Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication

Leveraging built-in cameras on smartphones and tablets, face authentication provides an attractive alternative of legacy passwords due to its memory-less authentication process. However, it has an intrinsic vulnerability against the media-based facial forgery (MFF) where adversaries use photos/videos containing victims' faces to circumvent face authentication systems. In this paper, we propose FaceLive, a practical and robust liveness detection mechanism to strengthen the face authentication on mobile devices in fighting the MFF-based attacks. FaceLive detects the MFF-based attacks by measuring the consistency between device movement data from the inertial sensors and the head pose changes from the facial video captured by built-in camera. FaceLive is practical in the sense that it does not require any additional hardware but a generic front-facing camera, an accelerometer, and a gyroscope, which are pervasively available on today's mobile devices. FaceLive is robust to complex lighting conditions, which may introduce illuminations and lead to low accuracy in detecting important facial landmarks; it is also robust to a range of cumulative errors in detecting head pose changes during face authentication.

[1]  Matti Pietikäinen,et al.  Competition on counter measures to 2-D facial spoofing attacks , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[2]  S. J. Tupling,et al.  Use of cardan angles to locate rigid bodies in three-dimensional space , 1987, Medical and Biological Engineering and Computing.

[3]  Jens Timmer,et al.  Characteristics of hand tremor time series , 1993, Biological Cybernetics.

[4]  Josef Bigün,et al.  Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..

[5]  R. V. Benson Euclidean Geometry and Convexity , 1966 .

[6]  Azriel Rosenfeld,et al.  Face recognition: A literature survey , 2003, CSUR.

[7]  Matti Pietikäinen,et al.  Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[8]  Xavier Maldague,et al.  Infrared face recognition: A literature review , 2013, The 2013 International Joint Conference on Neural Networks (IJCNN).

[9]  Ehud Rivlin,et al.  Robust 3D Head Tracking Using Camera Pose Estimation , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[10]  D. Hosmer,et al.  Logistic Regression, Conditional , 2005 .

[11]  Mohan M. Trivedi,et al.  Head Pose Estimation in Computer Vision: A Survey , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[12]  Jang-Hee Yoo,et al.  Liveness Detection for Embedded Face Recognition System , 2008 .

[13]  A. Acquisti,et al.  Privacy in the Age of Augmented Reality , 2011 .

[14]  Nir Friedman,et al.  Bayesian Network Classifiers , 1997, Machine Learning.

[15]  Takeo Kanade,et al.  Multi-PIE , 2008, 2008 8th IEEE International Conference on Automatic Face & Gesture Recognition.

[16]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[17]  Jason M. Saragih,et al.  Deformable Face Alignment via Local Measurements and Global Constraints , 2013 .

[18]  Frank Stenger,et al.  Integration Formulae Based on the Trapezoidal Formula , 1973 .

[19]  Naser Damer,et al.  2D face liveness detection: An overview , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[20]  Robert H. Deng,et al.  Understanding OSN-based facial disclosure against face authentication systems , 2014, AsiaCCS.

[21]  Arun Ross,et al.  An introduction to biometrics , 2008, ICPR 2008.

[22]  Meinard Müller,et al.  Information retrieval for music and motion , 2007 .

[23]  Anil K. Jain,et al.  A Multispectral Whole-Hand Biometric Authentication System , 2007, 2007 Biometrics Symposium.

[24]  Alessandro Acquisti,et al.  Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.

[25]  Juha Röning,et al.  Recognizing Human Activities User-independently on Smartphones Based on Accelerometer Data , 2012, Int. J. Interact. Multim. Artif. Intell..

[26]  Joseph Wilder,et al.  Comparison of visible and infra-red imagery for face recognition , 1996, Proceedings of the Second International Conference on Automatic Face and Gesture Recognition.

[27]  Hong Li,et al.  A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[28]  Andrea F. Abate,et al.  2D and 3D face recognition: A survey , 2007, Pattern Recognit. Lett..

[29]  Terence Sim,et al.  The CMU Pose, Illumination, and Expression Database , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[30]  Mahmudur Rahman,et al.  Seeing is not believing: visual verifications through liveness analysis using mobile devices , 2013, ACSAC.

[31]  Heinrich Hußmann,et al.  I Feel Like I'm Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones , 2015, CHI.

[32]  Prasant Mohapatra,et al.  Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones , 2014, MobiSys.

[33]  F. Roli,et al.  Security evaluation of biometric authentication systems under real spoofing attacks , 2012, IET Biom..

[34]  Stephen A. McGuire,et al.  Introductory Statistics , 2007, Technometrics.

[35]  Berthold K. P. Horn,et al.  Determining Optical Flow , 1981, Other Conferences.

[36]  Matei Mancas,et al.  Head Pose Estimation by Perspective-n-Point Solution Based on 2D Markerless Face Tracking , 2014, INTETAIN.

[37]  Seungbin Moon,et al.  An Efficient Hybrid Face Recognition Algorithm Using PCA and GABOR Wavelets , 2014 .

[38]  J. Hanley,et al.  The meaning and use of the area under a receiver operating characteristic (ROC) curve. , 1982, Radiology.

[39]  Alan Bundy,et al.  Dynamic Time Warping , 1984 .

[40]  Lin Sun,et al.  Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[41]  David W. Hosmer,et al.  Applied Logistic Regression , 1991 .

[42]  M. W Gardner,et al.  Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences , 1998 .

[43]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[44]  René Mayrhofer,et al.  Towards face unlock: on the difficulty of reliably detecting faces on mobile phones , 2012, MoMM '12.

[45]  Rene Mayrhofer,et al.  Towards usable authentication on mobile phones : An evaluation of speaker and face recognition on off-the-shelf handsets , 2012 .