skip to main content
10.1145/3594315.3594661acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccaiConference Proceedingsconference-collections
research-article

An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing

Published: 02 August 2023 Publication History

Abstract

Face spoofing is a serious threat to the security of face recognition and face anti-spoofing (FAS) has become one of the popular research directions recently. The pipeline of modern face anti-spoofing methods is to train deep neural networks to distinguish live and spoof faces using various auxiliary information. Depth maps are the most commonly used auxiliary features due to their computational simplicity and ease of discrimination. However, existing methods do not generalize well in complex environments and against unknown attacks. In this paper, we propose a novel FAS method using generative adversarial network (GAN). We train a GAN for generating depth maps of faces. The network uses the architecture of Wasserstein GAN and adds an attention module to learn the contribution of different regions to the deep graph. The classifier is trained using a latent variable containing depth information in the network. Experiments demonstrate that our approach can better generalize complex external conditions such as illumination and background. Among all results, we gain the best result of 1.17% (EER) on CASIA-FASD and 21.57% (HTER) on cross testing between Replay-Attack and CASIA-FASD.

References

[1]
Martin Arjovsky, Soumith Chintala, and Léon Bottou. 2017. Wasserstein generative adversarial networks. In International conference on machine learning. PMLR, 214–223.
[2]
Yousef Atoum, Yaojie Liu, Amin Jourabloo, and Xiaoming Liu. 2017. Face anti-spoofing using patch and depth-based CNNs. In 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 319–328.
[3]
Zinelabdine Boulkenafet, Jukka Komulainen, Zahid Akhtar, Azeddine Benlamoudi, Djamel Samai, Salah Eddine Bekhouche, Abdelkrim Ouafi, Fadi Dornaika, Abdelmalik Taleb-Ahmed, Le Qin, 2017. A competition on generalized software-based face presentation attack detection in mobile scenarios. In 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 688–696.
[4]
Zinelabidine Boulkenafet, Jukka Komulainen, and Abdenour Hadid. 2015. Face anti-spoofing based on color texture analysis. In 2015 IEEE international conference on image processing (ICIP). IEEE, 2636–2640.
[5]
Zinelabinde Boulkenafet, Jukka Komulainen, Lei Li, Xiaoyi Feng, and Abdenour Hadid. 2017. OULU-NPU: A mobile face presentation attack database with real-world variations. In 2017 12th IEEE international conference on automatic face & gesture recognition (FG 2017). IEEE, 612–618.
[6]
Haonan Chen, Guosheng Hu, Zhen Lei, Yaowu Chen, Neil M Robertson, and Stan Z Li. 2019. Attention-based two-stream convolutional networks for face spoofing detection. IEEE Transactions on Information Forensics and Security 15 (2019), 578–593.
[7]
Ivana Chingovska, André Anjos, and Sébastien Marcel. 2012. On the effectiveness of local binary patterns in face anti-spoofing. In 2012 BIOSIG-proceedings of the international conference of biometrics special interest group (BIOSIG). IEEE, 1–7.
[8]
Navneet Dalal and Bill Triggs. 2005. Histograms of oriented gradients for human detection. In 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR’05), Vol. 1. Ieee, 886–893.
[9]
ENISA. [n. d.]. Beware of Digital ID attacks: your face can be spoofed!https://www.enisa.europa.eu/news/enisa-news/beware-of-digital-id-attacks-your-face-can-be-spoofed Accessed January 20, 2022.
[10]
Yao Feng, Fan Wu, Xiaohu Shao, Yanfeng Wang, and Xi Zhou. 2018. Joint 3d face reconstruction and dense alignment with position map regression network. In Proceedings of the European conference on computer vision (ECCV). 534–551.
[11]
Javier Galbally and Sébastien Marcel. 2014. Face anti-spoofing based on general image quality assessment. In 2014 22nd international conference on pattern recognition. IEEE, 1173–1178.
[12]
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2020. Generative adversarial networks. Commun. ACM 63, 11 (2020), 139–144.
[13]
Jianzhu Guo, Xiangyu Zhu, Yang Yang, Fan Yang, Zhen Lei, and Stan Z Li. 2020. Towards fast, accurate and stable 3d dense face alignment. In European Conference on Computer Vision. Springer, 152–168.
[14]
Phillip Isola, Jun-Yan Zhu, Tinghui Zhou, and Alexei A Efros. 2017. Image-to-image translation with conditional adversarial networks. In Proceedings of the IEEE conference on computer vision and pattern recognition. 1125–1134.
[15]
Syed Safwan Khalid, Muhammad Awais, Zhen-Hua Feng, Chi-Ho Chan, Ammarah Farooq, Ali Akbari, and Josef Kittler. 2020. Resolution invariant face recognition using a distillation approach. IEEE Transactions on Biometrics, Behavior, and Identity Science 2, 4 (2020), 410–420.
[16]
Taewook Kim, YongHyun Kim, Inhan Kim, and Daijin Kim. 2019. Basn: Enriching feature representation using bipartite auxiliary supervisions for face anti-spoofing. In Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops. 0–0.
