Skip to main content
Log in

Face presentation attack detection using guided scale texture

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Aiming to counter presentation attack (also known as spoofing attack) in face recognition system, a face presentation attack detection (also known as spoofing detection or liveness detection) scheme based on guided scale texture is proposed. In order to minimize the influence of the redundant noise contamination, guided scale space is proposed to reduce the redundancy of the original facial texture and to extract more powerful facial edges. Based on the guided scale space, two guided scale texture descriptors are proposed to extract liveness detection features, and they are guided scale based local binary pattern (GS-LBP) and local guided binary pattern (LGBP). GS-LBP takes advantage of the edge-preserving property of the guided scale space, and joint quantization is used in LGBP to encode the neighboring relationships of the original face and the guided scale face without using additional features. With the guided scale texture features, presentation attack detection is accomplished by the use of a linear support vector machine classifier. Experiments are done with public MSU MFSD, CASIA FASD, Replay-Attack and Replay-Mobile databases, and the results indicate its effectiveness. The proposed method can effectively be applied for countering photo attack and video attack in face recognition systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Alotaibi, A., Mahmood, A. (2016) Deep face liveness detection based on nonlinear diffusion using convolution neural network. SIViP, in press, doi: 10.1007/s11760-016-1014-2

  2. Anjos A, Chakka MM, Marcel S (2014) Motion-based counter-measures to photo attacks in face recognition. IET Biom 3(3):147–158

    Article  Google Scholar 

  3. Arashloo SR, Kittler J, Christmas W (2015) Face spoofing detection based on multiple descriptor fusion using multiscale dynamic binarized statistical image features. IEEE Trans Inf Forensics Secur 10(11):2396–2407

    Article  Google Scholar 

  4. Bharadwaj S, Dhamecha TI, Vatsa M, Singh R (2014) Face anti-spoofing via motion magnification and multifeature videolet aggregation. IIITD-TR-2014-002.

  5. Biggio B, Fumera G, Marcialis GL, Roli F (2017) Statistical meta-analysis of presentation attacks for secure Multibiometric systems. IEEE Trans Pattern Anal Mach Intell 39(3):561–575

    Article  Google Scholar 

  6. Blasco J, Chen TM, Tapiador J, Peris-Lopez P (2016) A survey of wearable biometric recognition systems. ACM Comput Surv 49(3):43

    Article  Google Scholar 

  7. Boulkenafet Z, Komulainen J, Hadid A. (2015) Face anti-spoofing based on color texture analysis. In: IEEE international conference on image processing (ICIP), pp. 2636–2640

  8. Boulkenafet, Z., Komulainen, J., Feng, X., Hadid, A. (2016) Scale space texture analysis for face anti-spoofing. In: IEEE international conference on biometrics (ICB), pp. 1–6

  9. Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. IEEE Trans Inf Forensics Secur 11(8):1818–1830

    Article  Google Scholar 

  10. Boulkenafet Z, Komulainen J, Hadid A (2017) Face anti-spoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Process Lett 24(2):141–145

    Google Scholar 

  11. Caetano Garcia D, de Queiroz RL (2015) Face-spoofing 2D-detection based on Moiré-pattern analysis. IEEE Trans Inf Forensics Secur 10(4):778–786

    Article  Google Scholar 

  12. Chierchia G, Cozzolino D, Poggi G, Sansone C, Verdoliva L (2014) Guided filtering for PRNU-based localization of small-size image forgeries. In: IEEE international conference on acoustics, speech and Signal processing (ICASSP), pp. 6231–6235

  13. Chingovska I, Anjos A, Marcel S. (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: IEEE international conference of the biometrics special interest group (BIOSIG), pp. 1–7

  14. Chingovska I, Rabello dos Anjos A, Marcel S (2014) Biometrics evaluation under spoofing attacks. IEEE Trans Inf Forensics Secur 9(12):2264–2276

    Article  Google Scholar 

  15. Costa-Pazo A, Bhattacharjee S, Vazquez-Fernandez E, Marcel S. (2016) The REPLAY-MOBILE face presentation-attack database. In: IEEE biometrics international conference of the special interest group (BIOSIG), pp. 1–7

  16. de Freitas Pereira T, Komulainen J, Anjos A, De Martino JM, Hadid A, Pietikäinen M, Marcel S (2014) Face liveness detection using dynamic texture. EURASIP Journal on Image and Video Processing 2014(1):1–15

    Article  Google Scholar 

  17. de Freitas Pereira T, Anjos A, De Martino JM, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario?. In: IEEE international conference on biometrics (ICB), pp. 1–8

  18. Erdogmus N, Marcel S (2014) Spoofing face recognition with 3D masks. IEEE Trans Inf Forensics Secur 9(7):1084–1097

    Article  Google Scholar 

  19. Face++: https://www.faceplusplus.com.cn/face-detection/ Accessed 19 January 2017

  20. Fan RE, Chang KW, Hsieh CJ, Wang XR, Lin CJ (2008) LIBLINEAR: a library for large linear classification. J Mach Learn Res 9:1871–1874

