Skip to main content

Recent Progress on Face Presentation Attack Detection of 3D Mask Attacks

  • Chapter
  • First Online:
Handbook of Biometric Anti-Spoofing

Part of the book series: Advances in Computer Vision and Pattern Recognition ((ACVPR))

Abstract

With the advanced 3D reconstruction and printing technologies, creating a super-real 3D facial mask becomes feasible at an affordable cost. This brings a new challenge to face presentation attack detection (PAD) against 3D facial mask attack. As such, there is an urgent need to solve this problem as many face recognition systems have been deployed in real-world applications. Since this is a relatively new research problem, few studies has been conducted and reported. In order to attract more attentions on 3D mask face PAD, this book chapter summarizes the progress in the past few years, as well as publicly available datasets. Finally, some open problems in 3D mask attack are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.thatsmyface.com.

  2. 2.

    http://www.morpho.com.

References

  1. Galbally J, Marcel S, Fierrez J (2014) Biometric antispoofing methods: a survey in face recognition. IEEE Access 2:1530–1552

    Article  Google Scholar 

  2. Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process Mag 32(5):20–30

    Article  Google Scholar 

  3. Rattani A, Poh N, Ross A (2012) Analysis of user-specific score characteristics for spoof biometric attacks. In: CVPRW

    Google Scholar 

  4. Evans NW, Kinnunen T, Yamagishi J (2013) Spoofing and countermeasures for automatic speaker verification. In: Interspeech, pp 925–929

    Google Scholar 

  5. Pavlidis I, Symosek P (2000) The imaging issue in an automatic face/disguise detection system. In: Computer vision beyond the visible spectrum: methods and applications

    Google Scholar 

  6. Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: Computer vision–ECCV, pp 504–517

    Google Scholar 

  7. Määttä J, Hadid A, Pietikäinen M (2011) Face spoofing detection from single images using micro-texture analysis. In: IJCB

    Google Scholar 

  8. Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: International joint conference on biometrics (IJCB), pp 1–7

    Google Scholar 

  9. Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: International conference on biometrics (ICB), pp 26–31

    Google Scholar 

  10. Pan G, Sun L, Wu Z, Lao S (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: ICCV

    Google Scholar 

  11. de Freitas Pereira T, Komulainen J, Anjos A, De Martino JM, Hadid A, Pietikäinen M, Marcel S (2014) Face liveness detection using dynamic texture. EURASIP J Image Video Process 2014(1):1–15

    Google Scholar 

  12. Kose N, Dugelay JL (2014) Mask spoofing in face recognition and countermeasures. Image Vis Comput 32(10):779–789

    Article  Google Scholar 

  13. Yi D, Lei Z, Zhang Z, Li SZ (2014) Face anti-spoofing: multi-spectral approach. Handbook of biometric anti-spoofing. Springer, Berlin, pp 83–102

    Google Scholar 

  14. Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724

    Article  MathSciNet  Google Scholar 

  15. Kose N, Dugelay JL (2013) Shape and texture based countermeasure to protect face recognition systems against mask attacks. In: CVPRW

    Google Scholar 

  16. Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761

    Article  Google Scholar 

  17. Erdogmus N, Marcel S (2014) Spoofing face recognition with 3D masks. IEEE Trans Inf Forensics Secur 9(7):1084–1097

    Article  Google Scholar 

  18. Wallace R, McLaren M, McCool C, Marcel S (2011) Inter-session variability modelling and joint factor analysis for face authentication. In: IJCB

    Google Scholar 

  19. Liu S, Yuen PC, Zhang S, Zhao G (2016) 3d mask face anti-spoofing with remote photoplethysmography. In: ECCV

    Google Scholar 

  20. Erdogmus N, Marcel S (2013) Spoofing in 2d face recognition with 3d masks and anti-spoofing with kinect. In: BTAS

    Google Scholar 

  21. Liu S, Yang B, Yuen PC, Zhao G (2016) A 3D mask face anti-spoofing database with real world variations. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 100–106

