Skip to main content

2016 | OriginalPaper | Buchkapitel

8. Face Recognition Systems Under Spoofing Attacks

verfasst von : Ivana Chingovska, Nesli Erdogmus, André Anjos, Sébastien Marcel

Erschienen in: Face Recognition Across the Imaging Spectrum

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we give an overview of spoofing attacks and spoofing countermeasures for face recognition systems, with a focus on visual spectrum systems (VIS) in 2D and 3D, as well as near-infrared (NIR) and multispectral systems. We cover the existing types of spoofing attacks and report on their success to bypass several state-of-the-art face recognition systems. The results on two different face spoofing databases in VIS and one newly developed face spoofing database in NIR show that spoofing attacks present a significant security risk for face recognition systems in any part of the spectrum. The risk is partially reduced when using multispectral systems. We also give a systematic overview of the existing anti-spoofing techniques, with an analysis of their advantages and limitations and prospective for future work.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
http://​www.​biometrics-center.​ch/​testing/​ tabula-rasa-spoofing-challenge-2013.
 
2
In their formal definition, FAR and FMR and FRR and FNRM are not synonymous [15]. However, they can be treated as such is some special cases, and we will do so, following the practice adopted in [16].
 
3
The link to download the database, together with manual face annotations, will be available as soon as this book chapter is accepted for publication.
 
4
The link to fully reproduce the results obtained here will be available as soon as this book chapter is accepted for publication.
 
Literatur
1.
Zurück zum Zitat Flynn, P.J., Faltemier, T., Bowyer, K.W.: 3D face recognition. In: Jain A.K., Flynn P., Ross A.A. (eds.) Handbook of Biometrics, pp. 293–313 (2008) Flynn, P.J., Faltemier, T., Bowyer, K.W.: 3D face recognition. In: Jain A.K., Flynn P., Ross A.A. (eds.) Handbook of Biometrics, pp. 293–313 (2008)
2.
Zurück zum Zitat Socolinsky, D.A.: Multispectral face recognition. In: Jain A.K., Flynn P., Ross A.A. (eds.) Handbook of Biometrics, pp. 293–313 (2008) Socolinsky, D.A.: Multispectral face recognition. In: Jain A.K., Flynn P., Ross A.A. (eds.) Handbook of Biometrics, pp. 293–313 (2008)
3.
Zurück zum Zitat Yi, D., Lei, Z., Zhang, Z., Li, S.: Face anti-spoofing: Multi-spectral approach. In: Marcel, S., Nixon, M.S., Li, S.Z. (eds.) Handbook of Biometric Anti-Spoofing, Advances in Computer Vision and Pattern Recognition, pp. 83–102. Springer, London (2014) Yi, D., Lei, Z., Zhang, Z., Li, S.: Face anti-spoofing: Multi-spectral approach. In: Marcel, S., Nixon, M.S., Li, S.Z. (eds.) Handbook of Biometric Anti-Spoofing, Advances in Computer Vision and Pattern Recognition, pp. 83–102. Springer, London (2014)
4.
Zurück zum Zitat Duc, N.M., Minh, B.Q.: Your face is not your password. Black Hat Conference (2009) Duc, N.M., Minh, B.Q.: Your face is not your password. Black Hat Conference (2009)
5.
Zurück zum Zitat Thalheim, L., Krissler, J., Ziegler, P.M.: Body check: Biometric access protection devices and their programs put to test. Heise Online (2002) Thalheim, L., Krissler, J., Ziegler, P.M.: Body check: Biometric access protection devices and their programs put to test. Heise Online (2002)
6.
Zurück zum Zitat Chingovska, I., et al.: The 2nd competition on counter measures to 2D face spoofing attacks. In: International Conference of Biometrics (ICB) (2013) Chingovska, I., et al.: The 2nd competition on counter measures to 2D face spoofing attacks. In: International Conference of Biometrics (ICB) (2013)
7.
Zurück zum Zitat Pan, G., Sun, L., Wu, Z., Wang, Y.: Monocular camera-based face liveness detection by combining eyeblink and scene context. Telecommun. Syst. 47(3–4), 215–225 (2011)CrossRef Pan, G., Sun, L., Wu, Z., Wang, Y.: Monocular camera-based face liveness detection by combining eyeblink and scene context. Telecommun. Syst. 47(3–4), 215–225 (2011)CrossRef
8.
