Skip to main content
Top

2023 | OriginalPaper | Chapter

Facial Landmark Features-Based Face Misclassification Detection System

Authors : Aditya Bakshi, Sunanda Gupta

Published in: Proceedings of Third International Conference on Computing, Communications, and Cyber-Security

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Issues of face spoofing that can evade the verification system by placing the photo of real user on camera have been discussed a lot in the literature survey. By detecting the person through misclassification, the problem could be minimized. Therefore, in this paper, robust face misclassification detection system is proposed using ABT mechanism. The proposed system provides the additional level of security before face recognition module. Face landmark features such as eye, nose, and mouth movements are used for generating challenges for detecting fake users from genuine users using misclassification. The reliability of system is tested by placing photographs and videos from Replay-Attack database and live database. Proposed system gives good results under spoofing attacks such as eye imposter attack and mouth imposter attack. The results show that system detects the fake user when implemented on all types of attacks and confirms the 79.6% misclassification detection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zhao, W., Chellappa, R., Phillips, P. J., & Rosenfeld, A. (2003). Face recognition: A literature survey. ACM Computing Surveys (CSUR), 35(4), 399–458.CrossRef Zhao, W., Chellappa, R., Phillips, P. J., & Rosenfeld, A. (2003). Face recognition: A literature survey. ACM Computing Surveys (CSUR), 35(4), 399–458.CrossRef
2.
go back to reference Abate, A. F., Nappi, M., Riccio, D., & Sabatino, G. (2007). 2D and 3D face recognition: A survey. Pattern Recognition Letters, 28(14), 1885–1906.CrossRef Abate, A. F., Nappi, M., Riccio, D., & Sabatino, G. (2007). 2D and 3D face recognition: A survey. Pattern Recognition Letters, 28(14), 1885–1906.CrossRef
3.
go back to reference Schuckers, S. A. (2002). Spoofing and anti-spoofing measures. Information Security Technical Report, 7(4), 56–62.CrossRef Schuckers, S. A. (2002). Spoofing and anti-spoofing measures. Information Security Technical Report, 7(4), 56–62.CrossRef
4.
go back to reference Nixon, K. A., Aimale, V., & Rowe, R. K. (2008). Spoof detection schemes. In Handbook of biometrics (pp. 403–423). Springer. Nixon, K. A., Aimale, V., & Rowe, R. K. (2008). Spoof detection schemes. In Handbook of biometrics (pp. 403–423). Springer.
5.
go back to reference Biggio, B., Akhtar, Z., Fumera, G., Marcialis, G. L., & Roli, F. (2012). Security evaluation of biometric authentication systems under real spoofing attacks. IET Biometrics, 1(1), 11–24.CrossRef Biggio, B., Akhtar, Z., Fumera, G., Marcialis, G. L., & Roli, F. (2012). Security evaluation of biometric authentication systems under real spoofing attacks. IET Biometrics, 1(1), 11–24.CrossRef
6.
go back to reference Singh, A. K., Joshi, P., & Nandi, G. C. (2014, July). Face recognition with liveness detection using eye and mouth movement. In 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014) (pp. 592–597). IEEE. Singh, A. K., Joshi, P., & Nandi, G. C. (2014, July). Face recognition with liveness detection using eye and mouth movement. In 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014) (pp. 592–597). IEEE.
7.
go back to reference Wang, L., Ding, X., & Fang, C. (2009). Face live detection method based on physiological motion analysis. Tsinghua Science & Technology, 14(6), 685–690.CrossRef Wang, L., Ding, X., & Fang, C. (2009). Face live detection method based on physiological motion analysis. Tsinghua Science & Technology, 14(6), 685–690.CrossRef
8.
go back to reference Kose, N., & Dugelay, J. L. (2013, July). Reflectance analysis based countermeasure technique to detect face mask attacks. In 2013 18th International Conference on Digital Signal Processing (DSP) (pp. 1–6). IEEE. Kose, N., & Dugelay, J. L. (2013, July). Reflectance analysis based countermeasure technique to detect face mask attacks. In 2013 18th International Conference on Digital Signal Processing (DSP) (pp. 1–6). IEEE.
9.
go back to reference Dhamecha, T. I., Nigam, A., Singh, R., & Vatsa, M. (2013, June). Disguise detection and face recognition in visible and thermal spectrums. In 2013 International Conference on Biometrics (ICB) (pp. 1–8). IEEE. Dhamecha, T. I., Nigam, A., Singh, R., & Vatsa, M. (2013, June). Disguise detection and face recognition in visible and thermal spectrums. In 2013 International Conference on Biometrics (ICB) (pp. 1–8). IEEE.
