Detecting face presentation attacks in mobile devices with a patch-based CNN and a sensor-aware loss function

被引:26
作者
Almeida, Waldir R. [1 ]
Andalo, Fernanda A. [1 ]
Padilha, Rafael [1 ]
Bertocco, Gabriel [1 ]
Dias, William [1 ]
Torres, Ricardo da S. [2 ]
Wainer, Jacques [1 ]
Rocha, Anderson [1 ]
机构
[1] Univ Estadual Campinas, Inst Comp, Campinas, SP, Brazil
[2] NTNU, Dept ICT & Nat Sci, Fac Informat Technol & Elect Engn, Alesund, Norway
来源
PLOS ONE | 2020年 / 15卷 / 09期
关键词
SPOOFING DETECTION; LIVENESS DETECTION; IMAGE;
D O I
10.1371/journal.pone.0238058
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the widespread use of biometric authentication comes the exploitation of presentation attacks, possibly undermining the effectiveness of these technologies in real-world setups. One example takes place when an impostor, aiming at unlocking someone else's smartphone, deceives the built-in face recognition system by presenting a printed image of the user. In this work, we study the problem of automatically detecting presentation attacks against face authentication methods, considering the use-case of fast device unlocking and hardware constraints of mobile devices. To enrich the understanding of how a purely software-based method can be used to tackle the problem, we present a solely data-driven approach trained with multi-resolution patches and a multi-objective loss function crafted specifically to the problem. We provide a careful analysis that considers several user-disjoint and cross-factor protocols, highlighting some of the problems with current datasets and approaches. Such analysis, besides demonstrating the competitive results yielded by the proposed method, provides a better conceptual understanding of the problem. To further enhance efficacy and discriminability, we propose a method that leverages the available gallery of user data in the device and adapts the method decision-making process to the user's and the device's own characteristics. Finally, we introduce a new presentation-attack dataset tailored to the mobile-device setup, with real-world variations in lighting, including outdoors and low-light sessions, in contrast to existing public datasets.
引用
收藏
页数:24
相关论文
共 53 条
[1]  
Amidror I, 2009, COMPUT IMAGING VIS, V38, P1
[2]   Motion-based counter-measures to photo attacks in face recognition [J].
Anjos, Andre ;
Chakka, Murali Mohan ;
Marcel, Sebastien .
IET BIOMETRICS, 2014, 3 (03) :147-158
[3]  
[Anonymous], 2017, JTC1SC37 ISOIEC
[4]  
[Anonymous], P INT C LEARNING REP
[5]  
[Anonymous], 2016, London, U.K., DOI DOI 10.1109/CYBERSECPODS.2016.7502351
[6]  
[Anonymous], 2014, ABS14085601 CORR
[7]  
[Anonymous], 2017, ACM, DOI [DOI 10.2165/00129785-200404040-00005, DOI 10.1145/3065386]
[8]  
[Anonymous], PROC INT C LEARN
[9]  
[Anonymous], arXiv
[10]  
[Anonymous], 2014, OBESITY SILVER SP S2, V22, pS40