[17]
Haoliang Li, Peisong He, Shiqi Wang, Anderson Rocha, Xinghao Jiang, and Alex C Kot. 2018. Learning generalized deep feature representation for face anti-spoofing. IEEE Transactions on Information Forensics and Security 13, 10 (2018), 2639–2652.
[18]
Yaojie Liu, Amin Jourabloo, and Xiaoming Liu. 2018. Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In Proceedings of the IEEE conference on computer vision and pattern recognition. 389–398.
[19]
Yaojie Liu, Joel Stehouwer, and Xiaoming Liu. 2020. On disentangling spoof trace for generic face anti-spoofing. In European Conference on Computer Vision. Springer, 406–422.
[20]
Mehdi Mirza and Simon Osindero. 2014. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784 (2014).
[21]
José Augusto Cadena Moreano and NBLS Palomino. 2020. Global facial recognition using gabor wavelet, support vector machines and 3d face models. Journal of Advances in Information Technology 11, 3 (2020).
[22]
Chang Keun Paik, Naeun Ko, and Yongjoon Yoo. 2022. More than just an auxiliary loss: Anti-spoofing Backbone Training via Adversarial Pseudo-depth Generation. In Proceedings of SAI Intelligent Systems Conference. Springer, 830–844.
[23]
Ganesh G Patil and Rohitash K Banyal. 2020. A dynamic unconstrained feature matching algorithm for face recognition. Journal of Advances in Information Technology 11, 2 (2020).
[24]
Raghavendra Ramachandra and Christoph Busch. 2017. Presentation attack detection methods for face recognition systems: A comprehensive survey. ACM Computing Surveys (CSUR) 50, 1 (2017), 1–37.
[25]
Yahang Wang, Xiaoning Song, Tianyang Xu, Zhenhua Feng, and Xiao-Jun Wu. 2021. From RGB to depth: domain transfer network for face anti-spoofing. IEEE Transactions on Information Forensics and Security 16 (2021), 4280–4290.
[26]
Zezheng Wang, Zitong Yu, Chenxu Zhao, Xiangyu Zhu, Yunxiao Qin, Qiusheng Zhou, Feng Zhou, and Zhen Lei. 2020. Deep spatial gradient and temporal depth learning for face anti-spoofing. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 5042–5051.
[27]
Sanghyun Woo, Jongchan Park, Joon-Young Lee, and In So Kweon. 2018. Cbam: Convolutional block attention module. In Proceedings of the European conference on computer vision (ECCV). 3–19.
[28]
Zhenqi Xu, Shan Li, and Weihong Deng. 2015. Learning temporal features using LSTM-CNN architecture for face anti-spoofing. In 2015 3rd IAPR asian conference on pattern recognition (ACPR). IEEE, 141–145.
[29]
Jianwei Yang, Zhen Lei, and Stan Z Li. 2014. Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601 (2014).
[30]
Xiao Yang, Wenhan Luo, Linchao Bao, Yuan Gao, Dihong Gong, Shibao Zheng, Zhifeng Li, and Wei Liu. 2019. Face anti-spoofing: Model matters, so does data. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 3507–3516.
[31]
Zitong Yu, Chenxu Zhao, Zezheng Wang, Yunxiao Qin, Zhuo Su, Xiaobai Li, Feng Zhou, and Guoying Zhao. 2020. Searching central difference convolutional networks for face anti-spoofing. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 5295–5305.
[32]
Zhiwei Zhang, Junjie Yan, Sifei Liu, Zhen Lei, Dong Yi, and Stan Z Li. 2012. A face antispoofing database with diverse attacks. In 2012 5th IAPR international conference on Biometrics (ICB). IEEE, 26–31.
[33]
Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei A Efros. 2017. Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proceedings of the IEEE international conference on computer vision. 2223–2232.

Cited By

View all
  • (2025)Unmasking Deception: A Comprehensive Survey on the Evolution of Face Anti‐spoofing MethodsNeurocomputing10.1016/j.neucom.2024.128992617(128992)Online publication date: Feb-2025
  • (2024)Securing Faces: A GAN-Powered Defense Against Spoofing with MSRCR and CBAMPattern Recognition10.1007/978-3-031-78201-5_28(430-449)Online publication date: 2-Dec-2024

Index Terms

  1. An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCAI '23: Proceedings of the 2023 9th International Conference on Computing and Artificial Intelligence
    March 2023
    824 pages
    ISBN:9781450399029
    DOI:10.1145/3594315
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 August 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. attention mechanism
    2. face anti-spoofing
    3. generative adversarial network

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCAI 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)47
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Unmasking Deception: A Comprehensive Survey on the Evolution of Face Anti‐spoofing MethodsNeurocomputing10.1016/j.neucom.2024.128992617(128992)Online publication date: Feb-2025
    • (2024)Securing Faces: A GAN-Powered Defense Against Spoofing with MSRCR and CBAMPattern Recognition10.1007/978-3-031-78201-5_28(430-449)Online publication date: 2-Dec-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media