Skip to main content
Erschienen in: Pattern Analysis and Applications 4/2020

11.03.2020 | Industrial and commercial application

Face anti-spoofing by identity masking using random walk patterns and outlier detection

verfasst von: Balaji Rao Katika, Kannan Karthik

Erschienen in: Pattern Analysis and Applications | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Existing architectures used in face anti-spoofing tend to deploy registered spatial measurements to generate feature vectors for spoof detection. This means that the ordering or sequence in which specific statistics are computed cannot be changed, as one moves from one facial profile to another. While this arrangement works in a person-specific setting, it becomes a major drawback when single-sided training is done based on the natural face class alone. To mitigate subject identity linked content interference within the anti-spoofing frame, we propose a identity-independent architecture based on random correlated scans of natural face images. The same natural face image can be scanned multiple times through independent correlated random walks before deriving simple differential features on the 1D scanned vectors. This proposed frame tends to capture the pixel correlation statistics with minimal content interference and shows great promise, particularly when trained on natural face sets, using a one-class support vector machine and cross-validated on other databases. Performance measured in terms of EER for detection of spoof face is found to be \(3.8291\%\) with proposed random scan features, and \(2.02\%\) with auto-population samples for inter database.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Arashloo SR, Kittler J, Christmas W (2017) An anomaly detection approach to face spoofing detection: a new formulation and evaluation protocol. IEEE Access 5:13868–13882CrossRef Arashloo SR, Kittler J, Christmas W (2017) An anomaly detection approach to face spoofing detection: a new formulation and evaluation protocol. IEEE Access 5:13868–13882CrossRef
2.
Zurück zum Zitat Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. IEEE Trans Inf Forensics Secur 11(8):1818–1830CrossRef Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. IEEE Trans Inf Forensics Secur 11(8):1818–1830CrossRef
3.
Zurück zum Zitat Chang CC, Lin CJ (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol TIST 2(3):27 Chang CC, Lin CJ (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol TIST 2(3):27
4.
Zurück zum Zitat Erdogmus N, Marcel S (2013) Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect. In: 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS), pp 1–6. IEEE, USA Erdogmus N, Marcel S (2013) Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect. In: 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS), pp 1–6. IEEE, USA
5.
Zurück zum Zitat Galbally J, Marcel S (2014) Face anti-spoofing based on general image quality assessment. In: 2014 22nd international conference on pattern recognition, pp 1173–1178. IEEE, Sweden Galbally J, Marcel S (2014) Face anti-spoofing based on general image quality assessment. In: 2014 22nd international conference on pattern recognition, pp 1173–1178. IEEE, Sweden
6.
Zurück zum Zitat Galbally J, Marcel S, Fierrez J (2014) Biometric antispoofing methods: a survey in face recognition. IEEE Access 2:1530–1552CrossRef Galbally J, Marcel S, Fierrez J (2014) Biometric antispoofing methods: a survey in face recognition. IEEE Access 2:1530–1552CrossRef
7.
Zurück zum Zitat Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724MathSciNetCrossRef Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724MathSciNetCrossRef
8.
Zurück zum Zitat Garcia DC, de Queiroz RL (2015) Face-spoofing 2D-detection based on moiré-pattern analysis. IEEE Trans Inf Forensics Secur 10(4):778–786CrossRef Garcia DC, de Queiroz RL (2015) Face-spoofing 2D-detection based on moiré-pattern analysis. IEEE Trans Inf Forensics Secur 10(4):778–786CrossRef
9.
Zurück zum Zitat Ji Z, Zhu H, Wang Q (2016) LFHOG: a discriminative descriptor for live face detection from light field image. In: 2016 IEEE international conference on image processing (ICIP), pp 1474–1478. IEEE, Phoenix Ji Z, Zhu H, Wang Q (2016) LFHOG: a discriminative descriptor for live face detection from light field image. In: 2016 IEEE international conference on image processing (ICIP), pp 1474–1478. IEEE, Phoenix
