Practical View on Face Presentation Attack Detection

Face recognition is one of the most socially accepted forms of biometric recognition. The recent availability of very accurate and efficient face recognition algorithms leaves the vulnerability to presentation attacks as the major challenge to face recognition solutions. Previous works have shown high preforming presentation attack detection PAD solutions under controlled evaluation scenarios. This work tried to analyze the practical use of PAD by investigating the more realistic scenario of cross-database evaluation and presenting a state-of-the-art performance comparison. The work also investigated the relation between the video duration and the PAD performance. This is done along with presenting an optical flow based approach that proves to outperform state-of-the-art solutions in most experiment settings.

[1]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[2]  Paul A. Viola,et al.  Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[3]  Yi Li,et al.  Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.

[4]  Anil K. Jain,et al.  Handbook of Face Recognition, 2nd Edition , 2011 .

[5]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[6]  Arun Ross,et al.  An introduction to biometrics , 2008, ICPR 2008.

[7]  Junjie Yan,et al.  A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[8]  Sébastien Marcel,et al.  Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[9]  Hong Li,et al.  A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[10]  Yoram Singer,et al.  Improved Boosting Algorithms Using Confidence-rated Predictions , 1998, COLT' 98.

[11]  V. Bhagavatula Real-Time Face Detection and Motion Analysis With Application in "Liveness" Assessment , 2007 .

[12]  Christoph Busch,et al.  Presentation attack detection methods for fingerprint recognition systems: a survey , 2014, IET Biom..

[13]  Anil K. Jain,et al.  Face Spoof Detection With Image Distortion Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[14]  Sébastien Marcel,et al.  LBP - TOP Based Countermeasure against Face Spoofing Attacks , 2012, ACCV Workshops.

[15]  Gunnar Farnebäck,et al.  Two-Frame Motion Estimation Based on Polynomial Expansion , 2003, SCIA.

[16]  R. Vidal,et al.  Histograms of oriented optical flow and Binet-Cauchy kernels on nonlinear dynamical systems for the recognition of human actions , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.

[17]  N. Kose,et al.  Classification of captured and recaptured images to detect photograph spoofing , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).

[18]  Sébastien Marcel,et al.  Can face anti-spoofing countermeasures work in a real world scenario? , 2013, 2013 International Conference on Biometrics (ICB).

[19]  Jang-Hee Yoo,et al.  Liveness Detection for Embedded Face Recognition System , 2008 .

[20]  Anderson Rocha,et al.  Face liveness detection under bad illumination conditions , 2011, 2011 18th IEEE International Conference on Image Processing.

[21]  Matti Pietikäinen,et al.  Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[22]  Samarth Bharadwaj,et al.  Computationally Efficient Face Spoofing Detection with Motion Magnification , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.