Detection of Video-Based Face Spoofing Using LBP and Multiscale DCT

Despite the great deal of progress during the recent years, face spoofing detection is still a focus of attention. In this paper, an effective, simple and time-saving countermeasure against video-based face spoofing attacks based on LBP (Local Binary Patterns) and multiscale DCT (Discrete Cosine Transform) is proposed. Adopted as the low-level descriptors, LBP features are used to extract spatial information in each selected frame. Next, multiscale DCT is performed along the ordinate axis of the obtained LBP features to extract spatial information. Representing both spatial and temporal information, the obtained high-level descriptors (LBP-MDCT features) are finally fed into a SVM (Support Vector Machine) classifier to determine whether the input video is a facial attack or valid access. Compared with state of the art, the excellent experimental results of the proposed method on two benchmarking datasets (Replay-Attack and CASIA-FASD dataset) have demonstrated its effectiveness.

[1]  Bin Qin,et al.  The Anti-spoofing Study of Vein Identification System , 2009, 2009 International Conference on Computational Intelligence and Security.

[2]  Josef Kittler,et al.  Class-Specific Kernel Fusion of Multiple Descriptors for Face Verification Using Multiscale Binarised Statistical Image Features , 2014, IEEE Transactions on Information Forensics and Security.

[3]  Anderson Rocha,et al.  Face liveness detection under bad illumination conditions , 2011, 2011 18th IEEE International Conference on Image Processing.

[4]  Tieniu Tan,et al.  Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.

[5]  Matti Pietikäinen,et al.  Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[6]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[7]  Gian Luca Marcialis,et al.  Evaluation of serial and parallel multibiometric systems under spoofing attacks , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[8]  Anderson Rocha,et al.  Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes , 2015, IEEE Transactions on Image Processing.

[9]  Qiang Chen,et al.  Integrating clustering with level set method for piecewise constant Mumford-Shah model , 2014, EURASIP J. Image Video Process..

[10]  Sébastien Marcel,et al.  Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[11]  David Windridge,et al.  Detection of Face Spoofing Using Visual Dynamics , 2015, IEEE Transactions on Information Forensics and Security.

[12]  Sébastien Marcel,et al.  Biometric Antispoofing Methods: A Survey in Face Recognition , 2014, IEEE Access.

[13]  Danilo Gligoroski,et al.  Walk the Walk: Attacking Gait Biometrics by Imitation , 2010, ISC.

[14]  Sébastien Marcel,et al.  On the vulnerability of finger vein recognition to spoofing , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[15]  Matti Pietikäinen,et al.  Face liveness detection using dynamic texture , 2014, EURASIP J. Image Video Process..

[16]  Matti Pietikäinen,et al.  Face spoofing detection from single images using texture and local shape analysis , 2012, IET Biom..

[17]  Josef Kittler,et al.  Dynamic Texture Recognition Using Multiscale Binarized Statistical Image Features , 2014, IEEE Transactions on Multimedia.

[18]  Sébastien Marcel,et al.  LBP - TOP Based Countermeasure against Face Spoofing Attacks , 2012, ACCV Workshops.

[19]  Anderson Rocha,et al.  Video-Based Face Spoofing Detection through Visual Rhythm Analysis , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.

[20]  N. Kose,et al.  Classification of captured and recaptured images to detect photograph spoofing , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).

[21]  Yi Li,et al.  Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.

[22]  Julian Fiérrez,et al.  Evaluation of direct attacks to fingerprint verification systems , 2011, Telecommun. Syst..

[23]  Anderson Rocha,et al.  Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Thuc Dinh Nguyen,et al.  Discriminating Between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy , 2015, IWDW.

[25]  Paul A. Viola,et al.  Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.

[26]  Junjie Yan,et al.  A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[27]  Matti Pietikäinen,et al.  Multiscale Local Phase Quantization for Robust Component-Based Face Recognition Using Kernel Fusion of Multiple Descriptors , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[28]  Sébastien Marcel,et al.  Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[29]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[30]  William J. Christmas,et al.  Ieee Transactions on Information Forensics and Security 1 Face Spoofing Detection Based on Multiple Descriptor Fusion Using Multiscale Dynamic Binarized Statistical Image Features , 2022 .