Client-Specific Anomaly Detection for Face Presentation Attack Detection

The one-class anomaly detection approach has previously been found to be effective in face presentation attack detection, especially in an \textit{unseen} attack scenario, where the system is exposed to novel types of attacks. This work follows the same anomaly-based formulation of the problem and analyses the merits of deploying \textit{client-specific} information for face spoofing detection. We propose training one-class client-specific classifiers (both generative and discriminative) using representations obtained from pre-trained deep convolutional neural networks. Next, based on subject-specific score distributions, a distinct threshold is set for each client, which is then used for decision making regarding a test query. Through extensive experiments using different one-class systems, it is shown that the use of client-specific information in a one-class anomaly detection formulation (both in model construction as well as decision threshold tuning) improves the performance significantly. In addition, it is demonstrated that the same set of deep convolutional features used for the recognition purposes is effective for face presentation attack detection in the class-specific one-class anomaly detection paradigm.

[1]  Dumitru Erhan,et al.  Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[2]  David Menotti,et al.  Deep Representations for Iris, Face, and Fingerprint Spoofing Detection , 2014, IEEE Transactions on Information Forensics and Security.

[3]  N. Kose,et al.  Classification of captured and recaptured images to detect photograph spoofing , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).

[4]  Anil K. Jain,et al.  Generalizing Fingerprint Spoof Detector: Learning a One-Class Classifier , 2019, 2019 International Conference on Biometrics (ICB).

[5]  Alexandros Iosifidis,et al.  Neural class-specific regression for face verification , 2017, IET Biom..

[6]  Yukun Ma,et al.  A novel face presentation attack detection scheme based on multi-regional convolutional neural networks , 2020, Pattern Recognit. Lett..

[7]  Taiamiti Edmunds,et al.  Protection of 2D face identification systems against spoofing attacks. (Protection des systèmes d'identification faciale face à la fraude par présentation de leurres) , 2017 .

[8]  Shengcai Liao,et al.  Face liveness detection with component dependent descriptor , 2013, 2013 International Conference on Biometrics (ICB).

[9]  P. Helman,et al.  A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[10]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[11]  Lin Sun,et al.  Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[12]  Shervin Rahimzadeh Arashloo,et al.  Multiscale binarised statistical image features for symmetric face matching using multiple descriptor fusion based on class-specific LDA , 2017, Pattern Analysis and Applications.

[13]  Kang Ryoung Park,et al.  Face liveness detection based on texture and frequency analyses , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[14]  Emna Fourati,et al.  Anti-spoofing in face recognition-based biometric authentication using Image Quality Assessment , 2019, Multimedia Tools and Applications.

[15]  Matti Pietikäinen,et al.  Face spoofing detection from single images using texture and local shape analysis , 2012, IET Biom..

[16]  Samarth Bharadwaj,et al.  Computationally Efficient Face Spoofing Detection with Motion Magnification , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[17]  Bill Triggs,et al.  Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[18]  Junjie Yan,et al.  A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[19]  Muhammad Awais,et al.  Spoofing Attack Detection by Anomaly Detection , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[20]  Junjie Yan,et al.  Face liveness detection by exploring multiple scenic clues , 2012, 2012 12th International Conference on Control Automation Robotics & Vision (ICARCV).

[21]  Josef Kittler,et al.  Combining Multiple one-class Classifiers for Anomaly based Face Spoofing Attack Detection , 2019, 2019 International Conference on Biometrics (ICB).

[22]  Anderson Rocha,et al.  Video-Based Face Spoofing Detection through Visual Rhythm Analysis , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.

[23]  Michael S. Bernstein,et al.  ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.

[24]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[25]  Yaowu Chen,et al.  Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection , 2020, IEEE Transactions on Information Forensics and Security.

[26]  Yi Li,et al.  Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.

[27]  Anderson Rocha,et al.  Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes , 2015, IEEE Transactions on Image Processing.

[28]  Yaakov Tsaig,et al.  Fast Solution of $\ell _{1}$ -Norm Minimization Problems When the Solution May Be Sparse , 2008, IEEE Transactions on Information Theory.

[29]  Ivana Chingovska,et al.  Trustworthy Biometric Verication under Spoong Attacks: Application to the Face Mode , 2015 .

[30]  Woo Chaw Seng,et al.  A review of biometric technology along with trends and prospects , 2014, Pattern Recognit..

[31]  Anderson Rocha,et al.  Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks , 2015, IEEE Transactions on Information Forensics and Security.

