scispace - formally typeset
Proceedings ArticleDOI

Face anti-spoofing with multifeature videolet aggregation

TLDR
A novel multi-feature evidence aggregation method for face spoofing detection that fuses evidence from features encoding of both texture and motion properties in the face and also the surrounding scene regions and provides robustness to different attacks.
Abstract
Biometric systems can be attacked in several ways and the most common being spoofing the input sensor. Therefore, anti-spoofing is one of the most essential prerequisite against attacks on biometric systems. For face recognition it is even more vulnerable as the image capture is non-contact based. Several anti-spoofing methods have been proposed in the literature for both contact and non-contact based biometric modalities often using video to study the temporal characteristics of a real vs. spoofed biometric signal. This paper presents a novel multi-feature evidence aggregation method for face spoofing detection. The proposed method fuses evidence from features encoding of both texture and motion (liveness) properties in the face and also the surrounding scene regions. The feature extraction algorithms are based on a configuration of local binary pattern and motion estimation using histogram of oriented optical flow. Furthermore, the multi-feature windowed videolet aggregation of these orthogonal features coupled with support vector machine-based classification provides robustness to different attacks. We demonstrate the efficacy of the proposed approach by evaluating on three standard public databases: CASIA-FASD, 3DMAD and MSU-MFSD with equal error rate of 3.14%, 0%, and 0%, respectively.

read more

Citations
More filters
Book ChapterDOI

Recent Progress on Face Presentation Attack Detection of 3D Mask Attack

Thomas Moritz
TL;DR: Wang et al. as discussed by the authors summarized the progress in the past few years, as well as publicly available datasets, and discussed open problems and possible future directions for 3D mask face PAD.
Posted Content

More than just an auxiliary loss: Anti-spoofing Backbone Training via Adversarial Pseudo-depth Generation

TL;DR: In this article, the authors explore and highlight the impact of using pseudo-depth to pre-train a network that will be used as the backbone to the final classifier for anti-spoofing.
Journal ArticleDOI

PDVN: A Patch-based Dual-view Network for Face Liveness Detection using Light Field Focal Stack

TL;DR: Wang et al. as mentioned in this paper proposed a patch-based dual-view network (PDVN) to leverage the merits of light field focal stack (LFFS) for face presentation attack detection.
References
More filters
Journal ArticleDOI

Dynamic Texture Recognition Using Local Binary Patterns with an Application to Facial Expressions

TL;DR: A novel approach for recognizing DTs is proposed and its simplifications and extensions to facial image analysis are also considered and both the VLBP and LBP-TOP clearly outperformed the earlier approaches.
Journal ArticleDOI

Enhancing security and privacy in biometrics-based authentication systems

TL;DR: The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.

Beyond pixels: exploring new representations and applications for motion analysis

TL;DR: This thesis builds a human-assisted motion annotation system to obtain ground-truth motion, missing in the literature, for natural video sequences, and proposes SIFT flow, a new framework for image parsing by transferring the metadata information from the images in a large database to an unknown query image.
Journal ArticleDOI

Face Spoof Detection With Image Distortion Analysis

TL;DR: An efficient and rather robust face spoof detection algorithm based on image distortion analysis (IDA) that outperforms the state-of-the-art methods in spoof detection and highlights the difficulty in separating genuine and spoof faces, especially in cross-database and cross-device scenarios.
Proceedings Article

On the effectiveness of local binary patterns in face anti-spoofing

TL;DR: This paper inspects the potential of texture features based on Local Binary Patterns (LBP) and their variations on three types of attacks: printed photographs, and photos and videos displayed on electronic screens of different sizes and concludes that LBP show moderate discriminability when confronted with a wide set of attack types.
Related Papers (5)