A Cross-Dataset Evaluation of Anti-Face-Spoofing Methods Using Random Forests and Convolutional Neural Networks

Face recognition for authentication, namely unlocking by faces, is widely used in various access control applications, especially in mobile devices, and becomes one of major biometric authentication technology. Some existing authentication methods require additional depth sensors; however, they are still cheated by 2D or 3D printed faces sometimes. Although many researches aim at detecting fake faces, most of them only work well on specific situations, and they are unusable to master unseen spoofed scenarios. Accordingly, in this paper, we propose face liveliness detection methods using a conventional camera, which is capable of effectively performing both intra- and cross-dataset detection on sets of real faces mixed with spoofed ones. We adopt local binary patterns (LBP) and 2D image distortion analysis (IDA) to extract texture information of face images, which are used for developing our face liveness detection system against spoofing attack to distinguish fake faces from real ones by a deep neural network (DNN). In addition to verifying whether the deep learning method induces over-fitting of spoofed faces using specific datasets, we also employ a random forest classifier to compare the face liveliness detection results. In intra-dataset evaluation, 10-fold cross-validation is adopted, and the accuracy of spoofed face detection is more than 97% using a convolutional neural network architecture. In cross-dataset evaluation, under the condition of the Idiap Replay-Attack Database acting as the training dataset as well as the NUAA Photograph Imposter Database serving as the testing dataset, the accuracy achieves 81.85% when using the scheme of combining LBP, IDA, and DNN techniques. Such performance is better than state-of-the-art methods.

[1]  Sébastien Marcel,et al.  Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition , 2014, IEEE Transactions on Image Processing.

[2]  Lior Rokach,et al.  Top-down induction of decision trees classifiers - a survey , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[3]  Markus A. Stricker,et al.  Similarity of color images , 1995, Electronic Imaging.

[4]  Lei Huang,et al.  Context based face spoofing detection using active near-infrared images , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).

[5]  Shengcai Liao,et al.  Face liveness detection with component dependent descriptor , 2013, 2013 International Conference on Biometrics (ICB).

[6]  Jesús Chamorro-Martínez,et al.  Diatom autofocusing in brightfield microscopy: a comparative study , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[7]  L. Breiman OUT-OF-BAG ESTIMATION , 1996 .

[8]  Yi Li,et al.  Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.

[9]  Hong Li,et al.  A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[10]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[11]  Josef Bigün,et al.  Real-Time Face Detection and Motion Analysis With Application in “Liveness” Assessment , 2007, IEEE Transactions on Information Forensics and Security.

[12]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[13]  Narendra Ahuja,et al.  Real-Time Specular Highlight Removal Using Bilateral Filtering , 2010, ECCV.

[14]  Paola Zuccolotto,et al.  Variable Selection Using Random Forests , 2006 .

[15]  Sébastien Marcel,et al.  Can face anti-spoofing countermeasures work in a real world scenario? , 2013, 2013 International Conference on Biometrics (ICB).

[16]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[17]  José Augusto Baranauskas,et al.  How Many Trees in a Random Forest? , 2012, MLDM.

[18]  S. Tchoulack,et al.  A video stream processor for real-time detection and correction of specular reflections in endoscopic images , 2008, 2008 Joint 6th International IEEE Northeast Workshop on Circuits and Systems and TAISA Conference.

[19]  M. W Gardner,et al.  Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences , 1998 .

[20]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[21]  Ioannis A. Kakadiaris,et al.  The impact of specular highlights on 3D-2D face recognition , 2013, Defense, Security, and Sensing.

[22]  Sébastien Marcel,et al.  LBP - TOP Based Countermeasure against Face Spoofing Attacks , 2012, ACCV Workshops.

[23]  Samarth Bharadwaj,et al.  Computationally Efficient Face Spoofing Detection with Motion Magnification , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[24]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.