Efficient live face detection to counter spoof attack in face recognition systems

被引:1
|
作者
Biswas, Bikram Kumar [1 ]
Alam, Mohammad S. [1 ]
机构
[1] Univ S Alabama, Dept Elect & Comp Engn, Mobile, AL 36688 USA
来源
关键词
Biometric Tools; Liveness Detection; Face Recognition; Spoof Attack; Joint Transform Correlator; COLOR;
D O I
10.1117/12.2177975
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Face recognition is a critical tool used in almost all major biometrics based security systems. But recognition, authentication and liveness detection of the face of an actual user is a major challenge because an imposter or a non-live face of the actual user can be used to spoof the security system. In this paper, a robust technique is proposed which detects liveness of faces in order to counter spoof attacks. The proposed technique uses a three-dimensional (3D) fast Fourier transform (FFT) to compare spectral energies of a live face and a fake face in a mathematically selective manner. The mathematical model involves evaluation of energies of selective high frequency bands of average power spectra of both live and non-live faces. It also carries out proper recognition and authentication of the face of the actual user using the fringe-adjusted joint transform correlation technique, which has been found to yield the highest correlation output for a match. Experimental tests using real life datasets show that the proposed technique yields excellent results for identifying live faces.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Face Spoof Attack Recognition Using Discriminative Image Patches
    Akhtar, Zahid
    Foresti, Gian Luca
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016
  • [2] FACE LIVENESS DETECTION FOR COMBATING THE SPOOFING ATTACK IN FACE RECOGNITION
    Peng, Junyan
    Chan, Patrick P. K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION (ICWAPR), 2014, : 176 - 181
  • [3] Designing Efficient Spoof Detection Scheme for Face Biometric
    Eskandari, Maryam
    Sharifi, Omid
    [J]. IMAGE AND SIGNAL PROCESSING (ICISP 2018), 2018, 10884 : 427 - 434
  • [4] Custom silicone Face Masks: Vulnerability of Commercial Face Recognition Systems & Presentation Attack Detection
    Ramachandra, Raghavendra
    Venkatesh, Sushma
    Raja, Kiran B.
    Bhattacharjee, Sushil
    Wasnik, Pankaj
    Marcel, Sebastien
    Busch, Christoph
    [J]. 2019 7TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS (IWBF), 2019,
  • [5] Real masks and spoof faces: On the masked face presentation attack detection
    Fang, Meiling
    Damer, Naser
    Kirchbuchner, Florian
    Kuijper, Arjan
    [J]. PATTERN RECOGNITION, 2022, 123
  • [6] Face Spoof Attack Detection with Hypergraph Capsule Convolutional Neural Networks
    Liang, Yuxin
    Hong, Chaoqun
    Zhuang, Weiwei
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2021, 14 (01) : 1396 - 1402
  • [7] Federated Multitask Learning with Manifold Regularization for Face Spoof Attack Detection
    Chen, Yingyue
    Chen, Liang
    Hong, Chaoqun
    Wang, Xiaodong
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [8] Federated Multitask Learning with Manifold Regularization for Face Spoof Attack Detection
    Chen, Yingyue
    Chen, Liang
    Hong, Chaoqun
    Wang, Xiaodong
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [9] Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey
    Ramachandra, Raghavendra
    Busch, Christoph
    [J]. ACM COMPUTING SURVEYS, 2017, 50 (01)
  • [10] A few approaches to face detection in face recognition systems
    Koukharev, G
    Ponikowski, T
    Chen, L
    [J]. ADVANCED COMPUTER SYSTEMS, PROCEEDINGS, 2002, 664 : 313 - 322