Protection of 2D face identification systems against spoofing attacks. (Protection des systèmes d'identification faciale face à la fraude par présentation de leurres)

Face identification systems are growing rapidly and invade the consumer market with security products in smartphones, computers and banking. However, these systems are easily fooled by presenting a picture of the person having legitimate access to the system. This thesis is part of the BIOFENCE project which aim to develop a certification of biometric systems in order for industrials to promote their innovations in terms of protection. Our goal is to develop new anti-spoofing countermeasures for 2D face biometric systems and to evaluate the certification methodology on protected systems. First, a general state of the art in face spoofing attack forgery and in anti-spoofing protection measures is presented. Then texture-based countermeasures and motion-based countermeasures are investigated leading to the development of two novel countermeasures. Then, the recapturing process is modelled and a new fake face detection approach is proposed based on this model. Taking advantage of enrolment samples from valid users, a first step toward the synthesis of spoofing attacks for new users is taken. Finally, the certification methodology originally developed for fingerprint technology is evaluated on face biometric systems.

[1]  Liming Chen,et al.  Multi-scale Color Local Binary Patterns for Visual Object Classes Recognition , 2010, 2010 20th International Conference on Pattern Recognition.

[2]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[3]  Shengcai Liao,et al.  Face liveness detection using 3D structure recovered from a single camera , 2013, 2013 International Conference on Biometrics (ICB).

[4]  Jukka Komulainen,et al.  Face Spoofing Detection Using Dynamic Texture , 2012, ACCV Workshops.

[5]  Kang Ryoung Park,et al.  Face liveness detection based on texture and frequency analyses , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[6]  Alvin F. Martin,et al.  The DET curve in assessment of detection task performance , 1997, EUROSPEECH.

[7]  Jukka Komulainen,et al.  The 2nd competition on counter measures to 2D face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).

[8]  Sébastien Marcel,et al.  Anti-spoofing in Action: Joint Operation with a Verification System , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[9]  Nguyen Minh Duc Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba , 2009 .

[10]  Zhenhua Guo,et al.  A Completed Modeling of Local Binary Pattern Operator for Texture Classification , 2010, IEEE Transactions on Image Processing.

[11]  Xiaoyang Tan,et al.  Enhanced Local Texture Feature Sets for Face Recognition Under Difficult Lighting Conditions , 2007, AMFG.

[12]  V. Bhagavatula Real-Time Face Detection and Motion Analysis With Application in "Liveness" Assessment , 2007 .

[13]  Anderson Rocha,et al.  Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks , 2015, IEEE Transactions on Information Forensics and Security.

[14]  Abdenour Hadid,et al.  Face spoofing detection using local binary patterns and Fisher Score , 2015, 2015 3rd International Conference on Control, Engineering & Information Technology (CEIT).

[15]  Michael Elad,et al.  A Variational Framework for Retinex , 2002, IS&T/SPIE Electronic Imaging.

[16]  Mohamed N. Ahmed,et al.  Characterization of Electrophotographic Print Artifacts: Banding, Jitter, and Ghosting , 2011, IEEE Transactions on Image Processing.

[17]  N. Kose,et al.  Classification of captured and recaptured images to detect photograph spoofing , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).

[18]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[19]  Robert M. Haralick,et al.  Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..

[20]  Tian-Tsong Ng,et al.  Recaptured photo detection using specularity distribution , 2008, 2008 15th IEEE International Conference on Image Processing.

[21]  Anderson Rocha,et al.  Face spoofing detection through partial least squares and low-level descriptors , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[22]  Francesco Bianconi,et al.  Evaluation of the effects of Gabor filter parameters on texture classification , 2007, Pattern Recognit..

[23]  Patricia Ladret,et al.  The blur effect: perception and estimation with a new no-reference perceptual blur metric , 2007, Electronic Imaging.

[24]  Matti Pietikäinen,et al.  Competition on counter measures to 2-D facial spoofing attacks , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[25]  Yiannis S. Boutalis,et al.  FCTH: Fuzzy Color and Texture Histogram - A Low Level Feature for Accurate Image Retrieval , 2008, 2008 Ninth International Workshop on Image Analysis for Multimedia Interactive Services.

