Advertisement

Signal, Image and Video Processing

, Volume 12, Issue 6, pp 1053–1060 | Cite as

A self-immune to 3D masks attacks face recognition system

  • Bensenane Hamdan
  • Keche Mokhtar
Original Paper
  • 123 Downloads

Abstract

Due to their advantages, facial recognition systems are among the most widely used biometric systems in recent years. However, their drawback is that they can easily be deceived by using 3D masks, which are replicas of real faces. To confirm this fact, we have tested the vulnerability to 3D masks attacks of the already approved Legendre moments invariants (LMI)-based face recognition method. This has been achieved by using the 3D mask attack database (3DMAD), which consists of real faces and faces with 3D masks. The obtained spoof false acceptance rate (SFAR) was close to 65%, which proves that this recognition system is vulnerable to 3D masks attacks. This is generally the case of other face recognition systems, with no anti-spoofing provision. In this paper, a face recognition method is proposed to prevent hackers from deceiving face recognition systems by using 3D masks of people belonging to the system database. This method combines the LMI and the linear discriminant analysis for characteristic features extraction, and the maximum likelihood for classification. With a 97.6% recognition rate and a SFAR equal to 0.83%, the results obtained may be considered as very satisfactory. These results, while obtained with a lower computational time, compare favorably with those of the state-of-the-art method that uses the same 3DMAD database.

Keywords

Legendre moment invariants (LMI) Linear discriminant analysis (LDA) Maximum likelihood classifie Face recognition spoofing 

