Skip to main content

2019 | OriginalPaper | Buchkapitel

10. Recent Advances in Face Presentation Attack Detection

verfasst von : Sushil Bhattacharjee, Amir Mohammadi, André Anjos, Sébastien Marcel

Erschienen in: Handbook of Biometric Anti-Spoofing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The undeniable convenience of face recognition (FR) based biometrics has made it an attractive tool for access control in various application areas, from airports to remote banking. Widespread adoption of face biometrics, however, depends on the perception of robustness of such systems. One particular vulnerability of FR systems comes from presentation attacks (PA), where a subject A attempts to impersonate another subject B, by presenting, say, a photograph of B to the biometric sensor (i.e., the camera). PAs are the most likely forms of attacks on face biometric systems, as the camera is the only component of the biometric system that is exposed to the outside world. Presentation attack detection (PAD) methods provide an additional layer of security to FR systems. The first edition of the Handbook of Biometric Anti-Spoofing included two chapters on face-PAD. In this chapter we review the significant advances in face-PAD research since the publication of the first edition of this book. In addition to new face-PAD methods designed for color images, we also discuss advances involving other imaging modalities, such as near-infrared (NIR) and thermal imaging. Research on detecting various kinds of attacks, both planar as well as involving three-dimensional masks, is reviewed. The chapter also summarizes a number of recently published datasets for face-PAD experiments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. In: Bigun J, Smeraldi F (eds) Audio- and video-based biometric person authentication. Springer, Heidelberg, pp 223–228 Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. In: Bigun J, Smeraldi F (eds) Audio- and video-based biometric person authentication. Springer, Heidelberg, pp 223–228
2.
Zurück zum Zitat Hadid A (2014) Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions. In: Proceedings of IEEE computer society conference on computer vision and pattern recognition workshops (cVPRW), pp 113 – 118 Hadid A (2014) Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions. In: Proceedings of IEEE computer society conference on computer vision and pattern recognition workshops (cVPRW), pp 113 – 118
3.
Zurück zum Zitat Ramachandra R, Raja KB, Venkatesh S, Cheikh FA, Büsch C (2017) On the vulnerability of extended multispectral face recognition systems towards presentation attacks. In: Proceedings of IEEE international conference on identity, security and behavior analysis (ISBA), pp 1 – 8. https://doi.org/10.1109/ISBA.2017.7947698 Ramachandra R, Raja KB, Venkatesh S, Cheikh FA, Büsch C (2017) On the vulnerability of extended multispectral face recognition systems towards presentation attacks. In: Proceedings of IEEE international conference on identity, security and behavior analysis (ISBA), pp 1 – 8. https://​doi.​org/​10.​1109/​ISBA.​2017.​7947698
5.
Zurück zum Zitat Kanzawa Y, Kimura Y, Naito T (2011) Human skin detection by visible and near-infrared imaging. In: Proceedings of the 12th IAPR conference on machine vision applications, MVA 2011. Nara, Japan Kanzawa Y, Kimura Y, Naito T (2011) Human skin detection by visible and near-infrared imaging. In: Proceedings of the 12th IAPR conference on machine vision applications, MVA 2011. Nara, Japan
6.
Zurück zum Zitat Parkhi OM, Vedaldi A, Zisserman A (2015) Deep face recognition. In: British machine vision conference Parkhi OM, Vedaldi A, Zisserman A (2015) Deep face recognition. In: British machine vision conference
9.
Zurück zum Zitat Huang GB, Ramesh M, Berg T, Learned-Miller E (2007) Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. Technical report 07–49, University of Massachusetts, Amherst (MA), USA Huang GB, Ramesh M, Berg T, Learned-Miller E (2007) Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. Technical report 07–49, University of Massachusetts, Amherst (MA), USA
12.
Zurück zum Zitat Scherhag U, Nautsch A, Rathgeb C, Gomez-Barrero M, Veldhuis RNJ, Spreeuwers L, Schils M, Maltoni D, Grother F, Marcel S, Breithaupt R, Ramachandra R, Büsch C (2017) Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting. In: Proceedings of international conference of the biometrics special interest group (BIOSIG). https://doi.org/10.23919/BIOSIG.2017.8053499 Scherhag U, Nautsch A, Rathgeb C, Gomez-Barrero M, Veldhuis RNJ, Spreeuwers L, Schils M, Maltoni D, Grother F, Marcel S, Breithaupt R, Ramachandra R, Büsch C (2017) Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting. In: Proceedings of international conference of the biometrics special interest group (BIOSIG). https://​doi.​org/​10.​23919/​BIOSIG.​2017.​8053499
