Skip to main content

Abstract

In recent years, convolutional neural network (CNN) has achieved satisfactory performance in computer vision and pattern recognition. When we visualize the convolutional responses, we can conclude that the convolutional responses include some diacritically structural information. But for the high dimensionality of them, it is not feasible to directly use the responses to detect fake faces. Moreover, the small size of existing face anti-spoofing databases leads to the difficulty of training a new CNN model. Compared with deep learning, the traditional handcrafted features, such as local binary pattern (LBP), have been successfully used in face anti-spoofing and achieved good detection results. So in our work, we extracted the handcrafted features from the convolutional responses of the fine-tuned CNN model. More specifically, the CNN is first fine-tuned based on a pre-trained VGG-face model. Then, the LBP features are calculated from the convolutional responses and concatenated into one feature vector. After that, the final vectors are fed into a support vector machine (SVM) classifier to detect the fake faces. Validated on two public available databases, Replay-Attack and CASIA-FA, our proposed detection method can obtain promising results compared to the state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.idiap.ch/dataset/replayattack/download-proc

  2. 2.

    http://www.cbsr.ia.ac.cn/english/FaceAntiSpoofDatabases.asp

References

  1. Y. Li, K. Xu, Q. Yan, Y. Li, R.H. Deng, Proceedings of Acm Sigsac Symposium on Information Computer and Communications Security (2014)

    Google Scholar 

  2. L. Li, X. Feng, X. Jiang, Z. Xia, A. Hadid, in IEEE International Conference on Image Processing (ICIP) (2017), pp. 101–105. DOI 10.1109/ICIP.2017.8296251

    Google Scholar 

  3. L. Li, X. Feng, Z. Boulkenafet, Z. Xia, M. Li, A. Hadid, in 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA) (2016), pp. 1–6. DOI 10.1109/IPTA.2016.7821013

    Google Scholar 

  4. Z. Boulkenafet, J. Komulainen, A. Hadid, in Image Processing (ICIP), 2015 IEEE International Conference on (2015), pp. 2636–2640. DOI 10.1109/ICIP.2015.7351280

    Google Scholar 

  5. D. Wen, H. Han, A.K. Jain, IEEE Transactions on Information Forensics and Security 10(4), 746 (2015)

    Article  Google Scholar 

  6. J. Maatta, A. Hadid, M. Pietikainen, in International Joint Conference on Biometrics (2011), pp. 1–7

    Google Scholar 

  7. I. Chingovska, A. Anjos, S. Marcel, in IEEE International Conference of the Biometrics Special Interest Group (2012), pp. 1–7

    Google Scholar 

  8. Z. Boulkenafet, J. Komulainen, A. Hadid, IEEE Transactions on Information Forensics and Security 11(8), 1 (2016)

    Article  Google Scholar 

  9. J. Yang, Z. Lei, S.Z. Li, Eprint Arxiv 9218, 373 (2014)

    Google Scholar 

  10. D. Menotti, G. Chiachia, A. Pinto, W. Robson Schwartz, H. Pedrini, A. Xavier Falcao, A. Rocha, Computer Science 10, 864 (2014)

    Google Scholar 

  11. A. Krizhevsky, I. Sutskever, G.E. Hinton, Advances in Neural Information Processing Systems 25(2), 2012 (2012)

    Google Scholar 

  12. A. Anjos, S. Marcel, in Biometrics, International Joint Conference on (2011), pp. 1–7

    Google Scholar 

  13. T.D.F. Pereira, A. Anjos, J.M.D. Martino, S. Marcel, in Proceedings of the 11th international conference on Computer Vision - Volume Part I (2012), pp. 121–132

    Google Scholar 

  14. K. Kollreider, H. Fronthaler, J. Bigun, Image and Vision Computing 27(3), 233 (2009)

    Article  Google Scholar 

  15. M.M. Chakka, A. Anjos, S. Marcel, R. Tronci, in Proceedings of the 2011 International Joint Conference on Biometrics (2011), pp. 1–6

