多媒体信息安全

基于LBP-MDCT和CNN的人脸活体检测算法

展开
  • 暨南大学 信息科学技术学院, 广州 510632

收稿日期: 2019-09-04

  修回日期: 2019-09-09

  网络出版日期: 2019-10-18

基金资助

国家自然科学基金面上项目(No.61772234);2018年广东大学生科技创新培育专项资金项目(No.pdjhb0061)资助

Face Anti-spoofing Based on LBP, Multilayer DCT and CNN

Expand
  • School of Information Science and Technology, Jinan University, Guangzhou 510632, China

Received date: 2019-09-04

  Revised date: 2019-09-09

  Online published: 2019-10-18

摘要

人脸活体检测技术作为人脸识别系统安全运行的重要保障,对保障网络空间安全意义重大.针对基于视频的人脸欺骗攻击,提出一种基于局部二值模式-多层离散余弦变换(local binary pattern and multilayer discrete cosine transform,LBP-MDCT)和卷积神经网络(convolutional neural network,CNN)融合的人脸活体检测算法.首先从检测视频中提取人脸图像;接着对人脸图像进行LBP和多层DCT变换以得到LBP-MDC T特征,将部分人脸图像输入CNN中以得到CNN特征;然后将两种特征分别输入到支持向量机(supportvector machine,SVM)中得到分类结果;最后将SVM的输出进行决策级融合以判定检测视频的合法性.在Replay-Attack和CASIA-FASD数据库上的实验结果表明,相对于现有算法,该算法的检测性能更加优越.

本文引用格式

刘伟, 章琬苓, 项世军 . 基于LBP-MDCT和CNN的人脸活体检测算法[J]. 应用科学学报, 2019 , 37(5) : 609 -617 . DOI: 10.3969/j.issn.0255-8297.2019.05.003

Abstract

In applications of cyberspace security, face liveness detection is significant for face recognition systems. In this paper, an innovative face anti-spoofing algorithm against video-based face spoofing attacks is proposed based on local binary patterns and multilayer discrete cosine transform (LBP-MDCT) and convolutional neural network (CNN). First, we first extract face images from a target video, generate LBP features for each extracted face image and perform multilayer DCT onto the features to obtain LBP-MDCT features. Second, we input part of face images into CNN to obtain CNN features. After that, the two types of features are respectively input into support vector machine (SVM) classifier. In the last stage, the SVM output is fused with a decision-level operation to determine whether the target video is a spoof attack or a valid access. Compared with existing algorithms, the experimental results on two benchmarking datasets (Replay-Attack dataset and CASIAFASD dataset) demonstrate the excellent effectiveness of the proposed method.

