Person-specific Face Spoofing Detection for Replay Attack Based on Gaze Estimation

Author(s):  
Lijun Cai ◽  
Lei Huang ◽  
Changping Liu

The wide scale use of facial recognition systems has caused concerns about spoofing attacks. Security is essential requirement for a face recognition system to provide reliable protection against spoofing attacks. Spoofing happens in situations where someone tries to behave as an authorized user to obtain illicitly access the protected system to gain advantage over it. In order to identify spoofing attacks, face spoofing detection approaches have been used. Traditional face spoofing detection techniques are not good enough as most of them focus only on the gray scale information and discarding the color information. Here a face spoofing detection approach with color texture and edge analysis is presented. The approach for investigating the texture of input images, Local binary pattern and Edge Histogram descriptor are proposed. Experiments on a publicly available dataset, Replay attack, showed excellent results compared to existing works.


2020 ◽  
Vol 8 (5) ◽  
pp. 3309-3314

Nowadays, face biometric-based access control systems are becoming ubiquitous in daily life while they are still vulnerable to spoofing attacks. Developing robust and reliable methods to prevent such frauds is unavoidable. As deep learning techniques have achieved satisfactory performances in computer vision, they have also been applied to face spoofing detection. However, the numerous parameters in these deep learning-based detection methods cannot be updated to optimum due to limited data. In this paper,a highly accurate face spoof detection system using multiple features and deep learning is proposed. The input video is broken into frames using content-based frame extraction. From each frame, the face of the person is cropped.From the cropped images multiple features like Histogram of Gradients (HoG), Local Binary Pattern (LBP), Center Symmetric LBP (CSLBP), and Gray level co-occurrence Matrix (GLCM) are extracted to train the Convolutional Neural Network(CNN). Training and testing are performed separately by using collected sample data.Experiments on the standard spoof database called Replay-Attack database the proposed system outperform other state-of-the-art techniques, presenting great results in terms of attack detection.


2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Sajad Einy ◽  
Cemil Oz ◽  
Yahya Dorostkar Navaei

A face-based authentication system has become an important topic in various fields of IoT applications such as identity validation for social care, crime detection, ATM access, computer security, etc. However, these authentication systems are vulnerable to different attacks. Presentation attacks have become a clear threat for facial biometric-based authentication and security applications. To address this issue, we proposed a deep learning approach for face spoofing detection systems in IoT cloud-based environment. The deep learning approach extracted features from multicolor space to obtain more information from the input face image regarding luminance and chrominance data. These features are combined and selected by the Minimum Redundancy Maximum Relevance (mRMR) algorithm to provide an efficient and discriminate feature set. Finally, the extracted deep color-based features of the face image are used for face spoofing detection in a cloud environment. The proposed method achieves stable results with less training data compared to conventional deep learning methods. This advantage of the proposed approach reduces the time of processing in the training phase and optimizes resource management in storing training data on the cloud. The proposed system was tested and evaluated based on two challenging public access face spoofing databases, namely, Replay-Attack and ROSE-Youtu. The experimental results based on these databases showed that the proposed method achieved satisfactory results compared to the state-of-the-art methods based on an equal error rate (EER) of 0.2% and 3.8%, respectively, for the Replay-Attack and ROSE-Youtu databases.


Author(s):  
Jukka Komulainen ◽  
Abdenour Hadid ◽  
Matti Pietikäinen

2017 ◽  
Vol 2017 (13) ◽  
pp. 105-108
Author(s):  
Yao-Hong Tsai ◽  
Yu-Jung Lin

Sign in / Sign up

Export Citation Format

Share Document