14.
Zurück zum Zitat Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: Proceedings of the international conference of biometrics special interest group (BIOSIG) Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: Proceedings of the international conference of biometrics special interest group (BIOSIG)
16.
Zurück zum Zitat Ramachandra R, Büsch C (2017) Presentation attack detection methods for face recognition systems - a comprehensive survey. ACM Comput Surv 50CrossRef Ramachandra R, Büsch C (2017) Presentation attack detection methods for face recognition systems - a comprehensive survey. ACM Comput Surv 50CrossRef
18.
Zurück zum Zitat Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: IEEE international conference on image processing (ICIP), pp 2636–2640 Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: IEEE international conference on image processing (ICIP), pp 2636–2640
21.
Zurück zum Zitat Boulkenafet Z, Komulainen J, Hadid A (2018) On the generalization of color texture-based face anti-spoofing. Image Vis Comput. Accepted at the time of writing Boulkenafet Z, Komulainen J, Hadid A (2018) On the generalization of color texture-based face anti-spoofing. Image Vis Comput. Accepted at the time of writing
22.
Zurück zum Zitat Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: Proceedings of 12th IEEE international conference on automatic face and gesture recognition (FG 2017) Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: Proceedings of 12th IEEE international conference on automatic face and gesture recognition (FG 2017)
23.
Zurück zum Zitat Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761CrossRef Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761CrossRef
25.
Zurück zum Zitat Li Y, Po LM, Xu X, Feng L, Yuan F (2016) Face liveness detection and recognition using shearlet based feature descriptors. In: Proceedings of IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 874 – 877 Li Y, Po LM, Xu X, Feng L, Yuan F (2016) Face liveness detection and recognition using shearlet based feature descriptors. In: Proceedings of IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 874 – 877
31.
Zurück zum Zitat Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural networks. In: Advances in neural information processing systems, vol 25 Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural networks. In: Advances in neural information processing systems, vol 25
32.
Zurück zum Zitat Lucena O, Junior A, Hugo GMV, Souza R, Valle E, De Alencar Lotufo R (2017) Transfer learning using convolutional neural networks for face anti-spoofing. In: Karray F, Campilho A, Cheriet F (eds.) Proceedings of international conference on image analysis and recognition (ICIAR), Springer International Publishing, Cham, pp 27–34 Lucena O, Junior A, Hugo GMV, Souza R, Valle E, De Alencar Lotufo R (2017) Transfer learning using convolutional neural networks for face anti-spoofing. In: Karray F, Campilho A, Cheriet F (eds.) Proceedings of international conference on image analysis and recognition (ICIAR), Springer International Publishing, Cham, pp 27–34
41.
Zurück zum Zitat Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: Proceeding of IEEE computer vision and pattern recognition, Salt Lake City, USA Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: Proceeding of IEEE computer vision and pattern recognition, Salt Lake City, USA
45.
Zurück zum Zitat Wang S, Yun Fu Y (2016) Face behind makeup. In: Proceedings of the thirtieth conference of the association for the advancement of artificial intelligence, pp 58–64 Wang S, Yun Fu Y (2016) Face behind makeup. In: Proceedings of the thirtieth conference of the association for the advancement of artificial intelligence, pp 58–64
47.
Zurück zum Zitat Agarwal A, Yadav D, Kohli N, Singh R, Vatsa M, Noore A (2017) Face presentation attack with latex masks in multispectral videos. In: Proceedings of IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp 275–283. https://doi.org/10.1109/CVPRW.2017.40 Agarwal A, Yadav D, Kohli N, Singh R, Vatsa M, Noore A (2017) Face presentation attack with latex masks in multispectral videos. In: Proceedings of IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp 275–283. https://​doi.​org/​10.​1109/​CVPRW.​2017.​40
49.
Zurück zum Zitat Arashloo SR, Kittler J (2017) An anomaly detection approach to face spoofing detection: a new formulation and evaluation protocol. In: Proceedings of the IEEE international joint conference on biometrics (IJCB), pp 80–89 Arashloo SR, Kittler J (2017) An anomaly detection approach to face spoofing detection: a new formulation and evaluation protocol. In: Proceedings of the IEEE international joint conference on biometrics (IJCB), pp 80–89