References

  1. 1.
    Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)CrossRefGoogle Scholar
  2. 2.
    Daugman, J.: The importance of being random: statistical principles of iris recognition. Pattern Recognit. 36(2), 279–291 (2003)CrossRefGoogle Scholar
  3. 3.
    Semwal, V.B., Nandi, G.C.: Design of vector field for different sub-phases of gait and regeneration of gait pattern. IEEE Trans. Autom. Sci. Eng. 15(1), 104–110Google Scholar
  4. 4.
    Semwal, V.B., Nandi, G.C.: Generation of joint trajectories using hybrid automate-based model: a rocking block-based approach. IEEE Sens. J. 16(14), 5805–5816 (2016)CrossRefGoogle Scholar
  5. 5.
    Semwal, V.B., Mondal, K., Nandi, G.C.: Robust and accurate feature selection for humanoid push recovery and classification: deep learning approach. Neural Comput. Appl. 28(3), 565–574 (2017)CrossRefGoogle Scholar
  6. 6.
    Turk, M., Pentland, A.: Eigenfaces for recognition. J. Cogn. Neurosci. 3(1), 71–86 (1991)CrossRefGoogle Scholar
  7. 7.
    Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley, New York (2001)zbMATHGoogle Scholar
  8. 8.
    Pan, G., Sun, L., Wu, Z., Laon, S.: Eyeblink-based antispoong in face recognition from a generic web camera. In: IEEE International Conference on Computer Vision, pp. 1–8 (Oct 2007)Google Scholar
  9. 9.
    Bai, J., Ng, T.-T., Gao, X., Shi, Y.-Q.: Is physics-based liveness detection truly possible with a single image? In: IEEE International Symposium on Circuits and Systems, pp. 3425–3428 (Jun 2010)Google Scholar
  10. 10.
    Chetty, G., Wagner, M.: Multi-level liveness verication for face-voice biometric authentication. In: Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference, pp. 1–6 (2006)Google Scholar
  11. 11.
    Kollreider, K., Fronthaler, H., Bigun, J.: Evaluating liveness by face images and the structure tensor. In: IEEE Workshop on Automatic Identication Advanced Technologies, pp. 75–80 (Oct 2005)Google Scholar
  12. 12.
    Kim, Y., Na, J., Yoon, S., Yi, J.: Masked fake face detection using radiance measurements. J. Opt. Soc. Am. A 26(4), 760–766 (2009)CrossRefGoogle Scholar
  13. 13.
    Zhang, Z., Yi, D., Lei, Z., Li, S.: Face liveness detection by learning multispectral reectance distributions. In: IEEE International Conference on Automatic Face Gesture Recognition and Workshops, pp. 436–441 (Mar 2011)Google Scholar
  14. 14.
    Kose, N., Dugelay, J.L.: Countermeasure for the protection of face recognition systems against mask attacks. In: IEEE International Conference on Automatic Face and Gesture Recognition (2013)Google Scholar
  15. 15.
    Erdogmus, N., Marcel, S.: Spoong 2d face recognition systems with 3d masks. In: Conference of the Biometrics Special Interest Group (2013)Google Scholar
  16. 16.
    Erdogmus, N., Marcel, S.: Spoofing face recognition with 3D masks. IEEE Trans. Inf. Forensics Secur. 9(7), 1084–1097 (2014).  https://doi.org/10.1109/TIFS.2014.2322255
  17. 17.
    https://www.idiap.ch/dataset/3dmad. Accessed 01 Dec 2017
  18. 18.
    Menotti, D., Chiachia, G., Pinto, A., Schwartz, W.Robson, Pedrini, H., Falcao, A.Xavier, Rocha, A.: Deep representations for iris, face, and fingerprint spoofing detection. IEEE TIFS 10(4), 864–879 (2015)Google Scholar
  19. 19.
    Agarwal, A., Singh, R., Vatsa, M.: Face anti-spoofing using Haralick features. In: IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS) (2016)Google Scholar
  20. 20.
    Vatkin, M., Selinger, M.: The system of hand written characters recognition on the basis of Legendre moments and Neural networks. In: Proceedings of International Workshop on Digital Event System Design, DESDes01 (2001)Google Scholar
  21. 21.
    Sonka, M., Hlavac, V., Boyle, R.: Image Processing, Analysis and Machine Vision. Vikas publishing house, Chennai (2001)Google Scholar
  22. 22.
    Mukundan, R., Ong, S.H., Lee, P.A.: Discrete versus continuous orthogonal moments for image analysis. In: Proceedings of International conference CIsst01 (2001)Google Scholar
  23. 23.
    Cox, I., Ghosn, J., Yianilos, P.: Feature-based face recognition using mixture-distance. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 209–216 (1996)Google Scholar
  24. 24.
    Bensenane, H., Keche, M.: Face recognition using angular radial transform. J. King Saud Univ. Comput. Inf. Sci. (2016).  https://doi.org/10.1016/j.jksuci.2016.10.006
  25. 25.
    Teague, M.R.: Image analysis via the general theory of moments. J. Opt. Soc. Am. 70, 920–930 (1980)MathSciNetCrossRefGoogle Scholar
  26. 26.
    Annadurai, S., Saradha, A.: Face recognition using legendre moments. In: Proceedings of the Fourth Indian Conference on Computer Vision, Graphics and Image Processing (2004)Google Scholar
  27. 27.
    Belhumeur, P., Hespanha, J., Kriegman, D.: Eigenfaces versus Fisherfaces: recognition using class specific linear projection. IEEE Trans. Pattern Anal. Mach. Intell. 19, 711–720 (1997)CrossRefGoogle Scholar
  28. 28.
    Mohan, A., Papageorgiou, C., Poggio, T.: Example-based object detection in images by components. PAMI 23(1), 349–361 (2001)CrossRefGoogle Scholar
  29. 29.
  30. 30.
  31. 31.
  32. 32.
  33. 33.
    Semwal, V.B., Singha, J., Sharma, P.K., Chauhan, A., Behera, B.: An optimized feature selection technique based on incremental feature analysis for bio-metric gait data classification. Multimed. Tools Appl. 1–19 (2016)Google Scholar
  34. 34.
    Semwal, V.B., Mondal, K., Nandi, G.C.: Robust and accurate feature selection for humanoid push recovery and classification: deep learning approach. Neural Computing and Applications 28(3), 565–574 (2017)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2018

Authors and Affiliations

  1. 1.Laboratoire Signaux et Images, Dpartement dElectroniqueUniversit des Sciences et de la Technologie dOran Mohamed Boudiaf, USTO-MBOranAlgeria

Personalised recommendations