10.
Zurück zum Zitat Jourabloo A, Liu Y, Liu X (2018) Face de-spoofing: anti-spoofing via noise modeling. In: Proceedings of the European conference on computer vision (ECCV), pp 290–306. Munich, Germany Jourabloo A, Liu Y, Liu X (2018) Face de-spoofing: anti-spoofing via noise modeling. In: Proceedings of the European conference on computer vision (ECCV), pp 290–306. Munich, Germany
11.
Zurück zum Zitat Karthik K, Kashyap S (2013) Transparent hashing in the encrypted domain for privacy preserving image retrieval. Signal Image Video Process 7(4):647–664CrossRef Karthik K, Kashyap S (2013) Transparent hashing in the encrypted domain for privacy preserving image retrieval. Signal Image Video Process 7(4):647–664CrossRef
12.
Zurück zum Zitat Karthik K, Katika BR (2017) Face anti-spoofing based on sharpness profiles. In: 2017 IEEE international conference on industrial and information systems (ICIIS), pp 1–6. IEEE, Srilanka Karthik K, Katika BR (2017) Face anti-spoofing based on sharpness profiles. In: 2017 IEEE international conference on industrial and information systems (ICIIS), pp 1–6. IEEE, Srilanka
13.
Zurück zum Zitat Karthik K, Katika BR (2017) Image quality assessment based outlier detection for face anti-spoofing. In: 2017 2nd international conference on communication systems, computing and IT applications (CSCITA), pp 72–77. IEEE, Mumbai Karthik K, Katika BR (2017) Image quality assessment based outlier detection for face anti-spoofing. In: 2017 2nd international conference on communication systems, computing and IT applications (CSCITA), pp 72–77. IEEE, Mumbai
14.
Zurück zum Zitat Karthik K, Katika BR (2019) Identity independent face anti-spoofing based on random scan patterns. In: 2019 8th PREMI international conference on pattern recognition and machine intelligence (PREMI). Springer, Berlin Karthik K, Katika BR (2019) Identity independent face anti-spoofing based on random scan patterns. In: 2019 8th PREMI international conference on pattern recognition and machine intelligence (PREMI). Springer, Berlin
15.
Zurück zum Zitat Matias Y, Shamir A (1987) A video scrambling technique based on space filling curves. In: Conference on the theory and application of cryptographic techniques, pp 398–417. Springer, London Matias Y, Shamir A (1987) A video scrambling technique based on space filling curves. In: Conference on the theory and application of cryptographic techniques, pp 398–417. Springer, London
17.
Zurück zum Zitat Patel K, Han H, Jain AK (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268–2283CrossRef Patel K, Han H, Jain AK (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268–2283CrossRef
18.
Zurück zum Zitat Sepas-Moghaddam A, Malhadas L, Correia PL, Pereira F (2017) Face spoofing detection using a light field imaging framework. IET Biom 7(1):39–48CrossRef Sepas-Moghaddam A, Malhadas L, Correia PL, Pereira F (2017) Face spoofing detection using a light field imaging framework. IET Biom 7(1):39–48CrossRef
19.
Zurück zum Zitat Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761CrossRef Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761CrossRef
20.
Zurück zum Zitat Yang J, Lei Z, Yi D, Li SZ (2015) Person-specific face antispoofing with subject domain adaptation. IEEE Trans Inf Forensics Secur 10(4):797–809CrossRef Yang J, Lei Z, Yi D, Li SZ (2015) Person-specific face antispoofing with subject domain adaptation. IEEE Trans Inf Forensics Secur 10(4):797–809CrossRef
21.
Zurück zum Zitat Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: 2012 5th IAPR international conference on Biometrics (ICB), pp 26–31. IEEE, USA Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: 2012 5th IAPR international conference on Biometrics (ICB), pp 26–31. IEEE, USA
Metadaten
Titel
Face anti-spoofing by identity masking using random walk patterns and outlier detection
verfasst von
Balaji Rao Katika
Kannan Karthik
Publikationsdatum
11.03.2020
Verlag
Springer London
Erschienen in
Pattern Analysis and Applications / Ausgabe 4/2020
Print ISSN: 1433-7541
Elektronische ISSN: 1433-755X
DOI
https://doi.org/10.1007/s10044-020-00875-8

Weitere Artikel der Ausgabe 4/2020

Pattern Analysis and Applications 4/2020 Zur Ausgabe

Premium Partner