Zurück zum Zitat Tan, X., et al.: Face liveness detection from a single image with sparse low rank bilinear discriminative model. ECCV 6, 504–517 (2010) Tan, X., et al.: Face liveness detection from a single image with sparse low rank bilinear discriminative model. ECCV 6, 504–517 (2010)
9.
Zurück zum Zitat Zhiwei, Z., et al.: A face antispoofing database with diverse attacks. In: Proceedings of the 5th IAPR International Conference on Biometrics (ICB’12), New Delhi, India (2012) Zhiwei, Z., et al.: A face antispoofing database with diverse attacks. In: Proceedings of the 5th IAPR International Conference on Biometrics (ICB’12), New Delhi, India (2012)
10.
Zurück zum Zitat Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: Proceedings of the 11th International Conference of the Biometrics Special Interes Group (2012) Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: Proceedings of the 11th International Conference of the Biometrics Special Interes Group (2012)
11.
Zurück zum Zitat Komulainen, J., Anjos, A., Hadid, A., Pietikainen, M., Marcel, S.: Complementary counter-measures for detecting scenic face spoofing attacks (2013) Komulainen, J., Anjos, A., Hadid, A., Pietikainen, M., Marcel, S.: Complementary counter-measures for detecting scenic face spoofing attacks (2013)
12.
Zurück zum Zitat Anjos, A., Marcel, S.: Counter-measures to photo attacks in face recognition: a public database and a baseline. In: International Joint Conference on Biometrics 2011 (2011) Anjos, A., Marcel, S.: Counter-measures to photo attacks in face recognition: a public database and a baseline. In: International Joint Conference on Biometrics 2011 (2011)
13.
Zurück zum Zitat Anjos, A., Chakka, M.M., Marcel, S.: Motion-based counter-measures to photo attacks in face recognition. Inst. Eng. Technol. J. Biometrics (2013) Anjos, A., Chakka, M.M., Marcel, S.: Motion-based counter-measures to photo attacks in face recognition. Inst. Eng. Technol. J. Biometrics (2013)
14.
Zurück zum Zitat Chingovska, I., Anjos, A., Marcel, S.: Biometrics evaluation under spoofing attacks. IEEE Trans. Inf. Forensics Secur. 9(12), 2264–2276 (2014)CrossRef Chingovska, I., Anjos, A., Marcel, S.: Biometrics evaluation under spoofing attacks. IEEE Trans. Inf. Forensics Secur. 9(12), 2264–2276 (2014)CrossRef
15.
Zurück zum Zitat Mansfield, A.J., Wayman, J.L.: Best practices in testing and reporting performance (2002) Mansfield, A.J., Wayman, J.L.: Best practices in testing and reporting performance (2002)
16.
Zurück zum Zitat Jain, A.K., Ross, A.: Handbook of Biometrics, chap. Introduction to Biometrics. Springer, Berlin (2008) Jain, A.K., Ross, A.: Handbook of Biometrics, chap. Introduction to Biometrics. Springer, Berlin (2008)
17.
Zurück zum Zitat Cardinaux, F., Sanderson, C., Marcel, S.: Comparison of MLP and GMM classifiers for face verification on XM2VTS. In: Proceedings of the 4th International Conference on AVBPA. University of Surrey, Guildford, UK (2003) Cardinaux, F., Sanderson, C., Marcel, S.: Comparison of MLP and GMM classifiers for face verification on XM2VTS. In: Proceedings of the 4th International Conference on AVBPA. University of Surrey, Guildford, UK (2003)
18.
Zurück zum Zitat Zhang, W., et al.: Local Gabor binary pattern histogram sequence (lgbphs): A novel non- statistical model for face representation and recognition. In: Proceedings of the Tenth IEEE International Conference on Computer Vision (ICCV’05) Volume 1—Volume 01, ICCV’05, pp. 786–791. IEEE Computer Society (2005) Zhang, W., et al.: Local Gabor binary pattern histogram sequence (lgbphs): A novel non- statistical model for face representation and recognition. In: Proceedings of the Tenth IEEE International Conference on Computer Vision (ICCV’05) Volume 1—Volume 01, ICCV’05, pp. 786–791. IEEE Computer Society (2005)
19.
Zurück zum Zitat Günther, M., Haufe, D., Wu¨rtz, R.P.: Face recognition with disparity corrected Gabor phase differences. In: Artificial Neural Networks and Machine Learning, Lecture Notes in Computer Science, vol. 7552, pp. 411–418. Springer Berlin (2012) Günther, M., Haufe, D., Wu¨rtz, R.P.: Face recognition with disparity corrected Gabor phase differences. In: Artificial Neural Networks and Machine Learning, Lecture Notes in Computer Science, vol. 7552, pp. 411–418. Springer Berlin (2012)
20.
