Conference Paper

Face liveness detection by learning multispectral reflectance distributions

Center for Biometrics & Security Res., Chinese Acad. of Sci., Beijing, China
DOI: 10.1109/FG.2011.5771438 Conference: Automatic Face & Gesture Recognition and Workshops (FG 2011), 2011 IEEE International Conference on
Source: DBLP

ABSTRACT Existing face liveness detection algorithms adopt behavioural challenge-response methods that require user cooperation. To be verified live, users are expected to obey some user unfriendly requirement. In this paper, we present a multispectral face liveness detection method, which is user cooperation free. Moreover, the system is adaptive to various user-system distances. Using the Lambertian model, we analyze multispectral properties of human skin versus non-skin, and the discriminative wavelengths are then chosen. Reflectance data of genuine and fake faces at multi-distances are selected to form a training set. An SVM classifier is trained to learn the multispectral distribution for a final Genuine-or-Fake classification. Compared with previous works, the proposed method has the following advantages: (a) The requirement on the users' cooperation is no longer needed, making the liveness detection user friendly and fast. (b) The system can work without restricted distance requirement from the target being analyzed. Experiments are conducted on genuine versus planar face data, and genuine versus mask face data. Furthermore a comparison with the visible challenge-response liveness detection method is also given. The experimental results clearly demonstrate the superiority of our method over previous systems.

4 Bookmarks
 · 
149 Views
  • [Show abstract] [Hide abstract]
    ABSTRACT: Spoof attacks consist in submitting fake biometric traits to biometric systems, and are a major threat that can curtail their security. Multi-modal biometric systems are commonly believed to be intrinsically more robust to spoof attacks, but recent works have shown that they can be evaded by spoofing even a single biometric trait. This result was however obtained under the worst-case scenario that the attacker is able to fabricate an exact replica of the genuine biometric trait, which was simulated by assuming that the matching score distribution of fake traits is identical to the one of genuine users. This demands for a more thorough investigation of the robustness of multi-modal biometric systems against realistic spoof attacks, namely under non-worst case scenarios. In this paper we focus on bi-modal systems made up of a face and a fingerprint matcher, whose scores are fused using the well-known sum, product, weighted sum and likelihood ratio (LLR) rules. We evaluate their robustness against realistic spoof attacks obtained by fabricating fake biometric traits. The main goal of our study is to investigate whether a realistic spoof attack against both modalities can allow the attacker to crack the multimodal system. Our results show that even in a realistic, non-worst case scenario, the false acceptance rate (FAR) can remarkably increase.
    Biometric Measurements and Systems for Security and Medical Applications (BIOMS), 2011 IEEE Workshop on; 10/2011
  • [Show abstract] [Hide abstract]
    ABSTRACT: Photographs, videos or masks can be used to spoof face recognition systems. In this paper, a countermeasure is proposed to protect face recognition systems against 3D mask attacks. The reason for the lack of studies on countermeasures against mask attacks is mainly due to the unavailability of public databases dedicated to mask attack. In this study, a 2D+3D mask attacks database is used that is prepared for a research project in which the authors are all involved. The proposed countermeasure is based on the fusion of the information extracted from both the texture and the depth images in the mask database, and provides satisfactory results to protect recognition systems against mask attacks. Another contribution of this study is that the countermeasure is integrated to the selected baseline systems for 2D and 3D face recognition, which provides to analyze the performances of the systems with/without attacks and with/without the countermeasure.
    Computer Vision and Pattern Recognition Workshops (CVPRW), 2013 IEEE Conference on; 01/2013
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still an open security issue in biometrics domain and among all biometric traits, face is exposed to the most serious threat, since it is particularly easy to access and reproduce. In this paper, many different types of face spoofing attacks have been examined and various algorithms have been proposed to detect them. Mainly focusing on 2D attacks forged by displaying printed photos or replaying recorded videos on mobile devices, a significant portion of these studies ground their arguments on the flatness of the spoofing material in front of the sensor. However, with the advancements in 3D reconstruction and printing technologies, this assumption can no longer be maintained. In this paper, we aim to inspect the spoofing potential of subject-specific 3D facial masks for different recognition systems and address the detection problem of this more complex attack type. In order to assess the spoofing performance of 3D masks against 2D, 2.5D, and 3D face recognition and to analyze various texture-based countermeasures using both 2D and 2.5D data, a parallel study with comprehensive experiments is performed on two data sets: the Morpho database which is not publicly available and the newly distributed 3D mask attack database.
    IEEE Transactions on Information Forensics and Security 01/2014; 9(7):1084-1097. · 1.90 Impact Factor

Full-text (2 Sources)

View
90 Downloads
Available from
Jun 1, 2014