参考文献

[1] Souza L, Oliveira L, Pamplona M, et al. How far did we get in face spoofing detection?[J]. Engineering Applications of Artificial Intelligence, 2018, 72:368-381.
[2] Zhao W Y, Chellappa R, Phillips P J, et al. Face recognition:a literature survey[J]. ACM Computing Surveys, 2003, 35(4):399-458.
[3] Feng L T, Po L M, Li Y M, et al. Integration of image quality and motion cues for face anti-spoofing:a neural network approach[J]. Journal of Visual Communication and Image Representation, 2016, 38:451-460.
[4] Dora L, Agrawal S, Panda R, et al. An evolutionary single Gabor kernel based filter approach to face recognition[J]. Engineering Applications of Artificial Intelligence, 2017, 62:286-301.
[5] Hasan H, Abdul-Kareem S. Fingerprint image enhancement and recognition algorithms:a survey[J]. Neural Computing and Applications, 2013, 23(6):1605-1610.
[6] Marasco E, Ross A. A survey on antispoofing schemes for fingerprint recognition systems[J]. ACM Computing Surveys, 2014, 47(28):1-36.
[7] Choi D J, Park J S, Oh Y H. Unsupervised rapid speaker adaptation based on selective eigenvoice merging for user-specific voice interaction[J]. Engineering Applications of Artificial Intelligence, 2015, 40:95-102.
[8] De L, Pucher M, Yamagishi J, et al. Evaluation of speaker verification security and detection of HMM-based synthetic speech[J]. IEEE Transactions on Audio, Speech, and Language Processing, 2012, 20(8):2280-2290.
[9] Ma L, Tan T N, Wang Y L, et al. Personal identification based on iris texture analysis[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(12):1519-1533.
[10] Wang L, Tan T, Ning H, et al. Silhouette analysis-based gait recognition for human identification[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(12):1505-1518.
[11] 杨健伟. 面向人脸识别的人脸活体检测方法研究[D]. 北京:北京邮电大学,2014.
[12] 孙霖. 人脸识别中的活体检测技术研究[D]. 浙江:浙江大学,2010
[13] Pinto A, Schwartz W R, Pedrini H, et al. Using visual rhythms for detecting video-based facial spoof attacks[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(5):1025-1038
[14] 田野,项世军. 基于LBP和多层DCT的人脸活体检测算法[J]. 计算机研究与发展,2018, 55(3):643-650. Tian Y, Xiang S J. LBP and multilayer DCT based anti-spoofing countermeasure in face liveness detection[J]. Journal of Computer Research and Development, 2018, 55(3):643-650. (in Chinese)
[15] Yang J, Lei Z, Li S Z. Learn convolutional neural network for face anti-spoofing[DB/OL]. 2014[2014-08-24]. arXiv:1408.5601.
[16] Määttä J, Hadid A, Pietikäinen M. Face spoofing detection from single images using microtexture analysis[C]//International Joint Conference on Biometrics. IEEE, 2011:1-7.
[17] Chingovska I, Anjos A, Marcel S. On the effectiveness of local binary patterns in face anti-spoofing[C]//BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group. IEEE, 2012:1-7.
[18] Määttä J, Hadid A, PietikäInen M. Face spoofing detection from single images using texture and local shape analysis[J]. IET Biometrics, 2012, 1(1):3-10
[19] Yang J W, Lei Z, Liao S C, et al. Face liveness detection with component dependent descriptor[C]//2013 International Conference on Biometrics. IEEE, 2013:1-6.
[20] Zhang Z W, Yan J J, Liu S F, et al. A face antispoofing database with diverse attacks[C]//20125th IAPR International Conference on Biometrics. IEEE, 2012:26-31.
[21] Patel K, Han H, Jain A K. Secure face unlock:spoof detection on smartphones[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(10):2268-2283.
[22] Boulkenafet Z, Komulainen J, Hadid A. Face antispoofing using speeded-up robust features and fisher vector encoding[J]. IEEE Signal Processing Letters, 2017, 24(1):141-145.
[23] Pereira T D F, André A, José M D M, et al. LBP-TOP based countermeasure against face spoofing attacks[C]//Asian Conference on Computer Vision. Springer, 2012:121-132.
[24] Tirunagari S, Poh N, Windridge D, et al. Detection of face spoofing using visual dynamics[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(4):762-777.
[25] Xu Z Q, Li S, Deng W H. Learning temporal features using LSTM-CNN architecture for face anti-spoofing[C]//20153rd IAPR Asian Conference on Pattern Recognition. IEEE, 2015:141-145.
[26] Atoum Y, Liu Y, Jourabloo A, et al. Face anti-spoofing using patch and depth-based CNNs[C]//2017 IEEE International Joint Conference on Biometrics. IEEE, 2017:319-328.
[27] Asim M, Ming Z, Javed M Y. CNN based spatio-temporal feature extraction for face antispoofing[C]//20172nd International Conference on Image, Vision and Computing. IEEE, 2017:234-238.
[28] Zhang S F, Wang X B, Liu A J, et al. A dataset and benchmark for large-scale multi-modal face anti-spoofing[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019:919-928.
[29] Viola P, Jones M J. Robust real-time face detection[J]. International Journal of Computer Vision, 2004, 57(2):137-154
[30] Cortes C, Vapnik V. Support-vector networks[J]. Machine Learning, 1995, 20(3):273-297
[31] Yang J, Yang J Y, Zhang D, et al. Feature fusion:parallel strategy vs. serial strategy[J]. Pattern Recognition, 2003, 36(6):1369-1381.
文章导航

/