Skip to main content

Facial Expression Analysis as a Means for Additional Biometric Security in Recognition Systems

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 566))

Abstract

In the well explored domain of facial biometrics, methods which forgo traditional models of intruder detection can lead to a more robust system. One such method, which is outlined in this paper, is to utilize the movement of feature points over the course of an expression to make user authentication systems more secure. To do this, we developed a new algorithm, and used the process known as ranking, to describe facial expressions in a computationally cheap way. In our experiments, we performed 309,210 authentication attempts on 33 user profiles and achieved at best an error of only 3.4 %, with an average error of 33.28 %. Although such a system is not as accurate as common face biometric systems, we believe that this method can augment those systems to make them impervious to common attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kose, N., Dugelay, J.L.: Shape and texture based countermeasure to protect face recognition systems against mask attacks. In: 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 111–116. IEEE (2013)

    Google Scholar 

  2. Kose, N., Dugelay, J.L.: Countermeasure for the protection of face recognition systems against mask attacks. In: 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), pp. 1–6. IEEE (2013)

    Google Scholar 

  3. Kim, G., Eum, S., Suhr, J.K., Kim, D.I., Park, K.R., Kim, J.: InBiometrics (ICB), 2012 5th IAPR International Conference on Face Liveness Detection Based on Texture and Frequency Analyses, pp. 67–72. IEEE (2012)

    Google Scholar 

  4. Määttä, J., Hadid, A., Pietikäinen, M.: Face spoofing detection from single images usingtexture and local shape analysis. IET Biometrics 1(1), 3–10 (2012)

    Article  Google Scholar 

  5. Frischholz, R.W., Werner, A.: Avoiding replay-attacks in a face recognition system using Head-pose Estimation. In: AMFG 2003. IEEE International Workshop on Analysis and Modeling of Faces and Gestures, pp. 234–235. IEEE (2003)

    Google Scholar 

  6. Lucey, P., Cohn, J.F., Kanade, T., Saragih, J., Ambadar, Z., Matthews, I.: The extended Cohn-Kanade Dataset (CK +): a complete dataset for action unit and emotion-specified expression. In: 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 94–101. IEEE (2010)

    Google Scholar 

  7. Hong, L., Wan, Y., Jain, A.: Fingerprint image enhancement: algorithm and performance evaluation. IEEE Trans. Pattern Anal. Mach. Intell. 20(8), 777–789 (1998)

    Article  Google Scholar 

  8. Reynolds, D.A., Rose, R.C.: Robust text-independent speaker identification using Gaussian mixture speaker models. IEEE Trans. Speech Audio Process. 3(1), 72–83 (1995)

    Article  Google Scholar 

  9. Uludag, U., Jain, A.K.: Attacks on biometric systems: a case study in fingerprints. In: Electronic Imaging 2004, pp. 622–633. International Society for Optics and Photonics (2004)

    Google Scholar 

  10. Piotrowski, Z., Gajewski, P.: Voice spoofing as an impersonation attack and the way of protection. J. Inf. Assur. Secur. 2(3), 223–225 (2007)

    Google Scholar 

  11. Revenkar, P.S., Anjum, A., Gandhare, W.Z.: Secure iris authentication using visual (2010)

    Google Scholar 

  12. Tian, Y.L., Kanade, T., Cohn, J.F.: Recognizing action units for facial expression analysis. IEEE Trans. Pattern Anal. Mach. Intell. 23(2), 97–115 (2001)

    Article  Google Scholar 

  13. Pantic, M., Rothkrantz, L.J.: Facial action recognition for facial expression analysis from static face images. Cybern. IEEE Trans. Syst. Man Cybern. Part B 34(3), 1449–1461 (2004)

    Article  Google Scholar 

  14. Ioannou, S.V., Raouzaiou, A.T., Tzouvaras, V.A., Mailis, T.P., Karpouzis, K.C., Kollias, S.D.: Emotion recognition through facial expression analysis based on a neurofuzzy network. Neural Netw. 18(4), 423–435 (2005)

    Article  Google Scholar 

  15. Shan, C., Gong, S., McOwan, P.W.: Facial expression recognition based on local binary patterns: a comprehensive study. Image Vis. Comput. 27(6), 803–816 (2009)

    Article  Google Scholar 

  16. Noldus FaceReader 5. http://www.noldus.com/

  17. Lee, D.T., Schachter, B.J.: Two algorithms for constructing a Delaunay triangulation. Int. J. Comput. Inf. Sci. 9(3), 219–242 (1980)

    Article  MathSciNet  MATH  Google Scholar 

  18. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 367–397 (2002)

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by the Michigan Space Grant Consortium. We thank our colleagues in the College of Science, Engineering, and Technology at Saginaw Valley State University for their continued support. In addition, we thank the Undergraduate Research Program (UGRP) at Saginaw Valley State University for making our continued works possible. In addition, we thank the students at Saginaw Valley State University for their valuable data and Cody Brown, whose assistance was invaluable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dustyn James Tubbs .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Tubbs, D.J., Rahman, K.A. (2015). Facial Expression Analysis as a Means for Additional Biometric Security in Recognition Systems. In: Dziech, A., Leszczuk, M., Baran, R. (eds) Multimedia Communications, Services and Security. MCSS 2015. Communications in Computer and Information Science, vol 566. Springer, Cham. https://doi.org/10.1007/978-3-319-26404-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26404-2_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26403-5

  • Online ISBN: 978-3-319-26404-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics