In applications of cyberspace security, face liveness detection is significant for face recognition systems. In this paper, an innovative face anti-spoofing algorithm against video-based face spoofing attacks is proposed based on local binary patterns and multilayer discrete cosine transform (LBP-MDCT) and convolutional neural network (CNN). First, we first extract face images from a target video, generate LBP features for each extracted face image and perform multilayer DCT onto the features to obtain LBP-MDCT features. Second, we input part of face images into CNN to obtain CNN features. After that, the two types of features are respectively input into support vector machine (SVM) classifier. In the last stage, the SVM output is fused with a decision-level operation to determine whether the target video is a spoof attack or a valid access. Compared with existing algorithms, the experimental results on two benchmarking datasets (Replay-Attack dataset and CASIAFASD dataset) demonstrate the excellent effectiveness of the proposed method.
[1] Souza L, Oliveira L, Pamplona M, et al. How far did we get in face spoofing detection?[J]. Engineering Applications of Artificial Intelligence, 2018, 72:368-381.
[2] Zhao W Y, Chellappa R, Phillips P J, et al. Face recognition:a literature survey[J]. ACM Computing Surveys, 2003, 35(4):399-458.
[3] Feng L T, Po L M, Li Y M, et al. Integration of image quality and motion cues for face anti-spoofing:a neural network approach[J]. Journal of Visual Communication and Image Representation, 2016, 38:451-460.
[4] Dora L, Agrawal S, Panda R, et al. An evolutionary single Gabor kernel based filter approach to face recognition[J]. Engineering Applications of Artificial Intelligence, 2017, 62:286-301.
[5] Hasan H, Abdul-Kareem S. Fingerprint image enhancement and recognition algorithms:a survey[J]. Neural Computing and Applications, 2013, 23(6):1605-1610.
[6] Marasco E, Ross A. A survey on antispoofing schemes for fingerprint recognition systems[J]. ACM Computing Surveys, 2014, 47(28):1-36.
[7] Choi D J, Park J S, Oh Y H. Unsupervised rapid speaker adaptation based on selective eigenvoice merging for user-specific voice interaction[J]. Engineering Applications of Artificial Intelligence, 2015, 40:95-102.
[8] De L, Pucher M, Yamagishi J, et al. Evaluation of speaker verification security and detection of HMM-based synthetic speech[J]. IEEE Transactions on Audio, Speech, and Language Processing, 2012, 20(8):2280-2290.
[9] Ma L, Tan T N, Wang Y L, et al. Personal identification based on iris texture analysis[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(12):1519-1533.
[10] Wang L, Tan T, Ning H, et al. Silhouette analysis-based gait recognition for human identification[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(12):1505-1518.
[11] 杨健伟. 面向人脸识别的人脸活体检测方法研究[D]. 北京:北京邮电大学,2014.
[12] 孙霖. 人脸识别中的活体检测技术研究[D]. 浙江:浙江大学,2010
[13] Pinto A, Schwartz W R, Pedrini H, et al. Using visual rhythms for detecting video-based facial spoof attacks[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(5):1025-1038
[14] 田野,项世军. 基于LBP和多层DCT的人脸活体检测算法[J]. 计算机研究与发展,2018, 55(3):643-650. Tian Y, Xiang S J. LBP and multilayer DCT based anti-spoofing countermeasure in face liveness detection[J]. Journal of Computer Research and Development, 2018, 55(3):643-650. (in Chinese)
[15] Yang J, Lei Z, Li S Z. Learn convolutional neural network for face anti-spoofing[DB/OL]. 2014[2014-08-24]. arXiv:1408.5601.
[16] Määttä J, Hadid A, Pietikäinen M. Face spoofing detection from single images using microtexture analysis[C]//International Joint Conference on Biometrics. IEEE, 2011:1-7.
[17] Chingovska I, Anjos A, Marcel S. On the effectiveness of local binary patterns in face anti-spoofing[C]//BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group. IEEE, 2012:1-7.
[18] Määttä J, Hadid A, PietikäInen M. Face spoofing detection from single images using texture and local shape analysis[J]. IET Biometrics, 2012, 1(1):3-10
[19] Yang J W, Lei Z, Liao S C, et al. Face liveness detection with component dependent descriptor[C]//2013 International Conference on Biometrics. IEEE, 2013:1-6.
[20] Zhang Z W, Yan J J, Liu S F, et al. A face antispoofing database with diverse attacks[C]//20125th IAPR International Conference on Biometrics. IEEE, 2012:26-31.
[21] Patel K, Han H, Jain A K. Secure face unlock:spoof detection on smartphones[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(10):2268-2283.
[22] Boulkenafet Z, Komulainen J, Hadid A. Face antispoofing using speeded-up robust features and fisher vector encoding[J]. IEEE Signal Processing Letters, 2017, 24(1):141-145.
[23] Pereira T D F, André A, José M D M, et al. LBP-TOP based countermeasure against face spoofing attacks[C]//Asian Conference on Computer Vision. Springer, 2012:121-132.
[24] Tirunagari S, Poh N, Windridge D, et al. Detection of face spoofing using visual dynamics[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(4):762-777.
[25] Xu Z Q, Li S, Deng W H. Learning temporal features using LSTM-CNN architecture for face anti-spoofing[C]//20153rd IAPR Asian Conference on Pattern Recognition. IEEE, 2015:141-145.
[26] Atoum Y, Liu Y, Jourabloo A, et al. Face anti-spoofing using patch and depth-based CNNs[C]//2017 IEEE International Joint Conference on Biometrics. IEEE, 2017:319-328.
[27] Asim M, Ming Z, Javed M Y. CNN based spatio-temporal feature extraction for face antispoofing[C]//20172nd International Conference on Image, Vision and Computing. IEEE, 2017:234-238.
[28] Zhang S F, Wang X B, Liu A J, et al. A dataset and benchmark for large-scale multi-modal face anti-spoofing[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019:919-928.
[29] Viola P, Jones M J. Robust real-time face detection[J]. International Journal of Computer Vision, 2004, 57(2):137-154
[30] Cortes C, Vapnik V. Support-vector networks[J]. Machine Learning, 1995, 20(3):273-297
[31] Yang J, Yang J Y, Zhang D, et al. Feature fusion:parallel strategy vs. serial strategy[J]. Pattern Recognition, 2003, 36(6):1369-1381.