36 research outputs found
Complementary Countermeasures for Detecting Scenic Face Spoofing Attacks
The face recognition community has finally started paying more attention to the long-neglected problem of spoofing attacks. The number of countermeasures is gradually increasing and fairly good results have been reported on the publicly available databases. There exists no superior anti-spoofing technique due to the varying nature of attack scenarios and acquisition conditions. Therefore, it is important to find out complementary countermeasures and study how they should be combined in order to construct an easily extensible anti-spoofing framework. In this paper, we address this issue by studying fusion of motion and texture based countermeasures under several types of scenic face attacks. We provide an intuitive way to explore the fusion potential of different visual cues and show that the performance of the individual methods can be vastly improved by performing fusion at score level. The Half-Total Error Rate (HTER) of the best individual countermeasure was decreased from 11.2% to 5.1% on the Replay Attack Database. More importantly, we question the idea of using complex classification schemes in individual countermeasures, since nearly same fusion performance is obtained by replacing them with a simple linear one. In this manner, the computational efficiency and also probably the generalization ability of the resulting anti-spoofing framework are increased
Fusion of Multiple Biometric For Photo-Attack Detection in Face Recognition Systems
A spoofing attack is a situation in which one person successfully masquerades as another by falsifying data and gaining illegitimate access. Spoofing attacks are of several types such as photograph, video or mask. Biometrics are playing the role of a password which cannot be replaced if stolen, so there is the necessity of counter-measures to biometric spoofing attacks. Face biometric systems are vulnerable to spoofing attack. Regardless of the biometric mode, the typical approach of anti-spoofing systems is to classify the biometric evidence which are based on features discriminating between real accesses and spoofing attacks. A number of biometric characteristics are in use in various applications. This system will be based on face recognition and lip movement recognition systems. This system will make use of client-specific information to build client-specific anti-spoofing solution, depending on a generative model. In this system, we will implement the client identity to detect spoofing attack. With this, it increases efficiency of authentication. The image will be captured and registered with its client identity. When user has to be authenticated, the image will be captured with his identity manually entered. Now system will check the image with respect to client identity only. Lip movement recognition will be done at time of authentication to identify whether client is spoof or not. If client is authenticated, then it will check for captured image dimension using Gaussian Mixture Model (GMM). This system also encrypts and decrypts a file by extracting parameter values of a registered face
Face liveness detection using dynamic texture
User authentication is an important step to protect information, and in this context, face biometrics is potentially advantageous. Face biometrics is natural, intuitive, easy to use, and less human-invasive. Unfortunately, recent work has revealed that face biometrics is vulnerable to spoofing attacks using cheap low-tech equipment. This paper introduces a novel and appealing approach to detect face spoofing using the spatiotemporal (dynamic texture) extensions of the highly popular local binary pattern operator. The key idea of the approach is to learn and detect the structure and the dynamics of the facial micro-textures that characterise real faces but not fake ones. We evaluated the approach with two publicly available databases (Replay-Attack Database and CASIA Face Anti-Spoofing Database). The results show that our approach performs better than state-of-the-art techniques following the provided evaluation protocols of each database2014This work has been performed within the context of the TABULA RASA project, part of the 7th Framework Research Programme of the European Union (EU), under the grant agreement number 257289. The financial support of FUNTTEL (Brazilian Telecommunication Technological Development Fund), Academy of Finland and Infotech Oulu Doctoral Program is also gratefully acknowledg
Directional Sensitivity of Gaze-Collinearity Features in Liveness Detection
To increase the trust in using face recognition systems, these need to be capable of differentiating between face images captured from a real person and those captured from photos or similar artifacts presented at the sensor. Methods have been published for face liveness detection by measuring the gaze of a user while the user tracks an object on the screen, which appears at pre-defined, places randomly. In this paper we explore the sensitivity of such a system to different stimulus alignments. The aim is to establish whether there is such sensitivity and if so to explore how this may be exploited for improving the design of the stimulus. The results suggest that collecting feature points along the horizontal direction is more effective than the vertical direction for liveness detection
Biometric antispoofing methods: A survey in face recognition
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. J. Galbally, S. Marcel and J. Fierrez, "Biometric Antispoofing Methods", IEEE Access, vol.2, pp. 1530-1552, Dec. 2014In recent decades, we have witnessed the evolution of biometric technology from the rst
pioneering works in face and voice recognition to the current state of development wherein a wide spectrum
of highly accurate systems may be found, ranging from largely deployed modalities, such as ngerprint,
face, or iris, to more marginal ones, such as signature or hand. This path of technological evolution has
naturally led to a critical issue that has only started to be addressed recently: the resistance of this rapidly
emerging technology to external attacks and, in particular, to spoo ng. Spoo ng, referred to by the term
presentation attack in current standards, is a purely biometric vulnerability that is not shared with other
IT security solutions. It refers to the ability to fool a biometric system into recognizing an illegitimate user
as a genuine one by means of presenting a synthetic forged version of the original biometric trait to the sensor.
The entire biometric community, including researchers, developers, standardizing bodies, and vendors, has
thrown itself into the challenging task of proposing and developing ef cient protection methods against this
threat. The goal of this paper is to provide a comprehensive overview on the work that has been carried out
over the last decade in the emerging eld of antispoo ng, with special attention to the mature and largely
deployed face modality. The work covers theories, methodologies, state-of-the-art techniques, and evaluation
databases and also aims at providing an outlook into the future of this very active eld of research.This work was supported in part by the CAM under Project S2009/TIC-1485, in part by the Ministry of Economy and Competitiveness through the Bio-Shield Project under Grant TEC2012-34881, in part by the TABULA RASA Project under Grant FP7-ICT-257289, in part by the BEAT Project under Grant FP7-SEC-284989 through the European Union, and in part by the Cátedra Universidad Autónoma de Madrid-Telefónica
Anti-spoofing using challenge-response user interaction
2D facial identification has attracted a great amount of attention over the past years, due to its several advantages including practicality and simple requirements. However, without its capability to recognize a real user from an impersonator, face identification system becomes ineffective and vulnerable to spoof attacks. With the great evolution of smart portable devices, more advanced sorts of attacks have been developed, especially the replayed videos spoofing attempts that are becoming more difficult to recognize. Consequently, several studies have investigated the types of vulnerabilities a face biometric system might encounter and proposed various successful anti-spoofing algorithms. Unlike spoofing detection for passive or motionless authentication methods that were profoundly studied, anti-spoofing systems applied on interactive user verification methods were broadly examined as a potential robust spoofing prevention approach. This study aims first at comparing the performance of the existing spoofing detection techniques on passive and interactive authentication methods using a more balanced collected dataset and second proposes a fusion scheme that combines both texture analysis with interaction in order to enhance the accuracy of spoofing detection
Biometric Spoofing: A JRC Case Study in 3D Face Recognition
Based on newly available and affordable off-the-shelf 3D sensing, processing and printing technologies, the JRC has conducted a comprehensive study on the feasibility of spoofing 3D and 2.5D face recognition systems with low-cost self-manufactured models and presents in this report a systematic and rigorous evaluation of the real risk posed by such attacking approach which has been complemented by a test campaign. The work accomplished and presented in this report, covers theories, methodologies, state of the art techniques, evaluation databases and also aims at providing an outlook into the future of this extremely active field of research.JRC.G.6-Digital Citizen Securit