    Google Scholar 

  16. Z. Zhang, J. Yan, S. Liu, Z. Lei, in Biometrics (ICB), 2012 5th IAPR International Conference on (2012), pp. 26–31

    Google Scholar 

  17. J. Peng, P.P.K. Chan, in Wavelet Analysis and Pattern Recognition (ICWAPR), 2014 International Conference on (2014), pp. 176–181. DOI 10.1109/ICWAPR.2014.6961311

    Google Scholar 

  18. J. Galbally, S. Marcel, in International Conference on Pattern Recognition (ICPR) (2014), pp. 1173–1178. DOI 10.1109/ICPR.2014.211

    Google Scholar 

  19. Z. Zhang, D. Yi, Z. Lei, S.Z. Li, in IEEE International Conference on Automatic Face and Gesture Recognition and Workshops (2011), pp. 436–441

    Google Scholar 

  20. G. Chetty, 23(3), 1 (2010)

    Google Scholar 

  21. T. Wang, J. Yang, Z. Lei, S. Liao, in International Conference on Biometrics (2013), pp. 1–6

    Google Scholar 

  22. Z. Akhtar, C. Michelon, G.L. Foresti, in Security Technology (ICCST), 2014 International Carnahan Conference on (2014), pp. 6695–6695

    Google Scholar 

  23. Z. Akhtar, C. Micheloni, C. Piciarelli, G.L. Foresti, in Advanced Video and Signal Based Surveillance (AVSS), 2014 11th IEEE International Conference on (2014), pp. 187–192. DOI 10.1109/AVSS.2014.6918666

    Google Scholar 

  24. D. Menotti, G. Chiachia, A. Pinto, W. Robson Schwartz, H. Pedrini, A. Xavier Falcao, A. Rocha, Information Forensics and Security, IEEE Transactions on 10(4), 864 (2015)

    Google Scholar 

  25. O.M. Parkhi, A. Vedaldi, A. Zisserman, in British Machine Vision Conference (2015)

    Google Scholar 

  26. R. Lukac, K.N. Plataniotis, Color image processing: methods and applications (CRC, Taylor and Francis, 2007)

    Google Scholar 

  27. T. Ojala, M. Pietikainen, T. Maenpaa, IEEE Transactions on Pattern Analysis and Machine Intelligence 24(7), 971 (2002)

    Article  Google Scholar 

  28. R.E. Fan, K.W. Chang, C.J. Hsieh, X.R. Wang, C.J. Lin, Journal of Machine Learning Research 9(12), 1871 (2010)

    Google Scholar 

  29. I. Chingovska, A. Anjos, S. Marcel, in International Conference of the Biometrics Special Interest Group (BIOSIG) (2012), pp. 1–7

    Google Scholar 

  30. Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, S. Li, in International Conference on Biometrics (ICB) (2012), pp. 26–31

    Google Scholar 

  31. T. de Freitas Pereira, A. Anjos, J. De Martino, S. Marcel, in International Conference on Biometrics (ICB) (2013), pp. 1–8

    Google Scholar 

  32. J. Yang, Z. Lei, S. Liao, S. Li, in Biometrics (ICB), 2013 International Conference on (2013), pp. 1–6

    Google Scholar 

  33. J. Komulainen, A. Hadid, M. Pietikainen, A. Anjos, S. Marcel, in International Conference on Biometrics (ICB) (2013), pp. 1–7. DOI 10.1109/ICB.2013.6612968

    Google Scholar 

  34. A. Pinto, H. Pedrini, W.R. Schwartz, A. Rocha, IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society 24(12), 4726 (2015)

    Article  Google Scholar 

  35. S. Tirunagari, N. Poh, D. Windridge, A. Iorliam, N. Suki, A.T.S. Ho, IEEE Transactions on Information Forensics and Security 10(4), 762 (2015)

    Article  Google Scholar 

  36. Z. Boulkenafet, J. Komulainen, A. Hadid, in IEEE International Conference on Image Processing (ICIP2015) (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoyi Feng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Cite this chapter

Li, L., Feng, X. (2019). Face Anti-spoofing via Deep Local Binary Pattern. In: Jiang, X., Hadid, A., Pang, Y., Granger, E., Feng, X. (eds) Deep Learning in Object Detection and Recognition. Springer, Singapore. https://doi.org/10.1007/978-981-10-5152-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5152-4_4

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5151-7

  • Online ISBN: 978-981-10-5152-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics