Deep Anomaly Detection for Generalized Face Anti-Spoofing

Face recognition has achieved unprecedented results, surpassing human capabilities in certain scenarios. However, these automatic solutions are not ready for production because they can be easily fooled by simple identity impersonation attacks. And although much effort has been devoted to develop face anti-spoofing models, their generalization capacity still remains a challenge in real scenarios. In this paper, we introduce a novel approach that reformulates the Generalized Presentation Attack Detection (GPAD) problem from an anomaly detection perspective. Technically, a deep metric learning model is proposed, where a triplet focal loss is used as a regularization for a novel loss coined "metric-softmax", which is in charge of guiding the learning process towards more discriminative feature representations in an embedding space. Finally, we demonstrate the benefits of our deep anomaly detection architecture, by introducing a few-shot a posteriori probability estimation that does not need any classifier to be trained on the learned features. We conduct extensive experiments using the GRAD-GPAD framework that provides the largest aggregated dataset for face GPAD. Results confirm that our approach is able to outperform all the state-of-the-art methods by a considerable margin.

[1]  Sébastien Marcel,et al.  Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[2]  Song Bai,et al.  Triplet-Center Loss for Multi-view 3D Object Retrieval , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[3]  Dacheng Tao,et al.  Correcting the Triplet Selection Bias for Triplet Loss , 2018, ECCV.

[4]  Omkar M. Parkhi,et al.  VGGFace2: A Dataset for Recognising Faces across Pose and Age , 2017, 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018).

[5]  Yu Qiao,et al.  Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks , 2016, IEEE Signal Processing Letters.

[6]  Paulo Lobato Correia,et al.  Light Field-Based Face Presentation Attack Detection: Reviewing, Benchmarking and One Step Further , 2018, IEEE Transactions on Information Forensics and Security.

[7]  Yann LeCun,et al.  Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[8]  Jukka Komulainen,et al.  On the generalization of color texture-based face anti-spoofing , 2018, Image Vis. Comput..

[9]  Feiyue Huang,et al.  Unsupervised Domain Adaptation for Face Anti-Spoofing , 2018, IEEE Transactions on Information Forensics and Security.

[10]  Kilian Q. Weinberger,et al.  Distance Metric Learning for Large Margin Nearest Neighbor Classification , 2005, NIPS.

[11]  Qi Zhang,et al.  Person Re-Identification With Triplet Focal Loss , 2018, IEEE Access.

[12]  V. Bhagavatula Real-Time Face Detection and Motion Analysis With Application in "Liveness" Assessment , 2007 .

[13]  Anil K. Jain,et al.  Face Spoof Detection With Image Distortion Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[14]  Richa Singh,et al.  Detecting Silicone Mask-Based Presentation Attack via Deep Dictionary Learning , 2017, IEEE Transactions on Information Forensics and Security.

[15]  Yu Qiao,et al.  A Discriminative Feature Learning Approach for Deep Face Recognition , 2016, ECCV.

[16]  Shifeng Zhang,et al.  A Dataset and Benchmark for Large-Scale Multi-Modal Face Anti-Spoofing , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[17]  Xiaoming Liu,et al.  Face De-Spoofing: Anti-Spoofing via Noise Modeling , 2018, ECCV.

[18]  Jukka Komulainen,et al.  Face Spoofing Detection Using Colour Texture Analysis , 2016, IEEE Transactions on Information Forensics and Security.

[19]  Josef Kittler,et al.  An Anomaly Detection Approach to Face Spoofing Detection: A New Formulation and Evaluation Protocol , 2017, IEEE Access.

[20]  Roberto Javier López-Sastre,et al.  Generalized Presentation Attack Detection: a face anti-spoofing evaluation proposal , 2019, 2019 International Conference on Biometrics (ICB).

[21]  James Philbin,et al.  FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[22]  Sébastien Marcel,et al.  Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[23]  Daniel González-Jiménez,et al.  Challenges of Face Presentation Attack Detection in Real Scenarios , 2019, Handbook of Biometric Anti-Spoofing, 2nd Ed..

[24]  Sébastien Marcel,et al.  The Replay-Mobile Face Presentation-Attack Database , 2016, 2016 International Conference of the Biometrics Special Interest Group (BIOSIG).

[25]  Sébastien Marcel,et al.  On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-spoofing , 2018, 2018 International Conference on Biometrics (ICB).

[26]  K. Harshika Image Quality Assessment for Fake Biometric Detection : Application to Iris , Fingerprint , and Face Recognition , 2017 .

[27]  Junjie Yan,et al.  A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[28]  Guoying Zhao,et al.  3D Mask Face Anti-spoofing with Remote Photoplethysmography , 2016, ECCV.

[29]  Evgeny Smirnov,et al.  Hard Example Mining with Auxiliary Embeddings , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[30]  Shiqi Wang,et al.  Learning Generalized Deep Feature Representation for Face Anti-Spoofing , 2018, IEEE Transactions on Information Forensics and Security.

[31]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[32]  Xiaoming Liu,et al.  Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[33]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[34]  Anderson Rocha,et al.  Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks , 2015, IEEE Transactions on Information Forensics and Security.

[35]  Andrew Zisserman,et al.  Deep Face Recognition , 2015, BMVC.

[36]  Jukka Komulainen,et al.  OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations , 2017, 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017).

[37]  Weilin Huang,et al.  Deep Metric Learning with Hierarchical Triplet Loss , 2018, ECCV.

[38]  Sébastien Marcel,et al.  Spoofing Deep Face Recognition with Custom Silicone Masks , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).