251 research outputs found
Face Spoofing Detection by Fusing Binocular Depth and Spatial Pyramid Coding Micro-Texture Features
Robust features are of vital importance to face spoofing detection, because
various situations make feature space extremely complicated to partition. Thus
in this paper, two novel and robust features for anti-spoofing are proposed.
The first one is a binocular camera based depth feature called Template Face
Matched Binocular Depth (TFBD) feature. The second one is a high-level
micro-texture based feature called Spatial Pyramid Coding Micro-Texture (SPMT)
feature. Novel template face registration algorithm and spatial pyramid coding
algorithm are also introduced along with the two novel features. Multi-modal
face spoofing detection is implemented based on these two robust features.
Experiments are conducted on a widely used dataset and a comprehensive dataset
constructed by ourselves. The results reveal that face spoofing detection with
the fusion of our proposed features is of strong robustness and time
efficiency, meanwhile outperforming other state-of-the-art traditional methods.Comment: 5 pages, 2 figures, accepted by 2017 IEEE International Conference on
Image Processing (ICIP
An Overview of Face Liveness Detection
Face recognition is a widely used biometric approach. Face recognition
technology has developed rapidly in recent years and it is more direct, user
friendly and convenient compared to other methods. But face recognition systems
are vulnerable to spoof attacks made by non-real faces. It is an easy way to
spoof face recognition systems by facial pictures such as portrait photographs.
A secure system needs Liveness detection in order to guard against such
spoofing. In this work, face liveness detection approaches are categorized
based on the various types techniques used for liveness detection. This
categorization helps understanding different spoof attacks scenarios and their
relation to the developed solutions. A review of the latest works regarding
face liveness detection works is presented. The main aim is to provide a simple
path for the future development of novel and more secured face liveness
detection approach.Comment: International Journal on Information Theory (IJIT), Vol.3, No.2,
April 201
Learn Convolutional Neural Network for Face Anti-Spoofing
Though having achieved some progresses, the hand-crafted texture features,
e.g., LBP [23], LBP-TOP [11] are still unable to capture the most
discriminative cues between genuine and fake faces. In this paper, instead of
designing feature by ourselves, we rely on the deep convolutional neural
network (CNN) to learn features of high discriminative ability in a supervised
manner. Combined with some data pre-processing, the face anti-spoofing
performance improves drastically. In the experiments, over 70% relative
decrease of Half Total Error Rate (HTER) is achieved on two challenging
datasets, CASIA [36] and REPLAY-ATTACK [7] compared with the state-of-the-art.
Meanwhile, the experimental results from inter-tests between two datasets
indicates CNN can obtain features with better generalization ability. Moreover,
the nets trained using combined data from two datasets have less biases between
two datasets.Comment: 8 pages, 9 figures, 7 table
How far did we get in face spoofing detection?
The growing use of control access systems based on face recognition shed
light over the need for even more accurate systems to detect face spoofing
attacks. In this paper, an extensive analysis on face spoofing detection works
published in the last decade is presented. The analyzed works are categorized
by their fundamental parts, i.e., descriptors and classifiers. This structured
survey also brings the temporal evolution of the face spoofing detection field,
as well as a comparative analysis of the works considering the most important
public data sets in the field. The methodology followed in this work is
particularly relevant to observe trends in the existing approaches, to discuss
still opened issues, and to propose new perspectives for the future of face
spoofing detection
3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Face presentation attacks have become a major threat to face recognition
systems and many countermeasures have been proposed in the past decade.
However, most of them are devoted to 2D face presentation attacks, rather than
3D face masks. Unlike the real face, the 3D face mask is usually made of resin
materials and has a smooth surface, resulting in reflectance differences. So,
we propose a novel detection method for 3D face mask presentation attack by
modeling reflectance differences based on intrinsic image analysis. In the
proposed method, the face image is first processed with intrinsic image
decomposition to compute its reflectance image. Then, the intensity
distribution histograms are extracted from three orthogonal planes to represent
the intensity differences of reflectance images between the real face and 3D
face mask. After that, the 1D convolutional network is further used to capture
the information for describing different materials or surfaces react
differently to changes in illumination. Extensive experiments on the 3DMAD
database demonstrate the effectiveness of our proposed method in distinguishing
a face mask from the real one and show that the detection performance
outperforms other state-of-the-art methods
Deep Transfer Across Domains for Face Anti-spoofing
A practical face recognition system demands not only high recognition
performance, but also the capability of detecting spoofing attacks. While
emerging approaches of face anti-spoofing have been proposed in recent years,
most of them do not generalize well to new database. The generalization ability
of face anti-spoofing needs to be significantly improved before they can be
adopted by practical application systems. The main reason for the poor
generalization of current approaches is the variety of materials among the
spoofing devices. As the attacks are produced by putting a spoofing display
(e.t., paper, electronic screen, forged mask) in front of a camera, the variety
of spoofing materials can make the spoofing attacks quite different.