51.
Zurück zum Zitat Steiner H, Sporrer S, Kolb A, Jung N (2016) Design of an active multispectral SWIR camera system for skin detection and face verification. J Sens 2016(1):1 – 8. Article ID 9682453, Special Issue on Multispectral, Hyperspectral, and Polarimetric Imaging TechnologyCrossRef Steiner H, Sporrer S, Kolb A, Jung N (2016) Design of an active multispectral SWIR camera system for skin detection and face verification. J Sens 2016(1):1 – 8. Article ID 9682453, Special Issue on Multispectral, Hyperspectral, and Polarimetric Imaging TechnologyCrossRef
52.
Zurück zum Zitat Bourlai T, Narang N, Cukic B, Hornak L (2012) On designing a SWIR multi-wavelength facial-based acquisition system. In: Proceedings of SPIE: infrared technology and applications, vol 8353 Bourlai T, Narang N, Cukic B, Hornak L (2012) On designing a SWIR multi-wavelength facial-based acquisition system. In: Proceedings of SPIE: infrared technology and applications, vol 8353
53.
Zurück zum Zitat Ramachandra R, Raja KB, Venkatesh S, Büsch C (2017) Extended multispectral face presentation attack detection: an approach based on fusing information from individual spectral bands. In: Proceedings of 20th international conference on information fusion (Fusion). https://doi.org/10.23919/ICIF.2017.8009749 Ramachandra R, Raja KB, Venkatesh S, Büsch C (2017) Extended multispectral face presentation attack detection: an approach based on fusing information from individual spectral bands. In: Proceedings of 20th international conference on information fusion (Fusion). https://​doi.​org/​10.​23919/​ICIF.​2017.​8009749
54.
Zurück zum Zitat Bhattacharjee S, Marcel S (2017) What you can’t see can help you – extended range imaging for 3d-mask presentation attack detection. In: Proceedings of the 16th international conference of the biometrics special interest group (BIOSIG), Darmstadt, Germany Bhattacharjee S, Marcel S (2017) What you can’t see can help you – extended range imaging for 3d-mask presentation attack detection. In: Proceedings of the 16th international conference of the biometrics special interest group (BIOSIG), Darmstadt, Germany
55.
Zurück zum Zitat Bhattacharjee S, Mohammadi A, Marcel S (2018) Spoofing deep face recognition with custom silicone masks. In: Proceedings of the IEEE international conference on biometrics: theory, applications and systems (BTAS). Los Angeles, USA ) Bhattacharjee S, Mohammadi A, Marcel S (2018) Spoofing deep face recognition with custom silicone masks. In: Proceedings of the IEEE international conference on biometrics: theory, applications and systems (BTAS). Los Angeles, USA )
56.
Zurück zum Zitat Erdogmus N, Marcel S (2013) Spoofing in 2D Face recognition with 3d masks and anti-spoofing with kinect. In: Proceedings of the IEEE international conference on biometrics: theory, applications and systems (BTAS) Erdogmus N, Marcel S (2013) Spoofing in 2D Face recognition with 3d masks and anti-spoofing with kinect. In: Proceedings of the IEEE international conference on biometrics: theory, applications and systems (BTAS)
58.
Zurück zum Zitat Agarwal A, Singh R, Vatsa M (2016) Face anti-spoofing using haralick features. In: Proceedings of the IEEE international conference on biometrics: theory, applications, and systems (BTAS), Niagara Falls, USA, pp 1–6 Agarwal A, Singh R, Vatsa M (2016) Face anti-spoofing using haralick features. In: Proceedings of the IEEE international conference on biometrics: theory, applications, and systems (BTAS), Niagara Falls, USA, pp 1–6
60.
Zurück zum Zitat Ramachandra R, Raja K, Büsch C (2015) Presentation attack detection for face recognition using light field camera. IEEE Trans Image Process 24(3):1–16MathSciNetCrossRef Ramachandra R, Raja K, Büsch C (2015) Presentation attack detection for face recognition using light field camera. IEEE Trans Image Process 24(3):1–16MathSciNetCrossRef
62.
Zurück zum Zitat Chingovska I, Erdogmus N, Anjos A, Marcel S (2016) Face recognition systems under spoofing attacks. In: Bourlai T (ed.) Face recognition across the imaging spectrum, Springer, Berlin, pp 165–194 (2016)CrossRef Chingovska I, Erdogmus N, Anjos A, Marcel S (2016) Face recognition systems under spoofing attacks. In: Bourlai T (ed.) Face recognition across the imaging spectrum, Springer, Berlin, pp 165–194 (2016)CrossRef
Metadaten
Titel
Recent Advances in Face Presentation Attack Detection
verfasst von
Sushil Bhattacharjee
Amir Mohammadi
André Anjos
Sébastien Marcel
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-92627-8_10

Neuer Inhalt