    MATH  Google Scholar 

  21. Farmanbar, M., Toygar, Ö. (2017) Spoof detection on face and palmprint biometrics. SIViP, in press, doi: 10.1007/s11760-017-1082-y

  22. Feng L, Po LM, Li Y, Xu X, Yuan F, Cheung TCH, Cheung KW (2016) Integration of image quality and motion cues for face anti-spoofing: a neural network approach. J Vis Commun Image Represent 38:451–460

    Article  Google Scholar 

  23. Galbally J, Marcel S. (2014) Face anti-spoofing based on general image quality assessment. In: IEEE international conference on pattern recognition (ICPR), pp. 1173–1178

  24. Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724

    Article  MathSciNet  MATH  Google Scholar 

  25. Gomez-Barrero M, Galbally J, Fierrez J (2014) Efficient software attack to multimodal biometric systems and its application to face and iris fusion. Pattern Recogn Lett 36:243–253

    Article  Google Scholar 

  26. Hadid A (2014) Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions. IEEE Conference on Computer Vision and Pattern Recognition Workshops, In, pp 113–118

    Google Scholar 

  27. Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process Mag 32(5):20–30

    Article  Google Scholar 

  28. He K, Sun J, Tang X. (2010) Guided image filtering. In: European conference on computer Vision (ECCV), pp. 1–14

  29. He K, Sun J, Tang X (2013) Guided image filtering. IEEE Trans Pattern Anal Mach Intell 35(6):1397–1409

    Article  Google Scholar 

  30. Information Technology—Biometric Presentation Attack Detection—Part 1 (2015): Framework, ISO/IEC JTC1 SC37 biometrics, ISO/IEC Standard WD 30107-1

  31. Information Technology—Biometric Presentation Attack Detection—Part 3 (2015): Testing and reporting, ISO/IEC JTC1 SC37 biometrics, ISO/IEC Standard WD 30107-3

  32. Ji Z, Zhu H, Wang Q (2016) LFHOG: a discriminative descriptor for live face detection from light field image. In: IEEE international conference on image processing (ICIP), pp. 1474–1478

  33. Kim W, Suh S, Han JJ (2015) Face liveness detection from a single image via diffusion speed model. IEEE Trans Image Process 24(8):2456–2465

    Article  MathSciNet  Google Scholar 

  34. Labati RD, Genovese A, Muñoz E, Piuri V, Scotti F, Sforza G (2016) Biometric recognition in automated border control: a survey. ACM Comput Surv 49(2):24

    Article  Google Scholar 

  35. Lei Z, Liao S, Pietikainen M, Li SZ (2011) Face recognition by exploring information jointly in space, scale and orientation. IEEE Trans Image Process 20(1):247–256

    Article  MathSciNet  Google Scholar 

  36. Li Y, Xu K, Yan Q, Li Y, Deng RH (2014) Understanding OSN-based facial disclosure against face authentication systems. In: ACM symposium on information, computer and communications security (ASIACCS), pp. 413–424

  37. Li Y, Li Y, Yan Q, Kong H, Deng RH. (2015) Seeing your face is not enough: an inertial sensor-based liveness detection for face authentication. In: ACM SIGSAC conference on computer and communications security (CCS), pp. 1558–1569

  38. Li, Y., Li, Y., Xu, K., Yan, Q., Deng, R. (2016) Empirical study of face authentication systems under OSNFD attacks. IEEE Trans Dependable Secure Comput, in press, doi: 10.1109/TDSC.2016.2550459

  39. Liu S, Yuen PC, Zhang S, Zhao G. (2016) 3D mask face anti-spoofing with remote Photoplethysmography. In: European conference on computer Vision (ECCV), pp. 85–100

  40. Määttä J, Hadid A, Pietikainen M (2011) Face spoofing detection from single images using micro-texture analysis. In: IEEE international joint conference on biometrics (IJCB), pp. 1–7

  41. Maatta J, Hadid A, Pietikainen M (2012) Face spoofing detection from single images using texture and local shape analysis. IET Biometrics 1(1):3–10

    Article  Google Scholar 

  42. Manjani, I., Tariyal, S., Vatsa, M., Singh, R., Majumdar, A. (2017) Detecting silicone mask based presentation attack via deep dictionary learning. IEEE Trans Inf Forensics Secur, in press, doi:10.1109/TIFS.2017.2676720

  43. Marcel S, Nixon MS, Li SZ (2014) Handbook of biometric anti-spoofing. Springer, New York

    Book  Google Scholar 

  44. Marcialis GL, Biggio B, Fumera G (2014) Anti-spoofing: Multimodal. In: Encyclopedia of biometrics. Springer, New York, pp 1–4