Zurück zum Zitat Wallace, R., McLaren, M., McCool, C., Marcel, S.: Inter-session variability modelling and joint factor analysis for face authentication. In: International Joint Conference on Biometrics (2011) Wallace, R., McLaren, M., McCool, C., Marcel, S.: Inter-session variability modelling and joint factor analysis for face authentication. In: International Joint Conference on Biometrics (2011)
21.
Zurück zum Zitat Schuckers, S.: Encyclopedia of Biometrics, chap. Liveness Detection: Fingerprint, pp. 924–931. Springer, Berlin (2009) Schuckers, S.: Encyclopedia of Biometrics, chap. Liveness Detection: Fingerprint, pp. 924–931. Springer, Berlin (2009)
22.
Zurück zum Zitat Ross, A., Nandakumar, K., Jain, A.K.: Handbook of Biometrics, chap. Introduction to multi-biometrics. Springer, Berlin (2008) Ross, A., Nandakumar, K., Jain, A.K.: Handbook of Biometrics, chap. Introduction to multi-biometrics. Springer, Berlin (2008)
23.
Zurück zum Zitat Akhtar, Z., Fumera, G., Marcialis, G.L., Roli, F.: Evaluation of serial and parallel multibiometric systems under spoofing attacks. In: 5th IEEE International Conference on Biometrics: Theory, Applications and Systems (2012) Akhtar, Z., Fumera, G., Marcialis, G.L., Roli, F.: Evaluation of serial and parallel multibiometric systems under spoofing attacks. In: 5th IEEE International Conference on Biometrics: Theory, Applications and Systems (2012)
24.
Zurück zum Zitat Johnson, P.A., Tan, B., Schuckers, S.: Multimodal fusion vulnerability to non-zero (spoof) imposters. In: IEEE International Workshop on Information Forensics and Security (2010) Johnson, P.A., Tan, B., Schuckers, S.: Multimodal fusion vulnerability to non-zero (spoof) imposters. In: IEEE International Workshop on Information Forensics and Security (2010)
25.
Zurück zum Zitat Rodrigues, R., Kamat, N., Govindaraju, V.: Evaluation of biometric spoofing in a multimodal system. In: Biometrics: Theory Applications and Systems (BTAS), 2010 Fourth IEEE International Conference on (2010) Rodrigues, R., Kamat, N., Govindaraju, V.: Evaluation of biometric spoofing in a multimodal system. In: Biometrics: Theory Applications and Systems (BTAS), 2010 Fourth IEEE International Conference on (2010)
26.
Zurück zum Zitat Rodrigues, R.N., Ling, L.L., Govindaraju, V.: Robustness of multimodal biometric fusion methods against spoofing attacks. J. Vis. Lang. Comput. 20(3), 169–179 (2009)CrossRef Rodrigues, R.N., Ling, L.L., Govindaraju, V.: Robustness of multimodal biometric fusion methods against spoofing attacks. J. Vis. Lang. Comput. 20(3), 169–179 (2009)CrossRef
27.
Zurück zum Zitat Chetty, G., Wagner, M.: Audio-visual multimodal fusion for biometric person authentication and liveness verification. In: Proceedings of the 2005 NICTA-HCSNet Multimodal User Interaction Workshop—Volume 57, pp. 17–24. Australian Computer Society, Inc. (2006) Chetty, G., Wagner, M.: Audio-visual multimodal fusion for biometric person authentication and liveness verification. In: Proceedings of the 2005 NICTA-HCSNet Multimodal User Interaction Workshop—Volume 57, pp. 17–24. Australian Computer Society, Inc. (2006)
28.
Zurück zum Zitat Pan, G., Sun, L., Wu, Z., Lao, S.: Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on, pp. 1–8 (2007) Pan, G., Sun, L., Wu, Z., Lao, S.: Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on, pp. 1–8 (2007)
29.
Zurück zum Zitat Wang, L., Ding, X., Fang, C.: Face live detection method based on physiological motion anal- ysis. Tsinghua Sci. Technol. 14(6), 685–690 (2009)CrossRef Wang, L., Ding, X., Fang, C.: Face live detection method based on physiological motion anal- ysis. Tsinghua Sci. Technol. 14(6), 685–690 (2009)CrossRef
30.
