A Deep Learning Technique to Countermeasure Video-Based Presentation Attacks

Presentation attack detection (PAD) on faces is crucial to countermeasure face recognition system from a security breach. The increase in convenience to our lives is not without its own additional avenue for exposure to a security breach. The presentation attack (PA), or spoofing attack is the act of using artificial/synthetic materials to get unauthorized access into a secured system. For example, an individual could use a 3D printed mask, or even a digital or printed photograph to circumvent a facial recognition authentication system, for the case of iris-detection an intruder could use custom contact lenses, and for fingerprints, digital prosthetics to penetrate a secured system. Previously, many deep learning approaches utilize a very deep complex model to handle face PAD. To countermeasure the above issue, in this paper, we apply a deep learning approach to mitigate the presentation attack. In our proposed approach, we implement a lightweight ‘modified-AlexNet’ and obtained the highest test accuracy of 99.89% on the Spoof in the Wild (SiW) dataset.

[1]  Stan Z. Li,et al.  Learn Convolutional Neural Network for Face Anti-Spoofing , 2014, ArXiv.

[2]  Matti Pietikäinen,et al.  Face liveness detection using dynamic texture , 2014, EURASIP J. Image Video Process..

[3]  Tien Dat Nguyen,et al.  Combining Deep and Handcrafted Image Features for Presentation Attack Detection in Face Recognition Systems Using Visible-Light Camera Sensors , 2018, Sensors.

[4]  Sébastien Marcel,et al.  Face Anti-spoofing Based on General Image Quality Assessment , 2014, 2014 22nd International Conference on Pattern Recognition.

[5]  Anderson Rocha,et al.  Video-Based Face Spoofing Detection through Visual Rhythm Analysis , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.

[6]  Xiaoming Liu,et al.  Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[7]  David Menotti,et al.  Deep Representations for Iris, Face, and Fingerprint Spoofing Detection , 2014, IEEE Transactions on Information Forensics and Security.

[8]  Anderson Rocha,et al.  Face spoofing detection through partial least squares and low-level descriptors , 2011, 2011 International Joint Conference on Biometrics (IJCB).