Detecting face presentation attacks in mobile devices with a patch-based CNN and a sensor-aware loss function

With the widespread use of biometric authentication comes the exploitation of presentation attacks, possibly undermining the effectiveness of these technologies in real-world setups. One example takes place when an impostor, aiming at unlocking someone else’s smartphone, deceives the built-in face recognition system by presenting a printed image of the user. In this work, we study the problem of automatically detecting presentation attacks against face authentication methods, considering the use-case of fast device unlocking and hardware constraints of mobile devices. To enrich the understanding of how a purely software-based method can be used to tackle the problem, we present a solely data-driven approach trained with multi-resolution patches and a multi-objective loss function crafted specifically to the problem. We provide a careful analysis that considers several user-disjoint and cross-factor protocols, highlighting some of the problems with current datasets and approaches. Such analysis, besides demonstrating the competitive results yielded by the proposed method, provides a better conceptual understanding of the problem. To further enhance efficacy and discriminability, we propose a method that leverages the available gallery of user data in the device and adapts the method decision-making process to the user’s and the device’s own characteristics. Finally, we introduce a new presentation-attack dataset tailored to the mobile-device setup, with real-world variations in lighting, including outdoors and low-light sessions, in contrast to existing public datasets.

[1]  Anderson Rocha,et al.  Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks , 2015, IEEE Transactions on Information Forensics and Security.

[2]  Nitish Srivastava,et al.  Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..

[3]  Tieniu Tan,et al.  Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.

[4]  David Menotti,et al.  Deep Representations for Iris, Face, and Fingerprint Spoofing Detection , 2014, IEEE Transactions on Information Forensics and Security.

[5]  Jukka Komulainen,et al.  Face Spoofing Detection Using Colour Texture Analysis , 2016, IEEE Transactions on Information Forensics and Security.

[6]  Sébastien Marcel,et al.  Motion-based counter-measures to photo attacks in face recognition , 2014, IET Biom..

[7]  Shiqi Wang,et al.  Learning Generalized Deep Feature Representation for Face Anti-Spoofing , 2018, IEEE Transactions on Information Forensics and Security.

[8]  William J. Christmas,et al.  An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[9]  Feiyue Huang,et al.  Unsupervised Domain Adaptation for Face Anti-Spoofing , 2018, IEEE Transactions on Information Forensics and Security.

[10]  Anil K. Jain,et al.  Face Spoof Detection With Image Distortion Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[11]  Anderson Rocha,et al.  Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes , 2015, IEEE Transactions on Image Processing.

[12]  Geoffrey E. Hinton,et al.  Learning representations by back-propagating errors , 1986, Nature.

[13]  Josef Bigün,et al.  Evaluating liveness by face images and the structure tensor , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[14]  Sébastien Marcel,et al.  Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition , 2014, IEEE Transactions on Image Processing.

[15]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[16]  Luisa Verdoliva,et al.  An Investigation of Local Descriptors for Biometric Spoofing Detection , 2015, IEEE Transactions on Information Forensics and Security.

[17]  Lin Sun,et al.  Monocular camera-based face liveness detection by combining eyeblink and scene context , 2011, Telecommun. Syst..

[18]  Stan Z. Li,et al.  Person-Specific Face Antispoofing With Subject Domain Adaptation , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Pascal Vincent,et al.  Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[20]  Anil K. Jain,et al.  Cross-Database Face Antispoofing with Robust Feature Representation , 2016, CCBR.

[21]  Ivana Chingovska,et al.  On the Use of Client Identity Information for Face Antispoofing , 2015, IEEE Transactions on Information Forensics and Security.