Zurück zum Zitat Kollreider, K., Fronthaler, H., Bigun, J.: Verifying liveness by multiple experts in face bio- metrics. In: Computer Vision and Pattern Recognition Workshops, 2008. CVPRW’08. IEEE Computer Society Conference on, pp. 1–6 (2008) Kollreider, K., Fronthaler, H., Bigun, J.: Verifying liveness by multiple experts in face bio- metrics. In: Computer Vision and Pattern Recognition Workshops, 2008. CVPRW’08. IEEE Computer Society Conference on, pp. 1–6 (2008)
31.
Zurück zum Zitat Bharadwaj, S., Dhamecha, T., Vatsa, M., Singh, R.: Computationally efficient face spoofing detection with motion magnification. In: Computer Vision and Pattern Recognition Workshops (CVPRW), 2013 IEEE Conference on, pp. 105–110 (2013) Bharadwaj, S., Dhamecha, T., Vatsa, M., Singh, R.: Computationally efficient face spoofing detection with motion magnification. In: Computer Vision and Pattern Recognition Workshops (CVPRW), 2013 IEEE Conference on, pp. 105–110 (2013)
32.
Zurück zum Zitat Wu, H.Y., Rubinstein, M., Shih, E., Guttag, J., Durand, F., Freeman, W.T.: Eulerian video magnification for revealing subtle changes in the world. ACM Trans. Graph. (Proceedings SIGGRAPH 2012) 31(4) (2012) Wu, H.Y., Rubinstein, M., Shih, E., Guttag, J., Durand, F., Freeman, W.T.: Eulerian video magnification for revealing subtle changes in the world. ACM Trans. Graph. (Proceedings SIGGRAPH 2012) 31(4) (2012)
33.
Zurück zum Zitat Kollreider, K., Fronthaler, H., Bigun, J.: Non-intrusive liveness detection by face images. Image Vis. Comput. 27(3), 233–244 (2009)CrossRef Kollreider, K., Fronthaler, H., Bigun, J.: Non-intrusive liveness detection by face images. Image Vis. Comput. 27(3), 233–244 (2009)CrossRef
34.
Zurück zum Zitat Bao, W., Li, H., Li, N., Jiang, W.: A liveness detection method for face recognition based on optical flow field. 2009 International Conference on Image Analysis and Signal Processing pp. 223–236 (2009) Bao, W., Li, H., Li, N., Jiang, W.: A liveness detection method for face recognition based on optical flow field. 2009 International Conference on Image Analysis and Signal Processing pp. 223–236 (2009)
35.
Zurück zum Zitat Yan, J., Zhang, Z., Lei, Z., Yi, D., Li, S.Z.: Face liveness detection by exploring multiple scenic clues. In: 12th International Conference on Control, Automation, robotics and Vision (ICARCV 2012). China (2012) Yan, J., Zhang, Z., Lei, Z., Yi, D., Li, S.Z.: Face liveness detection by exploring multiple scenic clues. In: 12th International Conference on Control, Automation, robotics and Vision (ICARCV 2012). China (2012)
36.
Zurück zum Zitat Parziale, G., Dittman, J., Tistarelli, M.: Analysis and evaluation of alternatives and advanced solutions for system elements. BioSecure D 9.1.2 (2005) Parziale, G., Dittman, J., Tistarelli, M.: Analysis and evaluation of alternatives and advanced solutions for system elements. BioSecure D 9.1.2 (2005)
37.
Zurück zum Zitat Yang, J., Lei, Z., Liao, S., Li, S.: Face liveness detection with component dependent descriptor. In: Biometrics (ICB), 2013 International Conference on, pp. 1–6 (2013) Yang, J., Lei, Z., Liao, S., Li, S.: Face liveness detection with component dependent descriptor. In: Biometrics (ICB), 2013 International Conference on, pp. 1–6 (2013)
38.
Zurück zum Zitat Li, J., et al.: Live face detection based on the analysis of Fourier spectra. Biometric Technology for Human Identification (2004) Li, J., et al.: Live face detection based on the analysis of Fourier spectra. Biometric Technology for Human Identification (2004)
39.
Zurück zum Zitat Määttä, J., Hadid, A., Pietikäinen, M.: Face spoofing detection from single images using texture and local shape analysis. IET Biometrics 1, 3–10 (2012) Määttä, J., Hadid, A., Pietikäinen, M.: Face spoofing detection from single images using texture and local shape analysis. IET Biometrics 1, 3–10 (2012)
40.
