Skip to main content

2017 | OriginalPaper | Buchkapitel

Face Anti-spoofing Algorithm Based on Gray Level Co-occurrence Matrix and Dual Tree Complex Wavelet Transform

verfasst von : Xiaofeng Qu, Hengjian Li, Jiwen Dong

Erschienen in: Intelligent Data Engineering and Automated Learning – IDEAL 2017

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

By analyzing the difference of facial texture features between living face and photo, we propose a novel face anti-spoofing algorithm based on gray level co-occurrence matrix (GLCM) and dual-tree complex wavelet tree (DT-CWT). Firstly, inspired by the co-occurrence matrix, we extract five texture features including angle second moment, entropy, contrast, correlation and local uniformity to represent the gray direction, interval and amplitude information for the face texture information. Secondly, DT-CWT has the advantages of approximate translation invariance and good direction selectivity. Therefore, the coefficients of DT-CWT can enhance the texture information and edge information in the frequency domain. At last, the SVM classification is used to distinguish between true and fake face. Our algorithm is demonstrated on the published NUAA database. Compared with the existing methods, the feature dimension is reduced. The experimental results show that the proposed algorithm improves the detection accuracy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Duc, N.M., Minh, B.Q.: Your face is not your password. In: Black Hat Conference, pp. 1–16 (2009) Duc, N.M., Minh, B.Q.: Your face is not your password. In: Black Hat Conference, pp. 1–16 (2009)
2.
Zurück zum Zitat Choudhury, T., Clarkson, B., Jebara, T., Pentland, A.: Multimodal person recognition using unconstrained audio and video. In: AVBPA 99, Washington DC, pp. 176–181 (1999) Choudhury, T., Clarkson, B., Jebara, T., Pentland, A.: Multimodal person recognition using unconstrained audio and video. In: AVBPA 99, Washington DC, pp. 176–181 (1999)
3.
Zurück zum Zitat Kollreider, K., Fronthaler, H., Bigun, J.: Evaluating liveness by face images and the structure tensor. In: Fourth IEEE Workshop on Automatic Identification Advanced Technologies, pp. 75–80, October 2005 Kollreider, K., Fronthaler, H., Bigun, J.: Evaluating liveness by face images and the structure tensor. In: Fourth IEEE Workshop on Automatic Identification Advanced Technologies, pp. 75–80, October 2005
4.
Zurück zum Zitat Socolinsky, D.A., Selinger, A., Neuheisel, J.D.: Face recognition with visible and thermal infrared imager. CVIU 91(1–2), 72–114 (2003) Socolinsky, D.A., Selinger, A., Neuheisel, J.D.: Face recognition with visible and thermal infrared imager. CVIU 91(1–2), 72–114 (2003)
5.
Zurück zum Zitat Jee, H.-K., Jung, S.-U., Yoo, J.-H.: Liveness detection for embedded face recognition system. Int. J. Med. Sci. 1, 235–238 (2006) Jee, H.-K., Jung, S.-U., Yoo, J.-H.: Liveness detection for embedded face recognition system. Int. J. Med. Sci. 1, 235–238 (2006)
6.
Zurück zum Zitat Li, J., Wang, Y., Tan, T., Jain, A.: Live face detection based on the analysis of fourier spectra. In: Proceedings of SPIE Biometric Technology for Human Identification, vol. 5404, pp. 296–303 (2004) Li, J., Wang, Y., Tan, T., Jain, A.: Live face detection based on the analysis of fourier spectra. In: Proceedings of SPIE Biometric Technology for Human Identification, vol. 5404, pp. 296–303 (2004)
7.
Zurück zum Zitat Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: Bromme, A., Busch, C., (eds.) BIOSIG, pp. 1–7. IEEE (2012) Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: Bromme, A., Busch, C., (eds.) BIOSIG, pp. 1–7. IEEE (2012)
8.
Zurück zum Zitat Maatta, J., Hadid, A., Pietikainen, M.: Face spoofing detection from single images using micro-texture analysis. In: International Joint Conference on Biometrics (IJCB2011), Washington DC, USA, pp. 10–17 (2011) Maatta, J., Hadid, A., Pietikainen, M.: Face spoofing detection from single images using micro-texture analysis. In: International Joint Conference on Biometrics (IJCB2011), Washington DC, USA, pp. 10–17 (2011)
9.
Zurück zum Zitat Maatta, J., Hadid, A., Pietikainen, M.: Face spoofing detection from single images using texture and local shape analysis. IET Biometrics 1(1), 3–10 (2012). The Institution of Engineering and Technology 2012CrossRef Maatta, J., Hadid, A., Pietikainen, M.: Face spoofing detection from single images using texture and local shape analysis. IET Biometrics 1(1), 3–10 (2012). The Institution of Engineering and Technology 2012CrossRef
10.
Zurück zum Zitat Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10, 1–16 (2015)CrossRef Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10, 1–16 (2015)CrossRef
11.
Zurück zum Zitat Dong, Z., Tang, X., Zhang, S., et al.: Image restoration combined with wavelet transform and texture synthesis. Chin. J. Image Graph. 20(7), 882–894 (2015) Dong, Z., Tang, X., Zhang, S., et al.: Image restoration combined with wavelet transform and texture synthesis. Chin. J. Image Graph. 20(7), 882–894 (2015)
12.
Zurück zum Zitat Cao, Yu., Ling, T., Lifang, W.: Live face gray co-occurrence matrix and wavelet analysis in authentication detection algorithm. J. Sig. Process. 30(7), 830–835 (2014) Cao, Yu., Ling, T., Lifang, W.: Live face gray co-occurrence matrix and wavelet analysis in authentication detection algorithm. J. Sig. Process. 30(7), 830–835 (2014)
13.
Zurück zum Zitat Tan, X., Li, Y., Liu, J., Jiang, L.: Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010. LNCS, vol. 6316, pp. 504–517. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15567-3_37 CrossRef Tan, X., Li, Y., Liu, J., Jiang, L.: Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010. LNCS, vol. 6316, pp. 504–517. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-15567-3_​37 CrossRef
14.
Zurück zum Zitat Kose, N., Dugelay, J.-L.: Classification of captured and recaptured images to detect photograph spoofing. In: ICIEV 2012, pp. 1027–1032 (2012) Kose, N., Dugelay, J.-L.: Classification of captured and recaptured images to detect photograph spoofing. In: ICIEV 2012, pp. 1027–1032 (2012)
Metadaten
Titel
Face Anti-spoofing Algorithm Based on Gray Level Co-occurrence Matrix and Dual Tree Complex Wavelet Transform
verfasst von
Xiaofeng Qu
Hengjian Li
Jiwen Dong
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-68935-7_22

Premium Partner