Abstract
In recent years, convolutional neural network (CNN) has achieved satisfactory performance in computer vision and pattern recognition. When we visualize the convolutional responses, we can conclude that the convolutional responses include some diacritically structural information. But for the high dimensionality of them, it is not feasible to directly use the responses to detect fake faces. Moreover, the small size of existing face anti-spoofing databases leads to the difficulty of training a new CNN model. Compared with deep learning, the traditional handcrafted features, such as local binary pattern (LBP), have been successfully used in face anti-spoofing and achieved good detection results. So in our work, we extracted the handcrafted features from the convolutional responses of the fine-tuned CNN model. More specifically, the CNN is first fine-tuned based on a pre-trained VGG-face model. Then, the LBP features are calculated from the convolutional responses and concatenated into one feature vector. After that, the final vectors are fed into a support vector machine (SVM) classifier to detect the fake faces. Validated on two public available databases, Replay-Attack and CASIA-FA, our proposed detection method can obtain promising results compared to the state-of-the-art methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Y. Li, K. Xu, Q. Yan, Y. Li, R.H. Deng, Proceedings of Acm Sigsac Symposium on Information Computer and Communications Security (2014)
L. Li, X. Feng, X. Jiang, Z. Xia, A. Hadid, in IEEE International Conference on Image Processing (ICIP) (2017), pp. 101–105. DOI 10.1109/ICIP.2017.8296251
L. Li, X. Feng, Z. Boulkenafet, Z. Xia, M. Li, A. Hadid, in 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA) (2016), pp. 1–6. DOI 10.1109/IPTA.2016.7821013
Z. Boulkenafet, J. Komulainen, A. Hadid, in Image Processing (ICIP), 2015 IEEE International Conference on (2015), pp. 2636–2640. DOI 10.1109/ICIP.2015.7351280
D. Wen, H. Han, A.K. Jain, IEEE Transactions on Information Forensics and Security 10(4), 746 (2015)
J. Maatta, A. Hadid, M. Pietikainen, in International Joint Conference on Biometrics (2011), pp. 1–7
I. Chingovska, A. Anjos, S. Marcel, in IEEE International Conference of the Biometrics Special Interest Group (2012), pp. 1–7
Z. Boulkenafet, J. Komulainen, A. Hadid, IEEE Transactions on Information Forensics and Security 11(8), 1 (2016)
J. Yang, Z. Lei, S.Z. Li, Eprint Arxiv 9218, 373 (2014)
D. Menotti, G. Chiachia, A. Pinto, W. Robson Schwartz, H. Pedrini, A. Xavier Falcao, A. Rocha, Computer Science 10, 864 (2014)
A. Krizhevsky, I. Sutskever, G.E. Hinton, Advances in Neural Information Processing Systems 25(2), 2012 (2012)
A. Anjos, S. Marcel, in Biometrics, International Joint Conference on (2011), pp. 1–7
T.D.F. Pereira, A. Anjos, J.M.D. Martino, S. Marcel, in Proceedings of the 11th international conference on Computer Vision - Volume Part I (2012), pp. 121–132
K. Kollreider, H. Fronthaler, J. Bigun, Image and Vision Computing 27(3), 233 (2009)
M.M. Chakka, A. Anjos, S. Marcel, R. Tronci, in Proceedings of the 2011 International Joint Conference on Biometrics (2011), pp. 1–6
Z. Zhang, J. Yan, S. Liu, Z. Lei, in Biometrics (ICB), 2012 5th IAPR International Conference on (2012), pp. 26–31
J. Peng, P.P.K. Chan, in Wavelet Analysis and Pattern Recognition (ICWAPR), 2014 International Conference on (2014), pp. 176–181. DOI 10.1109/ICWAPR.2014.6961311
J. Galbally, S. Marcel, in International Conference on Pattern Recognition (ICPR) (2014), pp. 1173–1178. DOI 10.1109/ICPR.2014.211
Z. Zhang, D. Yi, Z. Lei, S.Z. Li, in IEEE International Conference on Automatic Face and Gesture Recognition and Workshops (2011), pp. 436–441
G. Chetty, 23(3), 1 (2010)
T. Wang, J. Yang, Z. Lei, S. Liao, in International Conference on Biometrics (2013), pp. 1–6
Z. Akhtar, C. Michelon, G.L. Foresti, in Security Technology (ICCST), 2014 International Carnahan Conference on (2014), pp. 6695–6695
Z. Akhtar, C. Micheloni, C. Piciarelli, G.L. Foresti, in Advanced Video and Signal Based Surveillance (AVSS), 2014 11th IEEE International Conference on (2014), pp. 187–192. DOI 10.1109/AVSS.2014.6918666
D. Menotti, G. Chiachia, A. Pinto, W. Robson Schwartz, H. Pedrini, A. Xavier Falcao, A. Rocha, Information Forensics and Security, IEEE Transactions on 10(4), 864 (2015)
O.M. Parkhi, A. Vedaldi, A. Zisserman, in British Machine Vision Conference (2015)
R. Lukac, K.N. Plataniotis, Color image processing: methods and applications (CRC, Taylor and Francis, 2007)
T. Ojala, M. Pietikainen, T. Maenpaa, IEEE Transactions on Pattern Analysis and Machine Intelligence 24(7), 971 (2002)
R.E. Fan, K.W. Chang, C.J. Hsieh, X.R. Wang, C.J. Lin, Journal of Machine Learning Research 9(12), 1871 (2010)
I. Chingovska, A. Anjos, S. Marcel, in International Conference of the Biometrics Special Interest Group (BIOSIG) (2012), pp. 1–7
Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, S. Li, in International Conference on Biometrics (ICB) (2012), pp. 26–31
T. de Freitas Pereira, A. Anjos, J. De Martino, S. Marcel, in International Conference on Biometrics (ICB) (2013), pp. 1–8
J. Yang, Z. Lei, S. Liao, S. Li, in Biometrics (ICB), 2013 International Conference on (2013), pp. 1–6
J. Komulainen, A. Hadid, M. Pietikainen, A. Anjos, S. Marcel, in International Conference on Biometrics (ICB) (2013), pp. 1–7. DOI 10.1109/ICB.2013.6612968
A. Pinto, H. Pedrini, W.R. Schwartz, A. Rocha, IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society 24(12), 4726 (2015)
S. Tirunagari, N. Poh, D. Windridge, A. Iorliam, N. Suki, A.T.S. Ho, IEEE Transactions on Information Forensics and Security 10(4), 762 (2015)
Z. Boulkenafet, J. Komulainen, A. Hadid, in IEEE International Conference on Image Processing (ICIP2015) (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Li, L., Feng, X. (2019). Face Anti-spoofing via Deep Local Binary Pattern. In: Jiang, X., Hadid, A., Pang, Y., Granger, E., Feng, X. (eds) Deep Learning in Object Detection and Recognition. Springer, Singapore. https://doi.org/10.1007/978-981-10-5152-4_4
Download citation
DOI: https://doi.org/10.1007/978-981-10-5152-4_4
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5151-7
Online ISBN: 978-981-10-5152-4
eBook Packages: Computer ScienceComputer Science (R0)