Spoofing Deep Face Recognition with Custom Silicone Masks

We investigate the vulnerability of convolutional neural network (CNN) based face-recognition (FR) systems to presentation attacks (PA) performed using custom-made silicone masks. Previous works have studied the vulnerability of CNN-FR systems to 2D PAs such as print-attacks, or digital- video replay attacks, and to rigid 3D masks. This is the first study to consider PAs performed using custom-made flexible silicone masks. Before embarking on research on detecting a new variety of PA, it is important to estimate the seriousness of the threat posed by the type of PA. In this work we demonstrate that PAs using custom silicone masks do pose a serious threat to state-of-the-art FR systems. Using a new dataset based on six custom silicone masks, we show that the vulnerability of each FR system in this study is at least 10 times higher than its false match rate. We also propose a simple but effective presentation attack detection method, based on a low-cost thermal camera.

[1]  Marwan Mattar,et al.  Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .

[2]  Sébastien Marcel,et al.  Deeply vulnerable: a study of the robustness of face recognition to presentation attacks , 2018, IET Biom..

[3]  Ming Yang,et al.  DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[4]  Sébastien Marcel,et al.  Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[5]  Tieniu Tan,et al.  A Light CNN for Deep Face Representation With Noisy Labels , 2015, IEEE Transactions on Information Forensics and Security.

[6]  Faouzi Alaya Cheikh,et al.  On the vulnerability of extended Multispectral face recognition systems towards presentation attacks , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).

[7]  Václav Hlavác,et al.  Detector of Facial Landmarks Learned by the Structured Output SVM , 2012, VISAPP.

[8]  Sébastien Marcel,et al.  What You Can't See Can Help You - Extended-Range Imaging for 3D-Mask Presentation Attack Detection , 2017, 2017 International Conference of the Biometrics Special Interest Group (BIOSIG).

[9]  Ramachandra Raghavendra,et al.  Presentation Attack Detection Methods for Face Recognition Systems , 2017, ACM Comput. Surv..

[10]  Sergey Ioffe,et al.  Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning , 2016, AAAI.

[11]  Cosmin Atanasoaei Multivariate Boosting with Look-up Tables for Face Processing , 2012 .

[12]  Andreas Kolb,et al.  Design of an Active Multispectral SWIR Camera System for Skin Detection and Face Verification , 2016, J. Sensors.

[13]  Richa Singh,et al.  Face Presentation Attack with Latex Masks in Multispectral Videos , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[14]  Singh Richa,et al.  Face anti-spoofing using Haralick features , 2016 .

[15]  Andrew Zisserman,et al.  Deep Face Recognition , 2015, BMVC.

[16]  Guoying Zhao,et al.  A 3D Mask Face Anti-Spoofing Database with Real World Variations , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[17]  Richa Singh,et al.  Detecting Silicone Mask-Based Presentation Attack via Deep Dictionary Learning , 2017, IEEE Transactions on Information Forensics and Security.

[18]  Nguyen Minh Duc Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba , 2009 .

[19]  James Philbin,et al.  FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[20]  Abdenour Hadid,et al.  Biometrics: In Search of Identity and Security (Q & A) , 2018, IEEE MultiMedia.