[32]  Petru Radu,et al.  Robust multimodal face and fingerprint fusion in the presence of spoofing attacks , 2016, Pattern Recognit..

[33]  Jukka Komulainen,et al.  Face Spoofing Detection Using Colour Texture Analysis , 2016, IEEE Transactions on Information Forensics and Security.

[34]  Sébastien Marcel,et al.  The Replay-Mobile Face Presentation-Attack Database , 2016, 2016 International Conference of the Biometrics Special Interest Group (BIOSIG).

[35]  Alexandros Iosifidis,et al.  Class-specific kernel discriminant analysis based on Cholesky decomposition , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[36]  Stan Z. Li,et al.  Person-Specific Face Antispoofing With Subject Domain Adaptation , 2015, IEEE Transactions on Information Forensics and Security.

[37]  Keche Mokhtar,et al.  The detection of spoofing by 3D mask in a 2D identity recognition system , 2017, Egyptian Informatics Journal.

[38]  David Windridge,et al.  Domain Anomaly Detection in Machine Perception: A System Architecture and Taxonomy , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[39]  Tal Hassner,et al.  Face recognition in unconstrained videos with matched background similarity , 2011, CVPR 2011.

[40]  Feiyue Huang,et al.  Unsupervised Domain Adaptation for Face Anti-Spoofing , 2018, IEEE Transactions on Information Forensics and Security.

[41]  Josef Kittler,et al.  Class-Specific Kernel Fusion of Multiple Descriptors for Face Verification Using Multiscale Binarised Statistical Image Features , 2014, IEEE Transactions on Information Forensics and Security.

[42]  David Zhang,et al.  A Survey of Sparse Representation: Algorithms and Applications , 2015, IEEE Access.

[43]  Sushil K. Bhattacharjee,et al.  Recent Advances in Face Presentation Attack Detection , 2019, Handbook of Biometric Anti-Spoofing, 2nd Ed..

[44]  Lai-Man Po,et al.  Integration of image quality and motion cues for face anti-spoofing: A neural network approach , 2016, J. Vis. Commun. Image Represent..

[45]  Stefanos Zafeiriou,et al.  Incremental Face Alignment in the Wild , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[46]  Josef Kittler,et al.  A Stacking Ensemble for Anomaly Based Client-Specific Face Spoofing Detection , 2020, 2020 IEEE International Conference on Image Processing (ICIP).

[47]  Anderson Rocha,et al.  Face spoofing detection through partial least squares and low-level descriptors , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[48]  Andrew Zisserman,et al.  Deep Face Recognition , 2015, BMVC.

[49]  William J. Christmas,et al.  Ieee Transactions on Information Forensics and Security 1 Face Spoofing Detection Based on Multiple Descriptor Fusion Using Multiscale Dynamic Binarized Statistical Image Features , 2022 .

[50]  YuanFang,et al.  Integration of image quality and motion cues for face anti-spoofing , 2016 .

[51]  D. Donoho,et al.  Fast Solution of -Norm Minimization Problems When the Solution May Be Sparse , 2008 .

[52]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[53]  Matti Pietikäinen,et al.  Competition on counter measures to 2-D facial spoofing attacks , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[54]  Matti Pietikäinen,et al.  Context based face anti-spoofing , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[55]  Ivana Chingovska,et al.  On the Use of Client Identity Information for Face Antispoofing , 2015, IEEE Transactions on Information Forensics and Security.

[56]  Sébastien Marcel,et al.  LBP - TOP Based Countermeasure against Face Spoofing Attacks , 2012, ACCV Workshops.

[57]  Anjith George,et al.  Deep Pixel-wise Binary Supervision for Face Presentation Attack Detection , 2019, 2019 International Conference on Biometrics (ICB).

[58]  Siong Hoe Lau,et al.  Face Spoofing Detection Based on Improved Local Graph Structure , 2014, 2014 International Conference on Information Science & Applications (ICISA).

[59]  Bernhard Schölkopf,et al.  Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.

[60]  Xu Zhao,et al.  Discriminative Representation Combinations for Accurate Face Spoofing Detection , 2018, Pattern Recognit..

[61]  Alice Caplier,et al.  Fake face detection based on radiometric distortions , 2016, 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA).

[62]  William J. Christmas,et al.  An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[63]  Xiaoming Liu,et al.  Face anti-spoofing using patch and depth-based CNNs , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[64]  Maurizio Filippone,et al.  A comparative evaluation of outlier detection algorithms: Experiments and analyses , 2018, Pattern Recognit..