Zurück zum Zitat Pinto, A.d.S., Pedrini, H., Schwartz, W.R., Rocha, A.: Video-based face spoofing detection through visual rhythm analysis. In: 25th Conference on Graphics, Patterns and Images (2012) Pinto, A.d.S., Pedrini, H., Schwartz, W.R., Rocha, A.: Video-based face spoofing detection through visual rhythm analysis. In: 25th Conference on Graphics, Patterns and Images (2012)
41.
Zurück zum Zitat Oren, M., Nayar, S.K.: Generalization of the Lambertian model and implications for machine vision. International Journal of Computer Vision 14(3), 227–251 (1995) Oren, M., Nayar, S.K.: Generalization of the Lambertian model and implications for machine vision. International Journal of Computer Vision 14(3), 227–251 (1995)
42.
Zurück zum Zitat Bai, J., et al.: Is physics-based liveness detection truly possible with a single image? In: IEEE International Symposium on Circuits and Systems (ISCAS) (2010) Bai, J., et al.: Is physics-based liveness detection truly possible with a single image? In: IEEE International Symposium on Circuits and Systems (ISCAS) (2010)
43.
Zurück zum Zitat Gao, X., Ng, T.T., Bo, Q., Chang, S.F.: Single-view recaptured image detection based on physics-based features. In: IEEE International Conference on Multimedia & Expo (ICME) (2010) Gao, X., Ng, T.T., Bo, Q., Chang, S.F.: Single-view recaptured image detection based on physics-based features. In: IEEE International Conference on Multimedia & Expo (ICME) (2010)
44.
Zurück zum Zitat Schwartz, W.R., Rocha, A., Pedrini, H.: Face Spoofing Detection through Partial Least Squares and Low-Level Descriptors. In: International Joint Conference on Biometrics (2011) Schwartz, W.R., Rocha, A., Pedrini, H.: Face Spoofing Detection through Partial Least Squares and Low-Level Descriptors. In: International Joint Conference on Biometrics (2011)
45.
Zurück zum Zitat Tronci, R., et al.: Fusion of multiple clues for photo-attack detection in face recognition systems. In: IJCB, pp. 1–6 (2011) Tronci, R., et al.: Fusion of multiple clues for photo-attack detection in face recognition systems. In: IJCB, pp. 1–6 (2011)
46.
Zurück zum Zitat Galbally, J., Marcel, S., Fierrez, J.: Image quality assessment for fake biometric detection: application to iris, fingerprint and face recognition. IEEE Trans. on Image Proc. 23(2), 710–724 (2014)MathSciNetCrossRef Galbally, J., Marcel, S., Fierrez, J.: Image quality assessment for fake biometric detection: application to iris, fingerprint and face recognition. IEEE Trans. on Image Proc. 23(2), 710–724 (2014)MathSciNetCrossRef
47.
Zurück zum Zitat Ojala, T., Pietikainen, M., Maenpaa, T.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. on Pattern Anal. and Mach. Intell. 24(7), 971–987 (2002)CrossRefMATH Ojala, T., Pietikainen, M., Maenpaa, T.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. on Pattern Anal. and Mach. Intell. 24(7), 971–987 (2002)CrossRefMATH
48.
Zurück zum Zitat Määttä, J., Hadid, A., Pietikäinen, M.: Face spoofing detection from single images using micro-texture analysis. In: International Joint Conference on Biometrics, pp. 1–7 (2011) Määttä, J., Hadid, A., Pietikäinen, M.: Face spoofing detection from single images using micro-texture analysis. In: International Joint Conference on Biometrics, pp. 1–7 (2011)
49.
Zurück zum Zitat de Freitas Pereira, T., et al.: Face liveness detection using dynamic texture. EURASIP J Image and Video Proc. 2014:2 (2014) de Freitas Pereira, T., et al.: Face liveness detection using dynamic texture. EURASIP J Image and Video Proc. 2014:2 (2014)
50.
Zurück zum Zitat Zhao, G., Pietika¨inen, M.: Dynamic texture recognition using local binary patterns with an application to facial expressions. IEEE Trans. Pattern Anal. Mach. Intell. 29(6), 915–928 (2007)CrossRef Zhao, G., Pietika¨inen, M.: Dynamic texture recognition using local binary patterns with an application to facial expressions. IEEE Trans. Pattern Anal. Mach. Intell. 29(6), 915–928 (2007)CrossRef
51.
Zurück zum Zitat Komulainen, J., Hadid, A., Pietikainen, M.: Context based face anti-spoofing. In: Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE Sixth International Conference on, pp. 1–8 (2013) Komulainen, J., Hadid, A., Pietikainen, M.: Context based face anti-spoofing. In: Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE Sixth International Conference on, pp. 1–8 (2013)
52.
