Skip to main content
Top

2019 | OriginalPaper | Chapter

A Database for Face Presentation Attack Using Wax Figure Faces

Authors : Shan Jia, Chuanbo Hu, Guodong Guo, Zhengquan Xu

Published in: New Trends in Image Analysis and Processing – ICIAP 2019

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Compared to 2D face presentation attacks (e.g. printed photos and video replays), 3D type attacks are more challenging to face recognition systems (FRS) by presenting 3D characteristics or materials similar to real faces. Existing 3D face spoofing databases, however, mostly based on 3D masks, are restricted to small data size or poor authenticity due to the production difficulty and high cost. In this work, we introduce the first wax figure face database, WFFD, as one type of super-realistic 3D presentation attacks to spoof the FRS. This database consists of 2200 images with both real and wax figure faces (totally 4400 faces) with a high diversity from online collections. Experiments on this database first investigate the vulnerability of three popular FRS to this kind of new attack. Further, we evaluate the performance of several face presentation attack detection methods to show the attack abilities of this super-realistic face spoofing database.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zhang, Z., Yan, J., et al.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 26–31. IEEE (2012) Zhang, Z., Yan, J., et al.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 26–31. IEEE (2012)
2.
go back to reference Erdogmus, N., Marcel, S.: Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–6. IEEE (September 2013) Erdogmus, N., Marcel, S.: Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–6. IEEE (September 2013)
3.
go back to reference Liu, S., Yang, B., Yuen, P.C., Zhao, G.: A 3D mask face anti-spoofing database with real world variations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 100–106 (2016) Liu, S., Yang, B., Yuen, P.C., Zhao, G.: A 3D mask face anti-spoofing database with real world variations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 100–106 (2016)
4.
go back to reference Galbally, J., Satta, R.: Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models. IET Biometrics 5(2), 83–91 (2016)CrossRef Galbally, J., Satta, R.: Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models. IET Biometrics 5(2), 83–91 (2016)CrossRef
5.
go back to reference Manjani, I., Tariyal, S., Vatsa, M., Singh, R., Majumdar, A.: Detecting silicone mask-based presentation attack via deep dictionary learning. IEEE Trans. Inf. Forensics Secur. 12(7), 1713–1723 (2017)CrossRef Manjani, I., Tariyal, S., Vatsa, M., Singh, R., Majumdar, A.: Detecting silicone mask-based presentation attack via deep dictionary learning. IEEE Trans. Inf. Forensics Secur. 12(7), 1713–1723 (2017)CrossRef
6.
go back to reference Agarwal, A., Yadav, D., Kohli, N., Singh, R., Vatsa, M., Noore, A.: Face presentation attack with latex masks in multispectral videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 81–89 (2017) Agarwal, A., Yadav, D., Kohli, N., Singh, R., Vatsa, M., Noore, A.: Face presentation attack with latex masks in multispectral videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 81–89 (2017)
7.
go back to reference Bhattacharjee, S., Marcel, S.: What you can’t see can help you-extended-range imaging for 3D-mask presentation attack detection. In 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–7. IEEE (September 2017) Bhattacharjee, S., Marcel, S.: What you can’t see can help you-extended-range imaging for 3D-mask presentation attack detection. In 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–7. IEEE (September 2017)
8.
go back to reference ISO/IEC JTC 1/SC 37 Biometrics, Information Technology–Biometric presentation attack detection–Part 1: Framework. International Organization for Standardization (2016) ISO/IEC JTC 1/SC 37 Biometrics, Information Technology–Biometric presentation attack detection–Part 1: Framework. International Organization for Standardization (2016)
9.
go back to reference Kim, Y., Na, J., Yoon, S., Yi, J.: Masked fake face detection using radiance measurements. JOSA A 26(4), 760–766 (2009)CrossRef Kim, Y., Na, J., Yoon, S., Yi, J.: Masked fake face detection using radiance measurements. JOSA A 26(4), 760–766 (2009)CrossRef
10.
go back to reference Zhang, Z., Yi, D., Lei, Z., Li, S.Z.: Face liveness detection by learning multispectral reflectance distributions. In: FG, pp. 436–441 (March 2011) Zhang, Z., Yi, D., Lei, Z., Li, S.Z.: Face liveness detection by learning multispectral reflectance distributions. In: FG, pp. 436–441 (March 2011)
11.
go back to reference Steiner, H., Kolb, A., Jung, N.: Reliable face anti-spoofing using multispectral SWIR imaging. In: 2016 International Conference on Biometrics (ICB), pp. 1–8. IEEE (June 2016) Steiner, H., Kolb, A., Jung, N.: Reliable face anti-spoofing using multispectral SWIR imaging. In: 2016 International Conference on Biometrics (ICB), pp. 1–8. IEEE (June 2016)
