Advertisement

Challenges of Face Presentation Attack Detection in Real Scenarios

  • Artur Costa-Pazo
  • Esteban Vazquez-Fernandez
  • José Luis Alba-Castro
  • Daniel González-Jiménez
Chapter
Part of the Advances in Computer Vision and Pattern Recognition book series (ACVPR)

Abstract

In the current context of digital transformation, the increasing trend in the use of personal devices for accessing online services has fostered the necessity of secure cyberphysical solutions. Biometric technologies for mobile devices, and face recognition specifically, have emerged as a secure and convenient approach. However, such a mobile scenario also brings some specific threats, and spoofing attack detection is, without any doubt, one of the most challenging. Although much effort has been devoted in anti-spoofing techniques over the past few years, there are still many challenges to be solved when implementing these systems in real use cases. This chapter analyses some of the gaps between research and real scenario deployments, including generalisation, usability, and performance. More specifically, we will focus on how to select and configure an algorithm for real scenario deployments, paying special attention to use cases involving limited processing capacity devices (e.g., mobile devices), and we will present a publicly available evaluation framework for this purpose.

Notes

Acknowledgements

We thank the colleagues of the Biometrics Team at Gradiant for their assistance in developing the reproducible toolkit.

References

  1. 1.
    Patel K, Han H, Jain A (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10), 2268–2283CrossRefGoogle Scholar
  2. 2.
    Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: 2015 IEEE international conference on image processing (ICIP), pp 2636–2640.  https://doi.org/10.1109/ICIP.2015.7351280
  3. 3.
    Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. Springer, Berlin, pp 504–517.  https://doi.org/10.1007/978-3-642-15567-3_37CrossRefGoogle Scholar
  4. 4.
    Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: 2012 5th IAPR international conference on biometrics (ICB), pp 26–31.  https://doi.org/10.1109/ICB.2012.6199754
  5. 5.
    Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG - proceedings of the international conference of biometrics special interest group (BIOSIG), pp 1–7Google Scholar
  6. 6.
    Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761.  https://doi.org/10.1109/TIFS.2015.2400395CrossRefGoogle Scholar
  7. 7.
    Costa-Pazo A, Bhattacharjee S, Vazquez-Fernandez E, Marcel S (2016) The replay-mobile face presentation-attack database. In: Proceedings of the international conference on biometrics special interests group (BioSIG)Google Scholar
  8. 8.
    Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: 2017 12th IEEE international conference on automatic face gesture recognition (FG 2017), pp 612–618.  https://doi.org/10.1109/FG.2017.77
  9. 9.
    Chingovska I, Yang J, Lei Z, Yi D, Li SZ, Kähm O, Glaser C, Damer N, Kuijper A, Nouak A, Komulainen J, Pereira TF, Gupta S, Khandelwal S, Bansal S, Rai A, Krishna T, Goyal D, Waris M, Zhang H, Ahmad I, Kiranyaz S, Gabbouj M, Tronci R, Pili M, Sirena N, Roli F, Galbally J, Fiérrez J, da Silva Pinto A, Pedrini H, Schwartz WS, Rocha A, Anjos A, Marcel S (2013) The 2nd competition on counter measures to 2d face spoofing attacks. In: International conference on biometrics, ICB 2013, 4–7 June 2013, Madrid, Spain, pp 1–6.  https://doi.org/10.1109/ICB.2013.6613026
  10. 10.
    Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche SE, Ouafi A, Dornaika F, Taleb-Ahmed A, Qin L, Peng F, Zhang LB, Long M, Bhilare S, Kanhangad V, Costa-Pazo A, Vazquez-Fernandez E, Pérez-Cabo D, Moreira-Pérez JJ, González-Jiménez D, Mohammadi A, Bhattacharjee S, Marcel S, Volkova S, Tang Y, Abe N, Li L, Feng X, Xia Z, Jiang X, Liu S, Shao R, Yuen PC, Almeida WR, Andaló F, Padilha R, Bertocco G, Dias W, Wainer J, Torres R, Rocha A, Angeloni MA, Folego G, Godoy A, Hadid A (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: IJCB 2017: international joint conference on biometrics (IJCB)Google Scholar
  11. 11.
    Xu Y, Price T, Frahm JM, Monrose F (2016) Virtual u: defeating face liveness detection by building virtual models from your public photos. In: 25th USENIX security symposium (USENIX security 16). USENIX Association, Austin, TX, pp 497–512Google Scholar
  12. 12.
    Jackson AS, Bulat A, Argyriou V, Tzimiropoulos G (2017) Large pose 3d face reconstruction from a single image via direct volumetric CNN regression. CoRR. arXiv:1703.07834
  13. 13.
    de Freitas Pereira T, Anjos A, Martino JMD, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: 2013 international conference on biometrics (ICB), pp 1–8.  https://doi.org/10.1109/ICB.2013.6612981
  14. 14.
    Miguel-Hurtado O, Guest R, Lunerti C (2017) Voice and face interaction evaluation of a mobile authentication platform. In: 51st IEEE international Carnahan conference on security technology, Oct 2017, Madrid, SpainGoogle Scholar
  15. 15.
    Trewin S, Swart C, Koved L, Martino J, Singh K, Ben-David S (2012) Biometric authentication on a mobile device: a study of user effort, error and task disruption. In: 28th annual computer security applications conferenceGoogle Scholar
  16. 16.
    Nielsen J (1993) Usability engineering. Morgan Kaufmann Publishers Inc., San FranciscoCrossRefGoogle Scholar
  17. 17.
    Nielsen J (2010) Website response timesGoogle Scholar
  18. 18.
    Anjos A, Günther M, de Freitas Pereira T, Korshunov P, Mohammadi A, Marcel S (2017) Continuously reproducing toolchains in pattern recognition and machine learning experiments. In: International conference on machine learning (ICML)Google Scholar
  19. 19.
    Anjos A, Shafey LE, Wallace R, Günther M, McCool C, Marcel S (2012) Bob: a free signal processing and machine learning toolbox for researchers. In: 20th ACM conference on multimedia systems (ACMMM), Nara, JapanGoogle Scholar
  20. 20.
    Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724.  https://doi.org/10.1109/TIP.2013.2292332MathSciNetCrossRefzbMATHGoogle Scholar
  21. 21.
    Jain AK, Klare B, Ross A (2015) Guidelines for best practices in biometrics research. In: International conference on biometrics, ICB 2015, Phuket, Thailand, 19–22 May 2015, pp 541–545Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Artur Costa-Pazo
    • 1
  • Esteban Vazquez-Fernandez
    • 1
  • José Luis Alba-Castro
    • 2
  • Daniel González-Jiménez
    • 1
  1. 1.GRADIANT, CITEXVIVigoSpain
  2. 2.Universidade de VigoVigoSpain

Personalised recommendations