Zurück zum Zitat Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on, vol. 1, pp. 886–893 (2005) Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on, vol. 1, pp. 886–893 (2005)
53.
Zurück zum Zitat Wang, T., Yang, J., Lei, Z., Liao, S., Li, S.Z.: Face liveness detection using 3D structure recovered from a single camera. In: Biometrics (ICB), 2013 International Conference on (2013) Wang, T., Yang, J., Lei, Z., Liao, S., Li, S.Z.: Face liveness detection using 3D structure recovered from a single camera. In: Biometrics (ICB), 2013 International Conference on (2013)
54.
Zurück zum Zitat De Marsico, M., Nappi, M., Riccio, D., Dugelay, J.: Moving face spoofing detection via 3D projective invariants. In: Biometrics (ICB), 2012 5th IAPR International Conference on (2012) De Marsico, M., Nappi, M., Riccio, D., Dugelay, J.: Moving face spoofing detection via 3D projective invariants. In: Biometrics (ICB), 2012 5th IAPR International Conference on (2012)
55.
Zurück zum Zitat Kim, S., Yu, S., Kim, K., Ban, Y., Lee, S.: Face liveness detection using variable focusing. In: Biometrics (ICB), 2013 International Conference on (2013) Kim, S., Yu, S., Kim, K., Ban, Y., Lee, S.: Face liveness detection using variable focusing. In: Biometrics (ICB), 2013 International Conference on (2013)
56.
Zurück zum Zitat Frischholz, R., Werner, A.: Avoiding replay-attacks in a face recognition system using head-pose estimation. In: Analysis and Modeling of Faces and Gestures, 2003. AMFG 2003. IEEE International Workshop on (2003) Frischholz, R., Werner, A.: Avoiding replay-attacks in a face recognition system using head-pose estimation. In: Analysis and Modeling of Faces and Gestures, 2003. AMFG 2003. IEEE International Workshop on (2003)
57.
Zurück zum Zitat Ali, A., Deravi, F., Hoque, S.: Spoofing attempt detection using gaze colocation. In: Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the. IEEE (2013) Ali, A., Deravi, F., Hoque, S.: Spoofing attempt detection using gaze colocation. In: Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the. IEEE (2013)
58.
Zurück zum Zitat Chetty, G., Wagner, M.: Multi-level liveness verification for face-voice biometric authentication. In: Biometrics Symposium 2006 (2006) Chetty, G., Wagner, M.: Multi-level liveness verification for face-voice biometric authentication. In: Biometrics Symposium 2006 (2006)
59.
Zurück zum Zitat Menotti, D., Chiachia, G., Pinto, A., Schwartz, W., Pedrini, H., Falcao, A., Rocha, A.: Deep representations for iris, face, and fingerprint spoofing detection. Inf. Forensics and Sec., IEEE Trans. on 99, 1 (2015) Menotti, D., Chiachia, G., Pinto, A., Schwartz, W., Pedrini, H., Falcao, A., Rocha, A.: Deep representations for iris, face, and fingerprint spoofing detection. Inf. Forensics and Sec., IEEE Trans. on 99, 1 (2015)
60.
Zurück zum Zitat Yang, J., Lei, Z., Li, S.Z.: Learn convolutional neural network for face anti-spoofing. CoRR abs/1408.5601 (2014) Yang, J., Lei, Z., Li, S.Z.: Learn convolutional neural network for face anti-spoofing. CoRR abs/1408.5601 (2014)
61.
Zurück zum Zitat Prokoski, F.J.: Disguise detection and identification using infrared imagery. pp. 27–31 (1983) Prokoski, F.J.: Disguise detection and identification using infrared imagery. pp. 27–31 (1983)
62.
Zurück zum Zitat Pavlidis, I., Symosek, P.: The imaging issue in an automatic face/disguise detection system. In: Computer Vision Beyond the Visible Spectrum: Methods and Applications, 2000. Proceedings. IEEE Workshop on, pp. 15–24 (2000) Pavlidis, I., Symosek, P.: The imaging issue in an automatic face/disguise detection system. In: Computer Vision Beyond the Visible Spectrum: Methods and Applications, 2000. Proceedings. IEEE Workshop on, pp. 15–24 (2000)
63.
