Secure Face Unlock: Spoof Detection on Smartphones

被引:298
作者
Patel, Keyurkumar [1 ]
Han, Hu [1 ,2 ]
Jain, Anil K.
机构
[1] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
[2] Chinese Acad Sci, Inst Comp Technol, Key Lab Intelligent Informat Proc, Beijing 100190, Peoples R China
关键词
Face antispoofing; face unlock; spoof detection on smartphone; unconstraint smartphone spoof attack database; image distortion analysis; LIVENESS DETECTION; IMAGE; IRIS;
D O I
10.1109/TIFS.2016.2578288
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the wide deployment of the face recognition systems in applications from deduplication to mobile device unlocking, security against the face spoofing attacks requires increased attention; such attacks can be easily launched via printed photos, video replays, and 3D masks of a face. We address the problem of face spoof detection against the print (photo) and replay (photo or video) attacks based on the analysis of image distortion (e.g., surface reflection, moire pattern, color distortion, and shape deformation) in spoof face images (or video frames). The application domain of interest is smartphone unlock, given that the growing number of smartphones have the face unlock and mobile payment capabilities. We build an unconstrained smartphone spoof attack database (MSU USSA) containing more than 1000 subjects. Both the print and replay attacks are captured using the front and rear cameras of a Nexus 5 smartphone. We analyze the image distortion of the print and replay attacks using different: 1) intensity channels (R, G, B, and grayscale); 2) image regions (entire image, detected face, and facial component between nose and chin); and 3) feature descriptors. We develop an efficient face spoof detection system on an Android smartphone. Experimental results on the public-domain Idiap Replay-Attack, CASIA FASD, and MSU-MFSD databases, and the MSU USSA database show that the proposed approach is effective in face spoof detection for both the cross-database and intra-database testing scenarios. User studies of our Android face spoof detection system involving 20 participants show that the proposed approach works very well in real application scenarios.
引用
收藏
页码:2268 / 2283
页数:16
相关论文
共 51 条
  • [11] Boulkenafet Z, 2015, IEEE IMAGE PROC, P2636, DOI 10.1109/ICIP.2015.7351280
  • [12] Chingovska I., 2012, BIOSIG, P1
  • [13] On the Use of Client Identity Information for Face Antispoofing
    Chingovska, Ivana
    dos Anjos, Andre Rabello
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (04) : 787 - 796
  • [14] Crouse D, 2015, INT CONF BIOMETR, P135, DOI 10.1109/ICB.2015.7139043
  • [16] de Freitas Pereira Tiago, 2013, Biometrics (ICB), 2013 International Conference on
  • [17] De Marsico M., 2012, 2012 5th IAPR International Conference on Biometrics (ICB), P73, DOI 10.1109/ICB.2012.6199761
  • [18] Spoofing Face Recognition With 3D Masks
    Erdogmus, Nesli
    Marcel, Sebastien
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (07) : 1084 - 1097
  • [19] Guest Editorial Special Issue on Biometric Spoofing and Countermeasures
    Evans, Nicholas
    Li, Stan Z.
    Marcel, Sebastien
    Ross, Arun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (04) : 699 - 702
  • [20] Biometric Antispoofing Methods: A Survey in Face Recognition
    Galbally, Javier
    Marcel, Sebastien
    Fierrez, Julian
    [J]. IEEE ACCESS, 2014, 2 : 1530 - 1552