[65]  David A. McAllester,et al.  Object Detection with Discriminatively Trained Part Based Models , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[66]  Ricardo L. de Queiroz,et al.  Face-Spoofing 2D-Detection Based on Moiré-Pattern Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[67]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .

[68]  Marwan Mattar,et al.  Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .

[69]  Abdenour Hadid,et al.  Face Biometrics Under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[70]  Jean-Luc Dugelay,et al.  Mask spoofing in face recognition and countermeasures , 2014, Image Vis. Comput..

[71]  Alice Caplier,et al.  Motion-based countermeasure against photo and video spoofing attacks in face recognition , 2018, J. Vis. Commun. Image Represent..

[72]  Guodong Guo,et al.  A survey on 3D mask presentation attack detection and countermeasures , 2020, Pattern Recognit..

[73]  Richa Singh,et al.  Detecting Silicone Mask-Based Presentation Attack via Deep Dictionary Learning , 2017, IEEE Transactions on Information Forensics and Security.

[74]  Jukka Komulainen,et al.  Face anti-spoofing based on color texture analysis , 2015, 2015 IEEE International Conference on Image Processing (ICIP).

[75]  Ramachandra Raghavendra,et al.  Presentation Attack Detection Methods for Face Recognition Systems , 2017, ACM Comput. Surv..

[76]  Alexandros Iosifidis,et al.  Multilinear class-specific discriminant analysis , 2017, Pattern Recognit. Lett..

[77]  Stephanie Schuckers,et al.  Integrating a wavelet based perspiration liveness check with fingerprint recognition , 2009, Pattern Recognit..

[78]  Jukka Komulainen,et al.  The 2nd competition on counter measures to 2D face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).

[79]  Josef Bigün,et al.  Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..

[80]  Anderson Rocha,et al.  Manifold learning for user profiling and identity verification using motion sensors , 2020, Pattern Recognit..

[81]  Paul A. Viola,et al.  Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[82]  Anderson Rocha,et al.  Face liveness detection under bad illumination conditions , 2011, 2011 18th IEEE International Conference on Image Processing.

[83]  Josef Bigün,et al.  Verifying liveness by multiple experts in face biometrics , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[84]  Sébastien Marcel,et al.  Face Anti-spoofing Based on General Image Quality Assessment , 2014, 2014 22nd International Conference on Pattern Recognition.

[85]  Sébastien Marcel,et al.  Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.

[86]  Matti Pietikäinen,et al.  Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[87]  Anil K. Jain,et al.  Face Spoof Detection With Image Distortion Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[88]  Matti Pietikäinen,et al.  Complementary countermeasures for detecting scenic face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).

[89]  Klemen Grm,et al.  Strengths and weaknesses of deep learning models for face recognition against image degradations , 2017, IET Biom..

[90]  Jukka Komulainen,et al.  OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations , 2017, 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017).

[91]  Shengcai Liao,et al.  Face liveness detection using 3D structure recovered from a single camera , 2013, 2013 International Conference on Biometrics (ICB).

[92]  Eimad E. A. Abusham,et al.  Face Recognition Using Local Graph Structure (LGS) , 2011, HCI.

[93]  Allen Y. Yang,et al.  Robust Face Recognition via Sparse Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[94]  Alexander Binder,et al.  Deep One-Class Classification , 2018, ICML.

[95]  Lai-Man Po,et al.  Enhancing deep discriminative feature maps via perturbation for face presentation attack detection , 2020, Image Vis. Comput..

[96]  Jean-Luc Dugelay,et al.  Reflectance analysis based countermeasure technique to detect face mask attacks , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).

[97]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[98]  M. R. Osborne,et al.  A new approach to variable selection in least squares problems , 2000 .

[99]  Xiaoming Liu,et al.  Deep Tree Learning for Zero-Shot Face Anti-Spoofing , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[100]  Sébastien Marcel,et al.  On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-spoofing , 2018, 2018 International Conference on Biometrics (ICB).

[101]  Alexandros Iosifidis,et al.  Scaling Up Class-Specific Kernel Discriminant Analysis for Large-Scale Face Verification , 2016, IEEE Transactions on Information Forensics and Security.

[102]  Robert P. W. Duin,et al.  Support Vector Data Description , 2004, Machine Learning.

[103]  Vitomir Struc,et al.  Photometric Normalization Techniques for Illumination Invariance , 2011 .