Zurück zum Zitat Kim, Y., Na, J., Yoon, S., Yi, J.: Masked fake face detection using radiance measurements. J. Opt. Soc. Am A 26(4), 760–766 (2009)CrossRef Kim, Y., Na, J., Yoon, S., Yi, J.: Masked fake face detection using radiance measurements. J. Opt. Soc. Am A 26(4), 760–766 (2009)CrossRef
64.
Zurück zum Zitat Zhang, Z., Yi, D., Lei, Z., Li, S.Z.: Face liveness detection by learning multispectral reflectance distributions. pp. 436–441 (2011) Zhang, Z., Yi, D., Lei, Z., Li, S.Z.: Face liveness detection by learning multispectral reflectance distributions. pp. 436–441 (2011)
65.
Zurück zum Zitat Wang, Y., Hao, X., Hou, Y., Guo, C.: A new multispectral method for face liveness detection. In: Pattern Recognition (ACPR), 2013 2nd IAPR Asian Conference on, pp. 922–926 (2013) Wang, Y., Hao, X., Hou, Y., Guo, C.: A new multispectral method for face liveness detection. In: Pattern Recognition (ACPR), 2013 2nd IAPR Asian Conference on, pp. 922–926 (2013)
66.
Zurück zum Zitat Angelopoulou, E.: Understanding the color of human skin. pp. 243–251 (2001) Angelopoulou, E.: Understanding the color of human skin. pp. 243–251 (2001)
67.
Zurück zum Zitat Vink, J., Gritti, T., Hu, Y., de Haan, G.: Robust skin detection using multi-spectral illumination. In: Automatic Face Gesture Recognition and Workshops (FG 2011), 2011 IEEE International Conference on, pp. 448–455 (2011) Vink, J., Gritti, T., Hu, Y., de Haan, G.: Robust skin detection using multi-spectral illumination. In: Automatic Face Gesture Recognition and Workshops (FG 2011), 2011 IEEE International Conference on, pp. 448–455 (2011)
68.
Zurück zum Zitat Raghavendra, R., Raja, K., Busch, C.: Presentation attack detection for face recognition using light field camera. Image Proc., IEEE Trans. on 99, 1 (2015)MathSciNet Raghavendra, R., Raja, K., Busch, C.: Presentation attack detection for face recognition using light field camera. Image Proc., IEEE Trans. on 99, 1 (2015)MathSciNet
69.
Zurück zum Zitat de Freitas Pereira, T., Anjos, A., De Martino, J.M., Marcel, S.: Can face anti-spoofing countermeasures work in a real world scenario? In: International Conference on Biometrics (2013) de Freitas Pereira, T., Anjos, A., De Martino, J.M., Marcel, S.: Can face anti-spoofing countermeasures work in a real world scenario? In: International Conference on Biometrics (2013)
70.
Zurück zum Zitat Kuncheva, L.I., Whitaker, C.J.: Measures of diversity in classifier ensembles and their relationship with the ensemble accuracy. Mach. Learn. 51(2), 181–207 (2003)CrossRefMATH Kuncheva, L.I., Whitaker, C.J.: Measures of diversity in classifier ensembles and their relationship with the ensemble accuracy. Mach. Learn. 51(2), 181–207 (2003)CrossRefMATH
71.
Zurück zum Zitat Li, S.Z., Chu, R., Liao, S., Zhang, L.: Illumination invariant face recognition using near infrared images. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 627–639 (2007)CrossRef Li, S.Z., Chu, R., Liao, S., Zhang, L.: Illumination invariant face recognition using near infrared images. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 627–639 (2007)CrossRef
72.
Zurück zum Zitat Zou, X., Kittler, J., Messer, K.: Ambient illumination variation removal by active Near-IR imaging. In: Zhang D., Jain A.K. (eds.) Advances in Biometrics, Lecture Notes in Computer Science, vol. 3832, pp. 19–25 (2005) Zou, X., Kittler, J., Messer, K.: Ambient illumination variation removal by active Near-IR imaging. In: Zhang D., Jain A.K. (eds.) Advances in Biometrics, Lecture Notes in Computer Science, vol. 3832, pp. 19–25 (2005)
73.
Zurück zum Zitat Tsalakanidou, F., Dimitriadis, C., Malassiotis, S.: A secure and privacy friendly 2D+3D face authentication system robust under pose and illumination variation. In: Image Analysis for Multimedia Interactive Services, 2007. WIAMIS’07. Eighth International Workshop on, pp. 40–40 (2007) Tsalakanidou, F., Dimitriadis, C., Malassiotis, S.: A secure and privacy friendly 2D+3D face authentication system robust under pose and illumination variation. In: Image Analysis for Multimedia Interactive Services, 2007. WIAMIS’07. Eighth International Workshop on, pp. 40–40 (2007)
74.
