Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection

Face presentation attack detection (PAD) is essential for securing the widely used face recognition systems. Most of the existing PAD methods do not generalize well to unseen scenarios because labeled training data of the new domain is usually not available. In light of this, we propose an unsupervised domain adaptation with disentangled representation (DR-UDA) approach to improve the generalization capability of PAD into new scenarios. DR-UDA consists of three modules, i.e., ML-Net, UDA-Net and DR-Net. ML-Net aims to learn a discriminative feature representation using the labeled source domain face images via metric learning. UDA-Net performs unsupervised adversarial domain adaptation in order to optimize the source domain and target domain encoders jointly, and obtain a common feature space shared by both domains. As a result, the source domain PAD model can be effectively transferred to the unlabeled target domain for PAD. DR-Net further disentangles the features irrelevant to specific domains by reconstructing the source and target domain face images from the common feature space. Therefore, DR-UDA can learn a disentangled representation space which is generative for face images in both domains and discriminative for live vs. spoof classification. The proposed approach shows promising generalization capability in several public-domain face PAD databases.

[1]  Sébastien Marcel,et al.  Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[2]  Shifeng Zhang,et al.  A Dataset and Benchmark for Large-Scale Multi-Modal Face Anti-Spoofing , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[3]  Matti Pietikäinen,et al.  Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[4]  Jukka Komulainen,et al.  OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations , 2017, 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017).

[5]  Julian Fiérrez,et al.  Introduction to Iris Presentation Attack Detection , 2019, Handbook of Biometric Anti-Spoofing, 2nd Ed..

[6]  Anil K. Jain,et al.  Face Spoof Detection With Image Distortion Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[7]  Hong Li,et al.  A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[8]  Yu Qiao,et al.  A Discriminative Feature Learning Approach for Deep Face Recognition , 2016, ECCV.

[9]  Stan Z. Li,et al.  Learn Convolutional Neural Network for Face Anti-Spoofing , 2014, ArXiv.

[10]  Sébastien Marcel,et al.  Biometric Antispoofing Methods: A Survey in Face Recognition , 2014, IEEE Access.

[11]  Xilin Chen,et al.  Cross-Domain Face Presentation Attack Detection via Multi-Domain Disentangled Representation Learning , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[12]  Tao Shen,et al.  FaceBagNet: Bag-Of-Local-Features Model for Multi-Modal Face Anti-Spoofing , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[13]  Shiguang Shan,et al.  Duplex Generative Adversarial Network for Unsupervised Domain Adaptation , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[14]  Gabriela Csurka,et al.  Domain Adaptation for Visual Applications: A Comprehensive Survey , 2017, ArXiv.

[15]  Wenhan Luo,et al.  Face Anti-Spoofing: Model Matters, so Does Data , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[16]  Geoffrey E. Hinton,et al.  Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.

[17]  Feiyue Huang,et al.  Unsupervised Domain Adaptation for Face Anti-Spoofing , 2018, IEEE Transactions on Information Forensics and Security.

[18]  Geoffrey E. Hinton,et al.  Visualizing Data using t-SNE , 2008 .

[19]  Lin Sun,et al.  Blinking-Based Live Face Detection Using Conditional Random Fields , 2007, ICB.

[20]  Trevor Darrell,et al.  Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.

[21]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[22]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.

[23]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[24]  Junjie Yan,et al.  A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[25]  Anil K. Jain,et al.  Live face video vs. spoof face video: Use of moiré patterns to detect replay video attacks , 2015, 2015 International Conference on Biometrics (ICB).

[26]  Shiqi Wang,et al.  Learning Generalized Deep Feature Representation for Face Anti-Spoofing , 2018, IEEE Transactions on Information Forensics and Security.

[27]  Jukka Komulainen,et al.  Face Antispoofing Using Speeded-Up Robust Features and Fisher Vector Encoding , 2017, IEEE Signal Processing Letters.

[28]  Pong C. Yuen,et al.  Remote Photoplethysmography Correspondence Feature for 3D Mask Face Presentation Attack Detection , 2018, ECCV.

[29]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[30]  Pong C. Yuen,et al.  Multi-Adversarial Discriminative Deep Domain Generalization for Face Presentation Attack Detection , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[31]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[32]  Yaowu Chen,et al.  Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection , 2020, IEEE Transactions on Information Forensics and Security.

