Face Spoof Attack Recognition Using Discriminative Image Patches

被引:27
作者
Akhtar, Zahid [1 ]
Foresti, Gian Luca [1 ]
机构
[1] Univ Udine, Dept Math & Comp Sci, Via Sci 206, I-33100 Udine, Italy
关键词
D O I
10.1155/2016/4721849
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face recognition systems are now being used in many applications such as border crossings, banks, and mobile payments. The wide scale deployment of facial recognition systems has attracted intensive attention to the reliability of face biometrics against spoof attacks, where a photo, a video, or a 3D mask of a genuine user's face can be used to gain illegitimate access to facilities or services. Though several face antispoofing or liveness detection methods (which determine at the time of capture whether a face is live or spoof) have been proposed, the issue is still unsolved due to difficulty in finding discriminative and computationally inexpensive features and methods for spoof attacks. In addition, existing techniques use whole face image or complete video for liveness detection. However, often certain face regions (video frames) are redundant or correspond to the clutter in the image (video), thus leading generally to low performances. Therefore, we propose seven novel methods to find discriminative image patches, which we define as regions that are salient, instrumental, and class-specific. Four well-known classifiers, namely, support vector machine (SVM), Naive-Bayes, Quadratic Discriminant Analysis (QDA), and Ensemble, are then used to distinguish between genuine and spoof faces using a voting based scheme. Experimental analysis on two publicly available databases (Idiap REPLAY-ATTACK and CASIA-FASD) shows promising results compared to existing works.
引用
收藏
页数:14
相关论文
共 40 条
[1]   Biometric Liveness Detection: Challenges and Research Opportunities [J].
Akhtar, Zahid ;
Micheloni, Christian ;
Foresti, Gian Luca .
IEEE SECURITY & PRIVACY, 2015, 13 (05) :63-72
[2]  
Akhtar Z, 2015, INT CONF BIOMETR, P305, DOI 10.1109/ICB.2015.7139054
[3]  
Akhtar Z, 2014, 2014 11TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE (AVSS), P187, DOI 10.1109/AVSS.2014.6918666
[4]  
Anjos A., 2011, 2011 INT JOINT C BIO, P1, DOI DOI 10.1109/IJCB.2011.6117503
[5]   Steganalysis using image quality metrics [J].
Avcibas, I ;
Memon, N ;
Sankur, B .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2003, 12 (02) :221-229
[6]  
Bai JM, 2010, IEEE INT SYMP CIRC S, P3425, DOI 10.1109/ISCAS.2010.5537866
[7]  
Bao W, 2009, PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON IMAGE ANALYSIS AND SIGNAL PROCESSING, P233
[8]   Image manipulation detection [J].
Bayram, Sevinc ;
Avcibas, Ismail ;
Sankur, Bulent ;
Memon, Nasir .
JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
[9]  
Bharadwaj S., 2014, IIITDTR2014003
[10]  
Boulkenafet Z, 2015, IEEE IMAGE PROC, P2636, DOI 10.1109/ICIP.2015.7351280