Furthermore, the background/lighting condition of a new environment can make
both the real accesses and spoofing attacks different. Another reason for the
poor generalization is that limited labeled data is available for training in
face anti-spoofing. In this paper, we focus on improving the generalization
ability across different kinds of datasets. We propose a CNN framework using
sparsely labeled data from the target domain to learn features that are
invariant across domains for face anti-spoofing. Experiments on public-domain
face spoofing databases show that the proposed method significantly improve the
cross-dataset testing performance only with a small number of labeled samples
from the target domain.Comment: 8 pages; 3 figures; 2 table
Face Presentation Attack Detection in Learned Color-liked Space
Face presentation attack detection (PAD) has become a thorny problem for
biometric systems and numerous countermeasures have been proposed to address
it. However, majority of them directly extract feature descriptors and
distinguish fake faces from the real ones in existing color spaces (e.g. RGB,
HSV and YCbCr). Unfortunately, it is unknown for us which color space is the
best or how to combine different spaces together. To make matters worse, the
real and fake faces are overlapped in existing color spaces. So, in this paper,
a learned distinguishable color-liked space is generated to deal with the
problem of face PAD. More specifically, we present an end-to-end deep learning
network that can map existing color spaces to a new learned color-liked space.
Inspired by the generator of generative adversarial network (GAN), the proposed
network consists of a space generator and a feature extractor. When training
the color-liked space, a new triplet combination mechanism of points-to-center
is explored to maximize interclass distance and minimize intraclass distance,
and also keep a safe margin between the real and presented fake faces.
Extensive experiments on two standard face PAD databases, i.e., Relay-Attack
and OULU-NPU, indicate that our proposed color-liked space analysis based
countermeasure significantly outperforms the state-of-the-art methods and show
excellent generalization capability
On the Learning of Deep Local Features for Robust Face Spoofing Detection
Biometrics emerged as a robust solution for security systems. However, given
the dissemination of biometric applications, criminals are developing
techniques to circumvent them by simulating physical or behavioral traits of
legal users (spoofing attacks). Despite face being a promising characteristic
due to its universality, acceptability and presence of cameras almost
everywhere, face recognition systems are extremely vulnerable to such frauds
since they can be easily fooled with common printed facial photographs.
State-of-the-art approaches, based on Convolutional Neural Networks (CNNs),
present good results in face spoofing detection. However, these methods do not
consider the importance of learning deep local features from each facial
region, even though it is known from face recognition that each facial region
presents different visual aspects, which can also be exploited for face
spoofing detection. In this work we propose a novel CNN architecture trained in
two steps for such task. Initially, each part of the neural network learns
features from a given facial region. Afterwards, the whole model is fine-tuned
on the whole facial images. Results show that such pre-training step allows the
CNN to learn different local spoofing cues, improving the performance and the
convergence speed of the final model, outperforming the state-of-the-art
approaches
Learning Generalized Spoof Cues for Face Anti-spoofing
Many existing face anti-spoofing (FAS) methods focus on modeling the decision
boundaries for some predefined spoof types. However, the diversity of the spoof
samples including the unknown ones hinders the effective decision boundary
modeling and leads to weak generalization capability. In this paper, we
reformulate FAS in an anomaly detection perspective and propose a
residual-learning framework to learn the discriminative live-spoof differences
which are defined as the spoof cues. The proposed framework consists of a spoof
cue generator and an auxiliary classifier. The generator minimizes the spoof
cues of live samples while imposes no explicit constraint on those of spoof
samples to generalize well to unseen attacks. In this way, anomaly detection is
implicitly used to guide spoof cue generation, leading to discriminative
feature learning. The auxiliary classifier serves as a spoof cue amplifier and
makes the spoof cues more discriminative. We conduct extensive experiments and
the experimental results show the proposed method consistently outperforms the
state-of-the-art methods. The code will be publicly available at
https://github.com/vis-var/lgsc-for-fas.Comment: 16 page
Generalized Presentation Attack Detection: a face anti-spoofing evaluation proposal
Over the past few years, Presentation Attack Detection (PAD) has become a
fundamental part of facial recognition systems. Although much effort has been
devoted to anti-spoofing research, generalization in real scenarios remains a
challenge. In this paper we present a new open-source evaluation framework to
study the generalization capacity of face PAD methods, coined here as
face-GPAD. This framework facilitates the creation of new protocols focused on
the generalization problem establishing fair procedures of evaluation and
comparison between PAD solutions. We also introduce a large aggregated and
categorized dataset to address the problem of incompatibility between publicly
available datasets. Finally, we propose a benchmark adding two novel evaluation
protocols: one for measuring the effect introduced by the variations in face
resolution, and the second for evaluating the influence of adversarial
operating conditions.Comment: 8 pages, to appear at International Conference on Biometrics (ICB19
- …