Face Spoof Detection With Image Distortion Analysis

Automatic face recognition is now widely used in applications ranging from deduplication of identity to authentication of mobile payment. This popularity of face recognition has raised concerns about face spoof attacks (also known as biometric sensor presentation attacks), where a photo or video of an authorized person's face could be used to gain access to facilities or services. While a number of face spoof detection techniques have been proposed, their generalization ability has not been adequately addressed. We propose an efficient and rather robust face spoof detection algorithm based on image distortion analysis (IDA). Four different features (specular reflection, blurriness, chromatic moment, and color diversity) are extracted to form the IDA feature vector. An ensemble classifier, consisting of multiple SVM classifiers trained for different face spoof attacks (e.g., printed photo and replayed video), is used to distinguish between genuine (live) and spoof faces. The proposed approach is extended to multiframe face spoof detection in videos using a voting-based scheme. We also collect a face spoof database, MSU mobile face spoofing database (MSU MFSD), using two mobile devices (Google Nexus 5 and MacBook Air) with three types of spoof attacks (printed photo, replayed video with iPhone 5S, and replayed video with iPad Air). Experimental results on two public-domain face spoof databases (Idiap REPLAY-ATTACK and CASIA FASD), and the MSU MFSD database show that the proposed approach outperforms the state-of-the-art methods in spoof detection. Our results also highlight the difficulty in separating genuine and spoof faces, especially in cross-database and cross-device scenarios.

[1]  Alexei A. Efros,et al.  Estimating the Natural Illumination Conditions from a Single Outdoor Image , 2012, International Journal of Computer Vision.

[2]  Ming Yang,et al.  Large-scale image classification: Fast feature extraction and SVM training , 2011, CVPR 2011.

[3]  Oliver Bimber,et al.  Superimposing dynamic range , 2008, SIGGRAPH Asia '08.

[4]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[5]  Shengcai Liao,et al.  Face liveness detection with component dependent descriptor , 2013, 2013 International Conference on Biometrics (ICB).

[6]  Haizhou Li,et al.  Spoofing and countermeasures for speaker verification: A survey , 2015, Speech Commun..

[7]  N. Kose,et al.  Classification of captured and recaptured images to detect photograph spoofing , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).

[8]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[9]  Patricia Ladret,et al.  The blur effect: perception and estimation with a new no-reference perceptual blur metric , 2007, Electronic Imaging.

[10]  Stan Z. Li,et al.  Face liveness detection by learning multispectral reflectance distributions , 2011, Face and Gesture 2011.

[11]  Katsushi Ikeuchi,et al.  Separating reflection components of textured surfaces using a single image , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[12]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[13]  Wei-Ying Ma,et al.  Automatic Classification of Photographs and Graphics , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[14]  Sébastien Marcel,et al.  Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[15]  Sébastien Marcel,et al.  Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[16]  Frédo Durand,et al.  Eulerian video magnification for revealing subtle changes in the world , 2012, ACM Trans. Graph..

[17]  Narendra Ahuja,et al.  Real-Time Specular Highlight Removal Using Bilateral Filtering , 2010, ECCV.

[18]  Girija Chetty,et al.  Biometric liveness checking using multimodal fuzzy fusion , 2010, International Conference on Fuzzy Systems.

[19]  Sébastien Marcel,et al.  Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition , 2014, IEEE Transactions on Image Processing.

[20]  Wen Gao,et al.  Separability Oriented Preprocessing for Illumination-Insensitive Face Recognition , 2012, ECCV.

[21]  Yi Li,et al.  Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.

[22]  Feiping Nie,et al.  New primal SVM solver with linear computational cost for big data classifications , 2014, ICML 2014.

[23]  Hong Li,et al.  A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[24]  Feiping Nie,et al.  A general kernelization framework for learning algorithms based on kernel PCA , 2010, Neurocomputing.

[25]  Junjie Yan,et al.  A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[26]  Ioannis A. Kakadiaris,et al.  The impact of specular highlights on 3D-2D face recognition , 2013, Defense, Security, and Sensing.

[27]  Conrad Sanderson,et al.  Biometric Person Recognition: Face, Speech and Fusion , 2008 .

[28]  Shih-Fu Chang,et al.  Single-view recaptured image detection based on physics-based features , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[29]  Matti Pietikäinen,et al.  Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[30]  Matti Pietikäinen,et al.  Context based face anti-spoofing , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[31]  Samarth Bharadwaj,et al.  Computationally Efficient Face Spoofing Detection with Motion Magnification , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[32]  Matti Pietikäinen,et al.  Face liveness detection using dynamic texture , 2014, EURASIP J. Image Video Process..

[33]  Steven A. Shafer,et al.  Using color to separate reflection components , 1985 .

[34]  Anil K. Jain,et al.  Unconstrained Face Recognition: Identifying a Person of Interest From a Media Collection , 2014, IEEE Transactions on Information Forensics and Security.

[35]  Lin Sun,et al.  Blinking-Based Live Face Detection Using Conditional Random Fields , 2007, ICB.

[36]  Sébastien Marcel,et al.  Can face anti-spoofing countermeasures work in a real world scenario? , 2013, 2013 International Conference on Biometrics (ICB).

[37]  Tieniu Tan,et al.  Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.

[38]  Rabab K Ward,et al.  A survey of signal processing algorithms in brain–computer interfaces based on electrical brain signals , 2007, Journal of neural engineering.

[39]  Josef Bigün,et al.  Real-Time Face Detection and Motion Analysis With Application in “Liveness” Assessment , 2007, IEEE Transactions on Information Forensics and Security.

[40]  Shengcai Liao,et al.  Face liveness detection using 3D structure recovered from a single camera , 2013, 2013 International Conference on Biometrics (ICB).

[41]  Bernhard E. Boser,et al.  A training algorithm for optimal margin classifiers , 1992, COLT '92.

[42]  Arun Ross,et al.  Analysis of user-specific score characteristics for spoof biometric attacks , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[43]  Sébastien Marcel,et al.  LBP - TOP Based Countermeasure against Face Spoofing Attacks , 2012, ACCV Workshops.

[44]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[45]  Tomi Kinnunen,et al.  Spoofing and countermeasures for automatic speaker verification , 2013, INTERSPEECH.

[46]  Stefan Winkler,et al.  A no-reference perceptual blur metric , 2002, Proceedings. International Conference on Image Processing.

[47]  Chih-Jen Lin,et al.  LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..

[48]  Feiping Nie,et al.  Multiple rank multi-linear SVM for matrix data classification , 2014, Pattern Recognit..