Zurück zum Zitat Erdogmus, N., Marcel, S.: Spoofing 2D face recognition systems with 3d masks. In: International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–8 (2013) Erdogmus, N., Marcel, S.: Spoofing 2D face recognition systems with 3d masks. In: International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–8 (2013)
75.
Zurück zum Zitat Zhang, Z., Yi, D., Lei, Z., Li, S.Z.: Face liveness detection by learning multispectral reflectance distributions. In: IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG), pp. 436–441. IEEE (2011) Zhang, Z., Yi, D., Lei, Z., Li, S.Z.: Face liveness detection by learning multispectral reflectance distributions. In: IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG), pp. 436–441. IEEE (2011)
76.
Zurück zum Zitat Kose, N., Dugelay, J.L.: Countermeasure for the protection of face recognition systems against mask attacks. In: International Conference and Workshops on Automatic Face and Gesture Recognition (FG), pp. 1–6. IEEE (2013) Kose, N., Dugelay, J.L.: Countermeasure for the protection of face recognition systems against mask attacks. In: International Conference and Workshops on Automatic Face and Gesture Recognition (FG), pp. 1–6. IEEE (2013)
77.
Zurück zum Zitat Kose, N., Dugelay, J.L.: On the vulnerability of face recognition systems to spoofing mask attacks. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2357–2361. IEEE (2013) Kose, N., Dugelay, J.L.: On the vulnerability of face recognition systems to spoofing mask attacks. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2357–2361. IEEE (2013)
78.
Zurück zum Zitat Kose, N., Dugelay, J.L.: Reflectance analysis based countermeasure technique to detect face mask attacks. In: International Conference on Digital Signal Processing (DSP), pp. 1–6. IEEE (2013) Kose, N., Dugelay, J.L.: Reflectance analysis based countermeasure technique to detect face mask attacks. In: International Conference on Digital Signal Processing (DSP), pp. 1–6. IEEE (2013)
79.
Zurück zum Zitat Kose, N., Dugelay, J.L.: Shape and texture based countermeasure to protect face recognition systems against mask attacks. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 111–116. IEEE (2013) Kose, N., Dugelay, J.L.: Shape and texture based countermeasure to protect face recognition systems against mask attacks. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 111–116. IEEE (2013)
80.
Zurück zum Zitat Erdogmus, N., Marcel, S.: Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect. In: International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–6. IEEE (2013) Erdogmus, N., Marcel, S.: Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect. In: International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–6. IEEE (2013)
81.
Zurück zum Zitat Erdogmus, N., Marcel, S.: Spoofing face recognition with 3D masks. IEEE Trans. Inf. Forensics Secur. 9(7), 1084–1097 (2014)CrossRef Erdogmus, N., Marcel, S.: Spoofing face recognition with 3D masks. IEEE Trans. Inf. Forensics Secur. 9(7), 1084–1097 (2014)CrossRef
82.
Zurück zum Zitat Raghavendra, R., Busch, C.: Novel presentation attack detection algorithm for face recognition system: Application to 3D face mask attack. In: International Conference on Image Processing (ICIP), pp. 323–327. IEEE (2014) Raghavendra, R., Busch, C.: Novel presentation attack detection algorithm for face recognition system: Application to 3D face mask attack. In: International Conference on Image Processing (ICIP), pp. 323–327. IEEE (2014)
83.
Zurück zum Zitat Kose, N., Dugelay, J.L.: Mask spoofing in face recognition and countermeasures. Image Vis. Comput. 32(10), 779–789 (2014)CrossRef Kose, N., Dugelay, J.L.: Mask spoofing in face recognition and countermeasures. Image Vis. Comput. 32(10), 779–789 (2014)CrossRef
84.
Zurück zum Zitat Raghavendra, R., Busch, C.: Robust 2d/3d face mask presentation attack detection scheme by exploring multiple features and comparison score level fusion. In: International Conference on Information Fusion (FUSION), pp. 1–7. IEEE (2014) Raghavendra, R., Busch, C.: Robust 2d/3d face mask presentation attack detection scheme by exploring multiple features and comparison score level fusion. In: International Conference on Information Fusion (FUSION), pp. 1–7. IEEE (2014)
Metadaten
Titel
Face Recognition Systems Under Spoofing Attacks
verfasst von
Ivana Chingovska
Nesli Erdogmus
André Anjos
Sébastien Marcel
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-28501-6_8