Detection of Face Spoofing Using Visual Dynamics

被引:187
作者
Tirunagari, Santosh [1 ]
Poh, Norman [1 ]
Windridge, David [1 ]
Iorliam, Aamo [1 ]
Suki, Nik [1 ]
Ho, Anthony T. S. [1 ]
机构
[1] Univ Surrey, Fac Engn & Phys Sci, Guildford GU2 7XH, Surrey, England
基金
英国工程与自然科学研究理事会;
关键词
DMD; spoofing; replay-attack; print-attack; CASIA-FASD; LBP; SVM; MODE DECOMPOSITION;
D O I
10.1109/TIFS.2015.2406533
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Rendering a face recognition system robust is vital in order to safeguard it against spoof attacks carried out using printed pictures of a victim (also known as print attack) or a replayed video of the person (replay attack). A key property in distinguishing a live, valid access from printed media or replayed videos is by exploiting the information dynamics of the video content, such as blinking eyes, moving lips, and facial dynamics. We advance the state of the art in facial antispoofing by applying a recently developed algorithm called dynamic mode decomposition (DMD) as a general purpose, entirely data-driven approach to capture the above liveness cues. We propose a classification pipeline consisting of DMD, local binary patterns (LBPs), and support vector machines (SVMs) with a histogram intersection kernel. A unique property of DMD is its ability to conveniently represent the temporal information of the entire video as a single image with the same dimensions as those images contained in the video. The pipeline of DMD + LBP + SVM proves to be efficient, convenient to use, and effective. In fact only the spatial configuration for LBP needs to be tuned. The effectiveness of the methodology was demonstrated using three publicly available databases: 1) print-attack; 2) replay-attack; and 3) CASIA-FASD, attaining comparable results with the state of the art, following the respective published experimental protocols.
引用
收藏
页码:762 / 777
页数:16
相关论文
共 54 条
[1]  
Anjos A., 2011, P INT JOINT C BIOM I, P1, DOI [10.1109/IJCB.2011.6117503., DOI 10.1109/IJCB.2011.6117503]
[2]   Motion-based counter-measures to photo attacks in face recognition [J].
Anjos, Andre ;
Chakka, Murali Mohan ;
Marcel, Sebastien .
IET BIOMETRICS, 2014, 3 (03) :147-158
[3]  
[Anonymous], 2004, KERNEL METHODS PATTE
[4]  
[Anonymous], 2011, 2011 INT JOINT C BIO
[5]  
[Anonymous], 2011, 2011 INT JOINT C BIO, DOI DOI 10.1109/IJCB.2011.6117592
[6]  
[Anonymous], P INT C IM PROC ICIP
[7]  
[Anonymous], 2009, BLACK HAT C DEC
[8]  
[Anonymous], 1974, SOLVING LEAST SQUARE
[9]  
[Anonymous], 2008, J. Recent Adv. in Face Recogn
[10]  
Bao W, 2009, PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON IMAGE ANALYSIS AND SIGNAL PROCESSING, P233