[26]  Jean-Luc Dugelay,et al.  Shape and Texture Based Countermeasure to Protect Face Recognition Systems against Mask Attacks , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[27]  Ngoc-Son Vu Towards unconstrained face recognition from one sample. (Contributions à la reconnaissance de visages à partir d'une seule image et dans un contexte non-contrôlé) , 2010 .

[28]  David A Clausi An analysis of co-occurrence texture statistics as a function of grey level quantization , 2002 .

[29]  Ayan Chakrabarti,et al.  An Empirical Camera Model for Internet Color Vision , 2009, BMVC.

[30]  Colin Soutar Implementation of Biometric Systems - Security and Privacy Considerations , 2002, Inf. Secur. Tech. Rep..

[31]  Stan Z. Li,et al.  Person-Specific Face Antispoofing With Subject Domain Adaptation , 2015, IEEE Transactions on Information Forensics and Security.

[32]  Anderson Rocha,et al.  Video-Based Face Spoofing Detection through Visual Rhythm Analysis , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.

[33]  Thomas Mensink,et al.  Improving the Fisher Kernel for Large-Scale Image Classification , 2010, ECCV.

[34]  Sébastien Marcel,et al.  Handbook of Biometric Anti-Spoofing , 2019, Advances in Computer Vision and Pattern Recognition.

[35]  Yi Li,et al.  Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.

[36]  David J. Kriegman,et al.  Visual tracking and recognition using probabilistic appearance manifolds , 2005, Comput. Vis. Image Underst..

[37]  Leen-Kiat Soh,et al.  Texture analysis of SAR sea ice imagery using gray level co-occurrence matrices , 1999, IEEE Trans. Geosci. Remote. Sens..

[38]  Florent Perronnin,et al.  Fisher Kernels on Visual Vocabularies for Image Categorization , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[39]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[40]  Takumi Kobayashi,et al.  Motion recognition using local auto-correlation of space-time gradients , 2012, Pattern Recognit. Lett..

[41]  Sébastien Marcel,et al.  Spoofing 2D face recognition systems with 3D masks , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).

[42]  Sébastien Marcel,et al.  Can face anti-spoofing countermeasures work in a real world scenario? , 2013, 2013 International Conference on Biometrics (ICB).

[43]  Oscar Déniz-Suárez,et al.  ENCARA2: Real-time detection of multiple faces at different resolutions in video streams , 2007, J. Vis. Commun. Image Represent..

[44]  Tieniu Tan,et al.  Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.

[45]  Stefan Winkler,et al.  A no-reference perceptual blur metric , 2002, Proceedings. International Conference on Image Processing.

[46]  Ralph Gross,et al.  An Image Preprocessing Algorithm for Illumination Invariant Face Recognition , 2003, AVBPA.

[47]  Jiri Matas,et al.  Extended Set of Local Binary Patterns for Rapid Object Detection , 2010 .

[48]  Peter D. Hiscocks,et al.  Measuring Luminance with a Digital Camera , 2011 .

[49]  Junjie Yan,et al.  A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[50]  Guillermo Sapiro,et al.  Online dictionary learning for sparse coding , 2009, ICML '09.

[51]  Michele Nappi,et al.  Moving face spoofing detection via 3D projective invariants , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[52]  Jian Sun,et al.  Guided Image Filtering , 2010, ECCV.

[53]  A.C. Kokaram,et al.  N-dimensional probability density function transfer and its application to color transfer , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.

[54]  Zhenhua Guo,et al.  Rotation invariant texture classification using LBP variance (LBPV) with global matching , 2010, Pattern Recognit..

[55]  Anil K. Jain,et al.  Face Spoof Detection With Image Distortion Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[56]  Sébastien Marcel,et al.  Biometric Antispoofing Methods: A Survey in Face Recognition , 2014, IEEE Access.

[57]  Anderson Rocha,et al.  Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes , 2015, IEEE Transactions on Image Processing.

[58]  Chih-Jen Lin,et al.  A Practical Guide to Support Vector Classication , 2008 .

[59]  Hong Li,et al.  A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[60]  Jean-Luc Dugelay,et al.  Reflectance analysis based countermeasure technique to detect face mask attacks , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).

[61]  Sébastien Marcel,et al.  On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..

[62]  Ming-Hsuan Yang,et al.  Deblurring Face Images with Exemplars , 2014, ECCV.