[33]  Lin Sun,et al.  Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[34]  Anderson Rocha,et al.  Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes , 2015, IEEE Transactions on Image Processing.

[35]  Xiaoming Liu,et al.  Face De-Spoofing: Anti-Spoofing via Noise Modeling , 2018, ECCV.

[36]  Aleksandr Parkin,et al.  Recognizing Multi-Modal Face Spoofing With Face Recognition Networks , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[37]  Lai-Man Po,et al.  Integration of image quality and motion cues for face anti-spoofing: A neural network approach , 2016, J. Vis. Commun. Image Represent..

[38]  Gian Luca Foresti,et al.  Biometric Liveness Detection: Challenges and Research Opportunities , 2015, IEEE Security & Privacy.

[39]  Trevor Darrell,et al.  Adversarial Discriminative Domain Adaptation , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[40]  Andrew Zisserman,et al.  Deep Face Recognition , 2015, BMVC.

[41]  Sébastien Marcel,et al.  LBP - TOP Based Countermeasure against Face Spoofing Attacks , 2012, ACCV Workshops.

[42]  Mengjie Zhang,et al.  Deep Reconstruction-Classification Networks for Unsupervised Domain Adaptation , 2016, ECCV.

[43]  Xilin Chen,et al.  Improving Cross-database Face Presentation Attack Detection via Adversarial Domain Adaptation , 2019, 2019 International Conference on Biometrics (ICB).

[44]  Josef Bigün,et al.  Real-Time Face Detection and Motion Analysis With Application in “Liveness” Assessment , 2007, IEEE Transactions on Information Forensics and Security.

[45]  Jukka Komulainen,et al.  Face anti-spoofing based on color texture analysis , 2015, 2015 IEEE International Conference on Image Processing (ICIP).

[46]  Tieniu Tan,et al.  Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.

[47]  Ming-Yu Liu,et al.  Coupled Generative Adversarial Networks , 2016, NIPS.

[48]  Kilian Q. Weinberger,et al.  Distance Metric Learning for Large Margin Nearest Neighbor Classification , 2005, NIPS.

[49]  Shiguang Shan,et al.  Multi-Modal Face Presentation Attack Detection via Spatial and Channel Attentions , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[50]  Weihong Deng,et al.  Learning temporal features using LSTM-CNN architecture for face anti-spoofing , 2015, 2015 3rd IAPR Asian Conference on Pattern Recognition (ACPR).

[51]  Victor S. Lempitsky,et al.  Unsupervised Domain Adaptation by Backpropagation , 2014, ICML.

[52]  David Windridge,et al.  Detection of Face Spoofing Using Visual Dynamics , 2015, IEEE Transactions on Information Forensics and Security.

[53]  Fei Peng,et al.  A competition on generalized software-based face presentation attack detection in mobile scenarios , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[54]  Jan Kautz,et al.  Unsupervised Image-to-Image Translation Networks , 2017, NIPS.

[55]  Johan A. K. Suykens,et al.  Least Squares Support Vector Machine Classifiers , 1999, Neural Processing Letters.

[56]  Taesung Park,et al.  CyCADA: Cycle-Consistent Adversarial Domain Adaptation , 2017, ICML.

[57]  James Philbin,et al.  FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[58]  Michael I. Jordan,et al.  Unsupervised Domain Adaptation with Residual Transfer Networks , 2016, NIPS.

[59]  Pong C. Yuen,et al.  Joint Discriminative Learning of Deep Dynamic Textures for 3D Mask Face Anti-Spoofing , 2019, IEEE Transactions on Information Forensics and Security.

[60]  Li Fei-Fei,et al.  Perceptual Losses for Real-Time Style Transfer and Super-Resolution , 2016, ECCV.

[61]  Xiaoming Liu,et al.  Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[62]  Xiaoming Liu,et al.  Face anti-spoofing using patch and depth-based CNNs , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[63]  Anil K. Jain,et al.  Secure Face Unlock: Spoof Detection on Smartphones , 2016, IEEE Transactions on Information Forensics and Security.

[64]  Anil K. Jain,et al.  Cross-Database Face Antispoofing with Robust Feature Representation , 2016, CCBR.

[65]  Michael I. Jordan,et al.  Learning Transferable Features with Deep Adaptation Networks , 2015, ICML.

[66]  Stan Z. Li,et al.  Person-Specific Face Antispoofing With Subject Domain Adaptation , 2015, IEEE Transactions on Information Forensics and Security.