    Google Scholar 

  45. Ojala T, Pietikäinen M, Mäenpää T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971–987

    Article  MATH  Google Scholar 

  46. Pan G, Sun L, Wu Z, Lao S. (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: IEEE international conference on computer Vision (ICCV), pp. 1–8

  47. Patel K, Han H, Jain AK (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268–2283

    Article  Google Scholar 

  48. Peng F, Zhou DL, Long M, Sun XM (2017) Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis. AEU Int J Electron Commun 71:72–81

    Article  Google Scholar 

  49. Phan QT, Dang-Nguyen DT, Boato G, De Natale FG. (2016) FACE spoofing detection using LDP-TOP. In: IEEE international conference on image processing (ICIP), pp. 404–408

  50. Pinto A, Schwartz WR, Pedrini H, de Rezende Rocha A (2015) Using visual rhythms for detecting video-based facial spoof attacks. IEEE Trans Inf Forensics Secur 10(5):1025–1038

    Article  Google Scholar 

  51. Pinto A, Pedrini H, Robson Schwartz W, Rocha A (2015) Face spoofing detection through visual codebooks of spectral temporal cubes. IEEE Trans Image Process 24(12):4726–4740

    Article  MathSciNet  Google Scholar 

  52. Raghavendra R, Raja KB, Busch C (2015) Presentation attack detection for face recognition using light field camera. IEEE Trans Image Process 24(3):1060–1075

    Article  MathSciNet  Google Scholar 

  53. Rajoub BA, Zwiggelaar R (2014) Thermal facial analysis for deception detection. IEEE Trans Inf Forensics Secur 9(6):1015–1023

    Article  Google Scholar 

  54. Ramachandra R, Busch C (2017) Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput Surv 50(1):8

    Article  Google Scholar 

  55. Steiner H, Kolb A, Jung N (2016) Reliable face anti-spoofing using multispectral SWIR imaging. In: IEEE international conference on biometrics (ICB), pp. 1–8

  56. Tirunagari S, Poh N, Windridge D, Iorliam A, Suki N, Ho AT (2015) Detection of face spoofing using visual dynamics. IEEE Trans Inf Forensics Secur 10(4):762–777

    Article  Google Scholar 

  57. Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761

    Article  Google Scholar 

  58. Wild P, Radu P, Chen L, Ferryman J (2016) Robust multimodal face and fingerprint fusion in the presence of spoofing attacks. Pattern Recogn 50:17–25

    Article  Google Scholar 

  59. Xu Y, Price T, Frahm JM, Monrose F (2016) Virtual U: defeating face liveness detection by building virtual models from your public photos. USENIX Security Symposium, In, pp 497–512

    Google Scholar 

  60. Yang J, Lei Z, Li SZ. (2014) Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601

  61. Zeng H, Kang X (2015) Fast source camera identification using content adaptive guided image filter. J Forensic Sci 61(2):520–526

    Article  Google Scholar 

  62. Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ. (2012) A face antispoofing database with diverse attacks. In: IAPR international conference on biometrics (ICB), pp. 26–31

  63. Zhang LB, Peng F, Long M. (2016) Source camera identification based on guided image estimation and block weighted average. In: international workshop on digital watermarking (IWDW), pp. 106–118

  64. Zhang LB, Peng F, Long M. (2016) Identifying source camera using guided image estimation and block weighted average. J Vis Commun Image Represent, in press, doi:10.1016/j.jvcir.2016.12.013

  65. Li AA, Nie WZ, Gao Y, Su YT. (2016) Multi-modal clique-graph matching for view-based 3D model retrieval. IEEE Trans Image Process 25(5):2103–2116

  66. Liu AA, Su YT, NieWZ, Kankanhalli M. (2017) Hierarchical clustering multi-task learning for joint human action grouping and recognition. IEEE Trans Pattern Anal Mach Intell 39(1):102–114

Download references

Acknowledgements

This work was supported in part by project supported by National Natural Science Foundation of China (Grant No. 61572182, 61370225), project supported by Hunan Provincial Natural Science Foundation of China (Grant No. 15JJ2007), and supported by the Scientific Research Plan of Hunan Provincial Science and Technology Department of China (2014FJ4161).

The authors would like to thank Idiap research institute, Institute of Automation, Chinese Academy of Sciences (CASIA) and Michigan State University for providing the benchmark databases, and also thank Le-Bing Zhang with Hunan University for his kind proofreading of this manuscript.

The authors would like to thank the anonymous reviewers for their kind suggestions and comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fei Peng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Peng, F., Qin, L. & Long, M. Face presentation attack detection using guided scale texture. Multimed Tools Appl 77, 8883–8909 (2018). https://doi.org/10.1007/s11042-017-4780-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4780-0

Keywords

Navigation