12.
go back to reference Kose, N., Dugelay, J.L.: Countermeasure for the protection of face recognition systems against mask attacks. In: 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), pp. 1–6. IEEE (April 2013) Kose, N., Dugelay, J.L.: Countermeasure for the protection of face recognition systems against mask attacks. In: 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), pp. 1–6. IEEE (April 2013)
13.
go back to reference Kose, N., Dugelay, J.L.: Shape and texture based countermeasure to protect face recognition systems against mask attacks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 111–116 (2013) Kose, N., Dugelay, J.L.: Shape and texture based countermeasure to protect face recognition systems against mask attacks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 111–116 (2013)
14.
go back to reference Naveen, S., Fathima, R.S., Moni, R.S.: Face recognition and authentication using LBP and BSIF mask detection and elimination. In: 2016 International Conference on Communication Systems and Networks (ComNet), pp. 99–102. IEEE (July 2016) Naveen, S., Fathima, R.S., Moni, R.S.: Face recognition and authentication using LBP and BSIF mask detection and elimination. In: 2016 International Conference on Communication Systems and Networks (ComNet), pp. 99–102. IEEE (July 2016)
15.
go back to reference Agarwal, A., Singh, R., Vatsa, M.: Face anti-spoofing using Haralick features. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–6. IEEE (September 2016) Agarwal, A., Singh, R., Vatsa, M.: Face anti-spoofing using Haralick features. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–6. IEEE (September 2016)
16.
go back to reference Hamdan, B., Mokhtar, K.: The detection of spoofing by 3D mask in a 2D identity recognition system. Egypt. Inform. J. 19(2), 75–82 (2018)CrossRef Hamdan, B., Mokhtar, K.: The detection of spoofing by 3D mask in a 2D identity recognition system. Egypt. Inform. J. 19(2), 75–82 (2018)CrossRef
18.
go back to reference Menotti, D., et al.: Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 864–879 (2015)CrossRef Menotti, D., et al.: Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 864–879 (2015)CrossRef
20.
21.
go back to reference Liu, S.Q., Lan, X., Yuen, P.C.: Remote photoplethysmography correspondence feature for 3D mask face presentation attack detection. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 558–573 (2018)CrossRef Liu, S.Q., Lan, X., Yuen, P.C.: Remote photoplethysmography correspondence feature for 3D mask face presentation attack detection. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 558–573 (2018)CrossRef
22.
go back to reference Hernandez-Ortega, J., Fierrez, J., Morales, A., Tome, P.: Time analysis of pulse-based face anti-spoofing in visible and NIR. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 544–552 (2018) Hernandez-Ortega, J., Fierrez, J., Morales, A., Tome, P.: Time analysis of pulse-based face anti-spoofing in visible and NIR. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 544–552 (2018)
24.
go back to reference Amos, B., Ludwiczuk, B., Satyanarayanan, M.: Openface: a general-purpose face recognition library with mobile applications. CMU Sch. Comput. Sci. 6 (2016) Amos, B., Ludwiczuk, B., Satyanarayanan, M.: Openface: a general-purpose face recognition library with mobile applications. CMU Sch. Comput. Sci. 6 (2016)
26.
go back to reference Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 2636–2640. IEEE (September 2015) Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 2636–2640. IEEE (September 2015)
27.
go back to reference Benlamoudi, A., Samai, D., Ouafi, A., Bekhouche, S.E., Taleb-Ahmed, A., Hadid, A.: Face spoofing detection using multi-level local phase quantization (ML-LPQ). In: Proceeding of the First International Conference on Automatic Control, Telecommunication and signals ICATS15 (November 2015) Benlamoudi, A., Samai, D., Ouafi, A., Bekhouche, S.E., Taleb-Ahmed, A., Hadid, A.: Face spoofing detection using multi-level local phase quantization (ML-LPQ). In: Proceeding of the First International Conference on Automatic Control, Telecommunication and signals ICATS15 (November 2015)
29.
go back to reference Kose, N., Dugelay, J.L.: Reflectance analysis based countermeasure technique to detect face mask attacks. In: 2013 18th International Conference on Digital Signal Processing (DSP), pp. 1–6. IEEE (July 2013) Kose, N., Dugelay, J.L.: Reflectance analysis based countermeasure technique to detect face mask attacks. In: 2013 18th International Conference on Digital Signal Processing (DSP), pp. 1–6. IEEE (July 2013)
Metadata
Title
A Database for Face Presentation Attack Using Wax Figure Faces
Authors
Shan Jia
Chuanbo Hu
Guodong Guo
Zhengquan Xu
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-30754-7_5

Premium Partner