A Stacking Ensemble for Anomaly Based Client-Specific Face Spoofing Detection

To counteract spoofing attacks, the majority of recent approaches to face spoofing attack detection formulate the problem as a binary classification task in which real data and attack-accesses are both used to train spoofing detectors. Although the classical training framework has been demonstrated to deliver satisfactory results, its robustness to unseen attacks is debatable. Inspired by the recent success of anomaly detection models in face spoofing detection, we propose an ensemble of one-class classifiers fused by a Stacking ensemble method to reduce the generalisation error in the more realistic unseen attack scenario. To be consistent with this scenario, anomalous samples are considered neither for training the component anomaly classifiers nor for the design of the Stacking ensemble. To achieve better face-anti spoofing results, we adopt client-specific information to build both constituent classifiers as well as the Stacking combiner. Besides, we propose a novel 2-stage Genetic Algorithm to further improve the generalisation performance of Stacking ensemble. We evaluate the effectiveness of the proposed systems on publicly available face anti-spoofing databases including Replay-Attack, Replay-Mobile and Rose-Youtu. The experimental results following the unseen attack evaluation protocol confirm the merits of the proposed model.

[1]  Muhammad Awais,et al.  Spoofing Attack Detection by Anomaly Detection , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[2]  Vitomir Struc,et al.  Photometric Normalization Techniques for Illumination Invariance , 2011 .

[3]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[4]  Josef Kittler,et al.  Combining Multiple one-class Classifiers for Anomaly based Face Spoofing Attack Detection , 2019, 2019 International Conference on Biometrics (ICB).

[5]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[6]  Sébastien Marcel,et al.  The Replay-Mobile Face Presentation-Attack Database , 2016, 2016 International Conference of the Biometrics Special Interest Group (BIOSIG).

[7]  Sébastien Marcel,et al.  On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-spoofing , 2018, 2018 International Conference on Biometrics (ICB).

[8]  David Windridge,et al.  Detection of Face Spoofing Using Visual Dynamics , 2015, IEEE Transactions on Information Forensics and Security.

[9]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[10]  Daniela M. Witten,et al.  An Introduction to Statistical Learning: with Applications in R , 2013 .

[11]  David H. Wolpert,et al.  Stacked generalization , 1992, Neural Networks.

[12]  Yaowu Chen,et al.  Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection , 2020, IEEE Transactions on Information Forensics and Security.

[13]  Aleksandr Parkin,et al.  Recognizing Multi-Modal Face Spoofing With Face Recognition Networks , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[14]  Ivana Chingovska,et al.  Trustworthy Biometric Verication under Spoong Attacks: Application to the Face Mode , 2015 .

[15]  Sébastien Marcel,et al.  Pulse-based Features for Face Presentation Attack Detection , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[16]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[17]  Josef Kittler,et al.  Novel Fusion Methods for Pattern Recognition , 2011, ECML/PKDD.

[18]  Anil K. Jain,et al.  Generalizing Fingerprint Spoof Detector: Learning a One-Class Classifier , 2019, 2019 International Conference on Biometrics (ICB).

[19]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[20]  Chandan Srivastava,et al.  Support Vector Data Description , 2011 .

[21]  William J. Christmas,et al.  An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[22]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .

[23]  Ramachandra Raghavendra,et al.  Presentation Attack Detection Methods for Face Recognition Systems , 2017, ACM Comput. Surv..

[24]  Xu Zhao,et al.  Discriminative Representation Combinations for Accurate Face Spoofing Detection , 2018, Pattern Recognit..

[25]  Dumitru Erhan,et al.  Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).