 10 Conference. IEEE, 0321–0326.Google ScholarGoogle ScholarCross RefCross Ref
  22. Haoliang Li, Wen Li, Hong Cao, Shiqi Wang, Feiyue Huang, and Alex C Kot. 2018. Unsupervised domain adaptation for face anti-spoofing. IEEE Transactions on Information Forensics and Security 13, 7 (2018), 1794–1809.Google ScholarGoogle ScholarCross RefCross Ref
  23. Lei Li, Xiaoyi Feng, Zinelabidine Boulkenafet, Zhaoqiang Xia, Mingming Li, and Abdenour Hadid. 2016. An original face anti-spoofing approach using partial convolutional neural network. In IPTA. 1–6.Google ScholarGoogle Scholar
  24. Lei Li, Zhaoqiang Xia, Xiaoyue Jiang, Fabio Roli, and Xiaoyi Feng. 2018. Face presentation attack detection in learned color-liked space. arXiv preprint arXiv:1810.13170 (2018).Google ScholarGoogle Scholar
  25. Yan Li, Yingjiu Li, Ke Xu, Qiang Yan, and Robert H Deng. 2016. Empirical study of face authentication systems under OSNFD attacks. IEEE Transactions on Dependable and Secure Computing 15, 2 (2016), 231–245.Google ScholarGoogle ScholarCross RefCross Ref
  26. Tsung-Yi Lin, Priya Goyal, Ross Girshick, Kaiming He, and Piotr Dollár. 2017. Focal loss for dense object detection. In Proceedings of the IEEE international conference on computer vision. 2980–2988.Google ScholarGoogle ScholarCross RefCross Ref
  27. Jukka Määttä, Abdenour Hadid, and Matti Pietikäinen. 2011. Face spoofing detection from single images using micro-texture analysis. In IJCB. 1–7.Google ScholarGoogle Scholar
  28. Zuheng Ming, Junshi Xia, Muhammad Muzzamil Luqman, Jean-Christophe Burie, and Kaixing Zhao. 2019. FaceLiveNet+: A Holistic Networks For Face Authentication Based On Dynamic Multi-task Convolutional Neural Networks. arXiv preprint arXiv:1902.11179 (2019).Google ScholarGoogle Scholar
  29. Olivier Moindrot. 2018. Triplet Loss and Online Triplet Mining in TensorFlow. https://omoindrot.github.io/triplet-loss##batch-hard-strategy.Google ScholarGoogle Scholar
  30. Gang Pan, Lin Sun, Zhaohui Wu, and Shihong Lao. 2007. Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In ICCV. IEEE, 1–8.Google ScholarGoogle Scholar
  31. Norman Poh and Samy Bengio. 2006. Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication. Pattern Recognition 39, 2 (2006), 223–233.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Yasar Abbas Ur Rehman, Lai-Man Po, Mengyang Liu, Zijie Zou, Weifeng Ou, and Yuzhi Zhao. 2019. Face liveness detection using convolutional-features fusion of real and deep network generated face images. Journal of Visual Communication and Image Representation 59 (2019), 574–582.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Sebastian Ruder. 2017. An overview of multi-task learning in deep neural networks. arXiv preprint arXiv:1706.05098 (2017).Google ScholarGoogle Scholar
  34. Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. Facenet: A unified embedding for face recognition and clustering. In CVPR. 815–823.Google ScholarGoogle Scholar
  35. Xiaokang Tu and Yuchun Fang. 2017. Ultra-deep neural network for face anti-spoofing. In International Conference on Neural Information Processing. Springer, 686–695.Google ScholarGoogle ScholarCross RefCross Ref
  36. Matthew Turk and Alex Pentland. 1991. Face recognition using eigenfaces. In CVPR. 586–587.Google ScholarGoogle Scholar
  37. Hao Wang, Yitong Wang, Zheng Zhou, Xing Ji, Dihong Gong, Jingchao Zhou, Zhifeng Li, and Wei Liu. 2018. Cosface: Large margin cosine loss for deep face recognition. In CVPR. 5265–5274.Google ScholarGoogle Scholar
  38. Di Wen, Hu Han, and Anil K Jain. 2015. Face spoof detection with image distortion analysis. IEEE Transactions on Information Forensics and Security 10, 4 (2015), 746–761.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Yue Wu, Hongfu Liu, Jun Li, and Yun Fu. 2017. Deep face recognition with center invariant loss. In ACM MM Thematic Workshops. 408–414.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Zhenqi Xu, Shan Li, and Weihong Deng. 2015. Learning temporal features using LSTM-CNN architecture for face anti-spoofing. In ACPR. 141–145.Google ScholarGoogle Scholar
  41. Jianwei Yang, Zhen Lei, and Stan Z Li. 2014. Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601 (2014).Google ScholarGoogle Scholar
  42. Yingyuan Yang, Jinyuan Sun, and Linke Guo. 2016. PersonaIA: a lightweight implicit authentication system based on customized user behavior selection. IEEE Transactions on Dependable and Secure Computing 16, 1 (2016), 113–126.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Hao Ye, Weiyuan Shao, Hong Wang, Jianqi Ma, Li Wang, Yingbin Zheng, and Xiangyang Xue. 2016. Face recognition via active annotation and learning. In ACM MM. 1058–1062.Google ScholarGoogle Scholar
  44. Dong Yi, Zhen Lei, Shengcai Liao, and Stan Z Li. 2014. Learning face representation from scratch. arXiv preprint arXiv:1411.7923 (2014).Google ScholarGoogle Scholar
  45. Xiaowen Ying, Xin Li, and Mooi Choo Chuah. 2018. LiveFace: A Multi-task CNN for Fast Face-Authentication. In ICMLA. 955–960.Google ScholarGoogle Scholar
  46. Byungin Yoo, KWAK Youngjun, Jungbae Kim, SON Jinwoo, LEE Changkyo, Chang Kyu Choi, and HAN JaeJoon. 2019. Liveness test method and apparatus. US Patent App. 16/148,587.Google ScholarGoogle Scholar
  47. Kaipeng Zhang, Zhanpeng Zhang, Zhifeng Li, and Yu Qiao. 2016. Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Processing Letters 23, 10 (2016), 1499–1503.Google ScholarGoogle ScholarCross RefCross Ref
  48. Yan Ke He Zhen-Yu Zhang, Jian and Yong Xu. 2014. A Collaborative Linear Discriminative Representation Classification Method for Face Recognition. In International Conference on Artificial Intelligence and Software Engineering.Google ScholarGoogle Scholar
  49. Zhiwei Zhang, Junjie Yan, Sifei Liu, Zhen Lei, Dong Yi, and Stan Z Li. 2012. A face antispoofing database with diverse attacks. In ICB. 26–31.Google ScholarGoogle Scholar

Index Terms

  1. FaceLivePlus: A Unified System for Face Liveness Detection and Face Verification

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ICMR '23: Proceedings of the 2023 ACM International Conference on Multimedia Retrieval
            June 2023
            694 pages
            ISBN:9798400701788
            DOI:10.1145/3591106

            Copyright © 2023 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 12 June 2023

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            Overall Acceptance Rate254of830submissions,31%

            Upcoming Conference

            ICMR '24
            International Conference on Multimedia Retrieval
            June 10 - 14, 2024
            Phuket , Thailand

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format