Skip to main content

Hierarchical Interpolation of Imagenet Features for Cross-Dataset Presentation Attack Detection

  • Conference paper
  • First Online:
Intelligent Technologies and Applications (INTAP 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1382))

Included in the following conference series:

  • 551 Accesses

Abstract

Face Recognition Systems (FRS) are vulnerable to spoofing attacks (a.k.a presentation attacks), which can be carried out by presenting a printed photo (print-photo), displaying a photo (display-photo), or displaying a video (replay-video). The issue of presentation attacks can be alleviated by algorithms known as presentation attack detection (PAD) mechanisms. In this paper, we propose a novel framework based on Hierarchical Cosine/Spherical Linear Interpolation of deep learning feature vectors followed by training a Linear SVM for PAD Classification. The deep learning feature vectors are extracted from existing networks trained on the Imagenet dataset. Our proposed approach hierarchically interpolates the extracted feature vectors using Cosine/Spherically Linear Interpolation, followed by using a Linear SVM for classification, and sum-rule fusion for generating final scores. We show our results on cross-dataset PAD for the classifier trained on OULU P1 Dataset and tested on Replay Mobile Dataset. We compare it with the current state-of-the-art (SOTA) algorithms published in the literature and achieve considerably lower detection error-rate (D-EER). The extraction of features from pre-trained networks makes our approach simple to use, apart from it, giving highly accurate results, which are much better than current SOTA.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Apple Face ID (2017). https://en.wikipedia.org/wiki/Face_ID. Accessed May 2020

  2. Costa-Pazo, A., Bhattacharjee, S., Vazquez-Fernandez, E., Marcel, S.: The replay-mobile face presentation-attack database. In: International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–7, September 2016. https://doi.org/10.1109/BIOSIG.2016.7736936

  3. Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248–255. IEEE (2009)

    Google Scholar 

  4. Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2019

    Google Scholar 

  5. George, A., Marcel, S.: Deep pixel-wise binary supervision for face presentation attack detection. In: 2019 International Conference on Biometrics, ICB 2019, Crete, Greece, pp. 1–8, 4–7 June 2019. IEEE (2019). https://doi.org/10.1109/ICB45273.2019.8987370

  6. Huang, G., Liu, Z., Van Der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700–4708 (2017)

    Google Scholar 

  7. ISO/IEC JTC1 SC37 Biometrics: ISO/IEC IS 30107–3. Information Technology - Biometric presentation attack detection - Part 3: Testing and Reporting. International Organization for Standardization (2017)

    Google Scholar 

  8. JV Chamary: How Face ID works on iPhone X (2017). https://www.forbes.com/sites/jvchamary/2017/09/16/how-face-id-works-apple-iphone-x/. Accessed May 2020

  9. Liu, Y., Stehouwer, J., Jourabloo, A., Atoum, Y., Liu, X.: Presentation attack detection for face in mobile phones. In: Rattani, A., Derakhshani, R., Ross, A. (eds.) Selfie Biometrics. ACVPR, pp. 171–196. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26972-2_8

    Chapter  Google Scholar 

  10. Marcel, S., Nixon, M.S., Li, S.Z.: Handbook of Biometric Anti-Spoofing: Trusted Biometrics Under Spoofing Attacks. Springer, New York (2014). https://doi.org/10.1007/978-1-4471-6524-8. Incorporated

    Book  Google Scholar 

  11. Mohammadi, A., Bhattacharjee, S., Marcel, S.: Improving cross-dataset performance of face presentation attack detection systems using face recognition datasets. In: 45th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2020), p. 125 (2020)

    Google Scholar 

  12. Raghavendra, R., Busch, C.: Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput. Surv. (CSUR) 50(1), 1–37 (2017)

    Article  Google Scholar 

  13. Raghavendra, R., Raja, K.B., Busch, C.: Presentation attack detection for face recognition using light field camera. IEEE Trans. Image Process. 24(3), 1060–1075 (2015)

    Article  MathSciNet  Google Scholar 

  14. Ramachandra, R., Singh, J.M., Venkatesh, S., Raja, K., Busch, C.: Face presentation attack detection using multi-classifier fusion of off-the-shelf deep features. In: Nain, N., Vipparthi, S.K., Raman, B. (eds.) CVIP 2019. CCIS, vol. 1148, pp. 49–61. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-4018-9_5

    Chapter  Google Scholar 

  15. Raghavendra, R., et al.: Smartphone multi-modal biometric authentication: Database and evaluation. arXiv preprint arXiv:1912.02487 (2019)

  16. Raghavendra, R., Ashok, R., Kumar, G.H.: Multimodal biometric score fusion using gaussian mixture model and Monte Carlo method. J. Comput. Sci. Technol. 25(4), 771–782 (2010). https://doi.org/10.1007/s11390-010-9364-7

    Article  Google Scholar 

  17. Ross, A., Poh, N.: Multibiometric systems: overview, case studies, and open issues. In: Tistarelli, M., Li, S.Z., Chellappa, R. (eds.) Handbook of Remote Biometrics. Advances in Pattern Recognition. Springer, London (2009). https://doi.org/10.1007/978-1-84882-385-3_11

  18. Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815–823 (2015)

    Google Scholar 

  19. Shoemake, K.: Animating rotation with quaternion curves. In: Proceedings of the 12th Annual Conference on Computer Graphics and Interactive Techniques, pp. 245–254 (1985)

    Google Scholar 

  20. Vishi, K., Mavroeidis, V.: An evaluation of score level fusion approaches for fingerprint and finger-vein biometrics. arXiv preprint arXiv:1805.10666 (2018)

  21. Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.Z.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 26–31. IEEE (2012)

    Google Scholar 

  22. Zinelabidine, B., Jukka, K., Li, L., Feng, X., Hadid, A.: OULU-NPU: a mobile face presentation attack database with real-world variations. In: IEEE International Conference on Automatic Face & Gesture Recognition (AFGR), pp. 1–7. IEEE (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jag Mohan Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, J.M., Ramachandra, R., Busch, C. (2021). Hierarchical Interpolation of Imagenet Features for Cross-Dataset Presentation Attack Detection. In: Yildirim Yayilgan, S., Bajwa, I.S., Sanfilippo, F. (eds) Intelligent Technologies and Applications. INTAP 2020. Communications in Computer and Information Science, vol 1382. Springer, Cham. https://doi.org/10.1007/978-3-030-71711-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-71711-7_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-71710-0

  • Online ISBN: 978-3-030-71711-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics