Face Spoof Detection With Image Distortion Analysis

被引:548
作者
Wen, Di [1 ]
Han, Hu [1 ]
Jain, Anil K. [1 ]
机构
[1] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
基金
美国国家科学基金会;
关键词
Face recognition; spoof detection; image distortion analysis; ensemble classifier; cross-database; cross-device; CLASSIFICATION; ALGORITHMS; SCALE; SVM;
D O I
10.1109/TIFS.2015.2400395
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Automatic face recognition is now widely used in applications ranging from deduplication of identity to authentication of mobile payment. This popularity of face recognition has raised concerns about face spoof attacks (also known as biometric sensor presentation attacks), where a photo or video of an authorized person's face could be used to gain access to facilities or services. While a number of face spoof detection techniques have been proposed, their generalization ability has not been adequately addressed. We propose an efficient and rather robust face spoof detection algorithm based on image distortion analysis (IDA). Four different features (specular reflection, blurriness, chromatic moment, and color diversity) are extracted to form the IDA feature vector. An ensemble classifier, consisting of multiple SVM classifiers trained for different face spoof attacks (e.g., printed photo and replayed video), is used to distinguish between genuine (live) and spoof faces. The proposed approach is extended to multiframe face spoof detection in videos using a voting-based scheme. We also collect a face spoof database, MSU mobile face spoofing database (MSU MFSD), using two mobile devices (Google Nexus 5 and MacBook Air) with three types of spoof attacks (printed photo, replayed video with iPhone 5S, and replayed video with iPad Air). Experimental results on two public-domain face spoof databases (Idiap REPLAY-ATTACK and CASIA FASD), and the MSU MFSD database show that the proposed approach outperforms the state-of-the-art methods in spoof detection. Our results also highlight the difficulty in separating genuine and spoof faces, especially in cross-database and cross-device scenarios.
引用
收藏
页码:746 / 761
页数:16
相关论文
共 49 条
[1]  
Anjos A., 2011, P INT JOINT C BIOM I, P1, DOI [10.1109/IJCB.2011.6117503., DOI 10.1109/IJCB.2011.6117503]
[2]  
[Anonymous], P SLI GSCP WORKSH
[3]  
[Anonymous], P ICML
[4]  
[Anonymous], P ICB JUN
[5]  
[Anonymous], PITTSB PATT REC PITT
[6]  
[Anonymous], 2011, ACM T INTEL SYST TEC, DOI DOI 10.1145/1961189.1961199
[7]  
[Anonymous], P SPIE
[8]  
Bao W, 2009, PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON IMAGE ANALYSIS AND SIGNAL PROCESSING, P233
[9]   A survey of signal processing algorithms in brain-computer interfaces based on electrical brain signals [J].
Bashashati, Ali ;
Fatourechi, Mehrdad ;
Ward, Rabab K. ;
Birch, Gary E. .
JOURNAL OF NEURAL ENGINEERING, 2007, 4 (02) :R32-R57
[10]   Unconstrained Face Recognition: Identifying a Person of Interest From a Media Collection [J].
Best-Rowden, Lacey ;
Han, Hu ;
Otto, Charles ;
Klare, Brendan F. ;
Jain, Anil K. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (12) :2144-2157