Indirect synthetic attack on thermal face biometric systems via visible-to-thermal spectrum conversion

The growing interest in exploring thermal face biometrics is mostly due to the robustness of thermal imagery to face spoofing attacks. However, this robustness lies in the acquisition of thermal properties by the thermal sensor and is limited to presentation attacks. In this paper, we propose a new type of attack on thermal face recognition systems, performed at the post-sensor level. In the visible spectrum, this attack would be carried out by simply injecting a face image of the claimed identity into the communication channel right after the sensor. However, unlike visible face images that are abundantly available on the web, thermal face images are not easy to obtain. Therefore, we propose to generate synthetic thermal attacks by converting visible face images into the thermal spectrum. To perform visible-to-thermal spectrum conversion, we use a cascaded refinement network trained using contextual loss. In a scenario where the attacker has prior knowledge about the spoofing countermeasure of the system, we introduce a new loss computed at the local binary pattern (LBP) maps level to fool an LBP-based spoofing attack detection algorithm. The vulnerability of thermal face biometric systems to the proposed attack is then assessed using two existing baselines of spoofing attack detection. When compared to the challenging presentation attack using silicone masks, the equal error rate has increased from 0.20% to 11.60% and from 2.28% to 58.54% when exposed to the proposed synthetic attack, using the two spoofing attack detection baselines.

[1]  Leon A. Gatys,et al.  Image Style Transfer Using Convolutional Neural Networks , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[2]  Jean-Luc Dugelay,et al.  Facial landmark detection on thermal data via fully annotated visible-to-thermal data synthesis , 2020, 2020 IEEE International Joint Conference on Biometrics (IJCB).

[3]  Richa Singh,et al.  Disguise detection and face recognition in visible and thermal spectrums , 2013, 2013 International Conference on Biometrics (ICB).

[4]  Sangyoun Lee,et al.  Face Liveness Detection Using a Light Field Camera , 2014, Sensors.

[5]  Vladlen Koltun,et al.  Photographic Image Synthesis with Cascaded Refinement Networks , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[6]  Stan Z. Li,et al.  Handbook of Biometric Anti-Spoofing , 2014, Advances in Computer Vision and Pattern Recognition.

[7]  Sébastien Marcel,et al.  Spoofing Deep Face Recognition with Custom Silicone Masks , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[8]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[9]  Lihi Zelnik-Manor,et al.  The Contextual Loss for Image Transformation with Non-Aligned Data , 2018, ECCV.

[10]  Sébastien Marcel,et al.  What You Can't See Can Help You - Extended-Range Imaging for 3D-Mask Presentation Attack Detection , 2017, 2017 International Conference of the Biometrics Special Interest Group (BIOSIG).

[11]  Richa Singh,et al.  Face Presentation Attack with Latex Masks in Multispectral Videos , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[12]  Raghavendra Ramachandra,et al.  Threat of Adversarial Attacks on Face Recognition: A Comprehensive Survey , 2020, ArXiv.

[13]  Naser Damer,et al.  Cross-spectrum thermal to visible face recognition based on cascaded image synthesis , 2019, 2019 International Conference on Biometrics (ICB).

[14]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[15]  Olegs Nikisins,et al.  Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network , 2019, IEEE Transactions on Information Forensics and Security.

[16]  Jean-Luc Dugelay,et al.  Advanced Face Presentation Attack Detection on Light Field Database , 2018, 2018 International Conference of the Biometrics Special Interest Group (BIOSIG).

[17]  Sébastien Marcel,et al.  Deeply vulnerable: a study of the robustness of face recognition to presentation attacks , 2018, IET Biom..

[18]  Naser Damer,et al.  Robust Face Authentication Based on Dynamic Quality-weighted Comparison of Visible and Thermal-to-visible images to Visible Enrollments , 2019, 2019 22th International Conference on Information Fusion (FUSION).

[19]  Jean-Luc Dugelay,et al.  A benchmark database of visible and thermal paired face images across multiple variations , 2018, 2018 International Conference of the Biometrics Special Interest Group (BIOSIG).

[20]  Jean-Luc Dugelay,et al.  Impact analysis of nose alterations on 2D and 3D face recognition , 2012, 2012 IEEE 14th International Workshop on Multimedia Signal Processing (MMSP).

[21]  Matti Pietikäinen,et al.  A comparative study of texture measures with classification based on featured distributions , 1996, Pattern Recognit..

[22]  I. Pavlidis,et al.  The imaging issue in an automatic face/disguise detection system , 2000, Proceedings IEEE Workshop on Computer Vision Beyond the Visible Spectrum: Methods and Applications (Cat. No.PR00640).

[23]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[24]  Robin S. S. Kramer,et al.  Face morphing attacks: Investigating detection with humans and computers , 2019, Cognitive Research: Principles and Implications.