    Google Scholar 

  22. Manjani I, Tariyal S, Vatsa M, Singh R, Majumdar A (2017) Detecting silicone mask based presentation attack via deep dictionary learning. In: TIFS

    Google Scholar 

  23. Agarwal A, Yadav D, Kohli N, Singh R, Vatsa M, Noore A (2017) Face presentation attack with latex masks in multispectral videos. SMAD 13:130

    Google Scholar 

  24. Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. IEEE Trans Inf Forensics Secur 11(8):1818–1830

    Article  Google Scholar 

  25. de Freitas Pereira T, Anjos A, De Martino JM, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: International conference on biometrics (ICB), pp 1–8

    Google Scholar 

  26. Agarwal A, Singh R, Vatsa M (2016) Face anti-spoofing using Haralick features. In: BTAS

    Google Scholar 

  27. Haralick RM, Shanmugam K et al (1973) Textural features for image classification. IEEE Trans Syst Man Cybern 1(6):610–621

    Article  Google Scholar 

  28. Cohen-Steiner D, Morvan JM (2003) Restricted delaunay triangulations and normal cycle. In: Proceedings of the nineteenth annual symposium on computational geometry, pp 312–321

    Google Scholar 

  29. Tang Y, Chen L (2017) 3d facial geometric attributes based anti-spoofing approach against mask attacks. In: FG

    Google Scholar 

  30. Menotti D, Chiachia G, Pinto A, Schwartz WR, Pedrini H, Falcão AX, Rocha A (2015) Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans Inf Forensics Secur 10(4):864–879

    Article  Google Scholar 

  31. Yang J, Lei Z, Li SZ (2014) Learn convolutional neural network for face anti-spoofing. arXiv:1408.5601

  32. Tariyal S, Majumdar A, Singh R, Vatsa M (2016) Deep dictionary learning. IEEE Access 4:10096–10109

    Article  Google Scholar 

  33. Chaudhry R, Ravichandran A, Hager G, Vidal R (2009) Histograms of oriented optical flow and Binet-Cauchy kernels on nonlinear dynamical systems for the recognition of human actions. In: CVPR

    Google Scholar 

  34. Siddiqui TA, Bharadwaj S, Dhamecha TI, Agarwal A, Vatsa M, Singh R, Ratha N (2016) Face anti-spoofing with multifeature videolet aggregation. In: ICPR

    Google Scholar 

  35. Rui Shao XL, Yuen PC (2017) Deep convolutional dynamic texture learning with adaptive channel-discriminability for 3d mask face anti-spoofing. In: IJCB

    Google Scholar 

  36. Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. CoRR. arXiv:1409.1556

  37. Barron JL, Fleet DJ, Beauchemin SS (1994) Performance of optical flow techniques. Int J Comput Vis

    Google Scholar 

  38. Li X, Komulainen J, Zhao G, Yuen PC, Pietikäinen M (2016) Generalized face anti-spoofing by detecting pulse from face videos. In: 23rd international conference on pattern recognition (ICPR). IEEE, pp 4244–4249

    Google Scholar 

  39. Shelley K, Shelley S (2001) Pulse oximeter waveform: photoelectric plethysmography. In: Lake C, Hines R, Blitt C (eds) Clinical monitoring. WB Saunders Company, Philadelphia, pp 420–428

    Google Scholar 

  40. Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. In: CVPR

    Google Scholar 

Download references

Acknowledgements

This project is partially supported by Hong Kong RGC General Research Fund HKBU 12201215, Academy of Finland and FiDiPro program of Tekes (project number: 1849/31/2015).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pong C. Yuen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Liu, SQ., Yuen, P.C., Li, X., Zhao, G. (2019). Recent Progress on Face Presentation Attack Detection of 3D Mask Attacks. In: Marcel, S., Nixon, M., Fierrez, J., Evans, N. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-319-92627-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92627-8_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92626-1

  • Online ISBN: 978-3-319-92627-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics