Conference Paper

Face liveness detection by learning multispectral reflectance distributions

Center for Biometrics & Security Res., Chinese Acad. of Sci., Beijing, China
DOI: 10.1109/FG.2011.5771438 Conference: Automatic Face & Gesture Recognition and Workshops (FG 2011), 2011 IEEE International Conference on
Source: DBLP


Existing face liveness detection algorithms adopt behavioural challenge-response methods that require user cooperation. To be verified live, users are expected to obey some user unfriendly requirement. In this paper, we present a multispectral face liveness detection method, which is user cooperation free. Moreover, the system is adaptive to various user-system distances. Using the Lambertian model, we analyze multispectral properties of human skin versus non-skin, and the discriminative wavelengths are then chosen. Reflectance data of genuine and fake faces at multi-distances are selected to form a training set. An SVM classifier is trained to learn the multispectral distribution for a final Genuine-or-Fake classification. Compared with previous works, the proposed method has the following advantages: (a) The requirement on the users' cooperation is no longer needed, making the liveness detection user friendly and fast. (b) The system can work without restricted distance requirement from the target being analyzed. Experiments are conducted on genuine versus planar face data, and genuine versus mask face data. Furthermore a comparison with the visible challenge-response liveness detection method is also given. The experimental results clearly demonstrate the superiority of our method over previous systems.

Download full-text


Available from: Dong Yi, Oct 05, 2015
57 Reads
  • Source
    • "However, these methods impose extra requirements on the user or the face recognition system, and hence have a narrower application range. For example, an IR sensor was required in [6], a microphone and speech analyzer were required in [21], and multiple face images taken from different viewpoints were required in [19]. Additionally, the spoofing context method proposed in [20] can be circumvented by concealing the spoofing medium. "
    [Show abstract] [Hide abstract]
    ABSTRACT: Automatic face recognition is now widely used in applications ranging from deduplication of identity to authentication of mobile payment. This popularity of face recognition has raised concerns about face spoof attacks (also known as biometric sensor presentation attacks), where a photo or video of an authorized person’s face could be used to gain access to facilities or services. While a number of face spoof detection techniques have been proposed, their generalization ability has not been adequately addressed. We propose an efficient and rather robust face spoof detection algorithm based on image distortion analysis (IDA). Four different features (specular reflection, blurriness, chromatic moment, and color diversity) are extracted to form the IDA feature vector. An ensemble classifier, consisting of multiple SVM classifiers trained for different face spoof attacks (e.g., printed photo and replayed video), is used to distinguish between genuine (live) and spoof faces. The proposed approach is extended to multiframe face spoof detection in videos using a voting-based scheme. We also collect a face spoof database, MSU mobile face spoofing database (MSU MFSD), using two mobile devices (Google Nexus 5 and MacBook Air) with three types of spoof attacks (printed photo, replayed video with iPhone 5S, and replayed video with iPad Air). Experimental results on two public-domain face spoof databases (Idiap REPLAY-ATTACK and CASIA FASD), and the MSU MFSD database show that the proposed approach outperforms the state-of-the-art methods in spoof detection. Our results also highlight the difficulty in separating genuine and spoof faces, especially in cross-database and cross-device scenarios.
    IEEE Transactions on Information Forensics and Security 04/2015; 10(4). DOI:10.1109/TIFS.2015.2400395 · 2.41 Impact Factor
  • Source
    • "On the other hand, no analysis of how well the spoofing attacks perform could be presented, since although the masks are face-like, they do not mimic any real person. Apart from lacking this analysis on spoofing performances of the masks, another limitation with these two studies [11], [19] is that they are not very convenient due to their special expensive hardware requirements, as stated by the same authors in [20]. Lately, a different line of research in spoofing with masks has been published by Kose et al. for which a non-public database composed of printed 3D masks of 16 users is utilized [21], [22], [23], [24]. "
    [Show abstract] [Hide abstract]
    ABSTRACT: Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still an open security issue in biometrics domain and among all biometric traits, face is exposed to the most serious threat, since it is particularly easy to access and reproduce. In this paper, many different types of face spoofing attacks have been examined and various algorithms have been proposed to detect them. Mainly focusing on 2D attacks forged by displaying printed photos or replaying recorded videos on mobile devices, a significant portion of these studies ground their arguments on the flatness of the spoofing material in front of the sensor. However, with the advancements in 3D reconstruction and printing technologies, this assumption can no longer be maintained. In this paper, we aim to inspect the spoofing potential of subject-specific 3D facial masks for different recognition systems and address the detection problem of this more complex attack type. In order to assess the spoofing performance of 3D masks against 2D, 2.5D, and 3D face recognition and to analyze various texture-based countermeasures using both 2D and 2.5D data, a parallel study with comprehensive experiments is performed on two data sets: the Morpho database which is not publicly available and the newly distributed 3D mask attack database.
    IEEE Transactions on Information Forensics and Security 07/2014; 9(7):1084-1097. DOI:10.1109/TIFS.2014.2322255 · 2.41 Impact Factor
  • Source
    • "Chang et al. [2] showed than much more facial information can be obtained if more than one spectrums are used. Moverover, multispectral imaging is inborn robust to spoofing attacks, and in [3], [4] promising results are given. Based on the above advantages, multispectral face biometrics is surely a promising research area in future. "
    [Show abstract] [Hide abstract]
    ABSTRACT: This letter addresses the problem of face detection in multispectral illuminations. Face detection in visible images has been well addressed based on the large scale training samples. For the recently emerging multispectral face biometrics, however, the face data is scarce and expensive to collect, and it is usually short of face samples to train an accurate face detector. In this letter, we propose to tackle the issue of multispectral face detection by combining existing large scale visible face images and a few multispectral face images. We cast the problem of face detection across spectrum into the transfer learning framework and try to learn the robust multispectral face detector by exploring relevant knowledge from visible data domain. Specifically, a novel Regularized Transfer Boosting algorithm named R-TrBoost is proposed, with features of weighted loss objective and manifold regularization. Experiments are performed with face images of two spectrums, 850 nm and 365 nm, and the results show significant improvement on multispectral face detection using the proposed algorithm.
    IEEE Signal Processing Letters 03/2012; 19(3):131-134. DOI:10.1109/LSP.2011.2171949 · 1.75 Impact Factor
Show more