[63]  Katsushi Ikeuchi,et al.  Separating Reflection Components of Textured Surfaces Using a Single Image , 2005, IEEE Trans. Pattern Anal. Mach. Intell..

[64]  Junjie Yan,et al.  Face liveness detection by exploring multiple scenic clues , 2012, 2012 12th International Conference on Control Automation Robotics & Vision (ICARCV).

[65]  Anderson Rocha,et al.  Face liveness detection under bad illumination conditions , 2011, 2011 18th IEEE International Conference on Image Processing.

[66]  Sébastien Marcel,et al.  Face Anti-spoofing Based on General Image Quality Assessment , 2014, 2014 22nd International Conference on Pattern Recognition.

[67]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[68]  Matti Pietikäinen,et al.  Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[69]  Frédo Durand,et al.  Eulerian video magnification for revealing subtle changes in the world , 2012, ACM Trans. Graph..

[70]  R. Vidal,et al.  Histograms of oriented optical flow and Binet-Cauchy kernels on nonlinear dynamical systems for the recognition of human actions , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.

[71]  Matti Pietikäinen,et al.  Local Binary Patterns for Still Images , 2011 .

[72]  Samarth Bharadwaj,et al.  Face anti-spoofing via motion magnification and multifeature videolet aggregation , 2014 .

[73]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[74]  Josef Bigün,et al.  Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..

[75]  Jean-Luc Dugelay,et al.  Countermeasure for the protection of face recognition systems against mask attacks , 2013, 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG).

[76]  P. Ekman,et al.  Facial action coding system: a technique for the measurement of facial movement , 1978 .

[77]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[78]  Peter Robinson,et al.  OpenFace: An open source facial behavior analysis toolkit , 2016, 2016 IEEE Winter Conference on Applications of Computer Vision (WACV).

[79]  David Windridge,et al.  Detection of Face Spoofing Using Visual Dynamics , 2015, IEEE Transactions on Information Forensics and Security.

[80]  Fabio Roli,et al.  Fusion of multiple clues for photo-attack detection in face recognition systems , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[81]  Samarth Bharadwaj,et al.  Computationally Efficient Face Spoofing Detection with Motion Magnification , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[82]  Ivana Chingovska,et al.  On the Use of Client Identity Information for Face Antispoofing , 2015, IEEE Transactions on Information Forensics and Security.

[83]  Simon Lucey,et al.  Deformable Model Fitting by Regularized Landmark Mean-Shift , 2010, International Journal of Computer Vision.

[84]  Shengcai Liao,et al.  Face liveness detection with component dependent descriptor , 2013, 2013 International Conference on Biometrics (ICB).

[85]  Julian Fiérrez,et al.  Face verification put to test: A hill-climbing attack based on the uphill-simplex algorithm , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[86]  Muhammad Adeel Waris No intruders - securing face biometric systems from spoofing attacks , 2014 .

[87]  Dmitry O. Gorodnichy,et al.  Survey of commercial technologies for face recognition in video , 2014 .

[88]  Yiannis S. Boutalis,et al.  CEDD: Color and Edge Directivity Descriptor: A Compact Descriptor for Image Indexing and Retrieval , 2008, ICVS.

[89]  Yun Q. Shi,et al.  Is physics-based liveness detection truly possible with a single image? , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[90]  Sébastien Marcel,et al.  Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[91]  Josef Bigün,et al.  Verifying liveness by multiple experts in face biometrics , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[92]  Edward H. Adelson,et al.  Personal photo enhancement using example images , 2010, TOGS.

[93]  Shih-Fu Chang,et al.  Single-view recaptured image detection based on physics-based features , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[94]  K. Harshika Image Quality Assessment for Fake Biometric Detection : Application to Iris , Fingerprint , and Face Recognition , 2017 .

[95]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[96]  Lin Sun,et al.  Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[97]  Moncef Gabbouj,et al.  Analysis of textural features for face biometric anti-spoofing , 2013, 21st European Signal Processing Conference (EUSIPCO 2013).

[98]  Peter Robinson,et al.  Constrained Local Neural Fields for Robust Facial Landmark Detection in the Wild , 2013, 2013 IEEE International Conference on Computer Vision Workshops.

[99]  Sébastien Marcel,et al.  Motion-based counter-measures to photo attacks in face recognition , 2014, IET Biom..