10.
go back to reference Chen, H., Wang, W., Zhang, J., & Zhang, Q. (2019). Echoface: Acoustic sensor-based media attack detection for face authentication. IEEE Internet of Things Journal, 7(3), 2152–2159.CrossRef Chen, H., Wang, W., Zhang, J., & Zhang, Q. (2019). Echoface: Acoustic sensor-based media attack detection for face authentication. IEEE Internet of Things Journal, 7(3), 2152–2159.CrossRef
11.
go back to reference Sun, W., Song, Y., Chen, C., Huang, J., & Kot, A. C. (2020). Face spoofing detection based on local ternary label supervision in fully convolutional networks. IEEE Transactions on Information Forensics and Security, 15, 3181–3196. Sun, W., Song, Y., Chen, C., Huang, J., & Kot, A. C. (2020). Face spoofing detection based on local ternary label supervision in fully convolutional networks. IEEE Transactions on Information Forensics and Security, 15, 3181–3196.
12.
go back to reference Akhtar, Z., Fumera, G., Marcialis, G. L., & Roli, F. (2012, September). Evaluation of serial and parallel multibiometric systems under spoofing attacks. In 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS) (pp. 283–288). IEEE. Akhtar, Z., Fumera, G., Marcialis, G. L., & Roli, F. (2012, September). Evaluation of serial and parallel multibiometric systems under spoofing attacks. In 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS) (pp. 283–288). IEEE.
13.
go back to reference Rodrigues, R. N., Kamat, N., & Govindaraju, V. (2010, September). Evaluation of biometric spoofing in a multimodal system. In 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS) (pp. 1–5). IEEE. Rodrigues, R. N., Kamat, N., & Govindaraju, V. (2010, September). Evaluation of biometric spoofing in a multimodal system. In 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS) (pp. 1–5). IEEE.
14.
go back to reference Akhtar, Z., Rizwan, M., & Kale, S. (2011). Multimodal biometric fusion: Performance under spoof attacks. Akhtar, Z., Rizwan, M., & Kale, S. (2011). Multimodal biometric fusion: Performance under spoof attacks.
15.
go back to reference Bakshi, A., Gupta, S., Gupta, A., Tanwar, S., & Hsiao, K. F. (2020). 3T‐FASDM: Linear discriminant analysis‐based three‐tier face anti‐spoofing detection model using support vector machine. International Journal of Communication Systems, 33(12), e4441. Bakshi, A., Gupta, S., Gupta, A., Tanwar, S., & Hsiao, K. F. (2020). 3T‐FASDM: Linear discriminant analysis‐based three‐tier face anti‐spoofing detection model using support vector machine. International Journal of Communication Systems, 33(12), e4441.
16.
go back to reference Bal, R., Bakshi, A., & Gupta, S. (2019). Performance evaluation of optimization techniques with vector quantization used for image compression. In Harmony Search and Nature Inspired Optimization Algorithms (pp. 879–888). Springer. Bal, R., Bakshi, A., & Gupta, S. (2019). Performance evaluation of optimization techniques with vector quantization used for image compression. In Harmony Search and Nature Inspired Optimization Algorithms (pp. 879–888). Springer.
17.
go back to reference Bakshi, A., & Gupta, S. (2020). An efficient face anti-spoofing and detection model using image quality assessment parameters. Multimedia Tools and Applications, 1–22. Bakshi, A., & Gupta, S. (2020). An efficient face anti-spoofing and detection model using image quality assessment parameters. Multimedia Tools and Applications, 1–22.
18.
go back to reference Bakshi, A., & Gupta, S. (2021). A taxonomy on biometric security and its applications. In Innovations in Information and Communication Technologies (IICT-2020) (pp. 211–218). Springer. Bakshi, A., & Gupta, S. (2021). A taxonomy on biometric security and its applications. In Innovations in Information and Communication Technologies (IICT-2020) (pp. 211–218). Springer.
19.
go back to reference Bakshi, A. (2018, July). A comparative analysis of different intrusion detection techniques in cloud computing. In International Conference on Advanced Informatics for Computing Research (pp. 358–378). Singapore: Springer. Bakshi, A. (2018, July). A comparative analysis of different intrusion detection techniques in cloud computing. In International Conference on Advanced Informatics for Computing Research (pp. 358–378). Singapore: Springer.
Metadata
Title
Facial Landmark Features-Based Face Misclassification Detection System
Authors
Aditya Bakshi
Sunanda Gupta
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-1142-2_27