Skip to main content

Real-Time Multiclass Face Spoofing Recognition Through Spatiotemporal Convolutional 3D Features

  • Conference paper
  • First Online:
Image Analysis and Processing - ICIAP 2023 Workshops (ICIAP 2023)

Abstract

Face recognition is used in numerous authentication applications, unfortunately they are susceptible to spoofing attacks such as paper and screen attacks. In this paper, we propose a method that is able to recognise if a face detected in a video is not real and the type of attack performed on the fake video. We propose to learn the temporal features exploiting a 3D Convolution Network that is more suitable for temporal information. The 3D ConvNet, other than summarizing temporal information, allows us to build a real-time method since it is so much more efficient to analyse clips instead of analyzing single frames. The learned features are classified using a binary classifier to distinguish if the person in the clip video is real (i.e. live) or not, multi class classifier recognises if the person is real or the type of attack (screen, paper, ect.). We performed our test on 5 public datasets: Replay Attack, Replay Mobile, MSU-MSFD, Rose-Youtu, RECOD-MPAD.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chingovska, I., André, A., Sébastien, M.: On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG). IEEE (2012)

    Google Scholar 

  2. Costa-Pazo, A., et al.: The replay-mobile face presentation-attack database. In: 2016 International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE (2016)

    Google Scholar 

  3. Almeida, W.R., et al.: Detecting face presentation attacks in mobile devices with a patch-based CNN and a sensor-aware loss function. PloS one 15(9), e0238058 (2020)

    Article  Google Scholar 

  4. Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746–761 (2015)

    Article  Google Scholar 

  5. Li, H., et al.: Unsupervised domain adaptation for face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 13(7), 1794–1809 (2018)

    Article  Google Scholar 

  6. Li, Z., et al.: One-class knowledge distillation for face presentation attack detection. IEEE Trans. Inf. Forensics Secur. 17, 2137–2150 (2022)

    Article  Google Scholar 

  7. Tran, D., et al.: Learning spatiotemporal features with 3D convolutional networks. In: Proceedings of the IEEE International Conference on Computer Vision (2015)

    Google Scholar 

  8. Sultani, W., Chen, C., Mubarak, S.: Real-world anomaly detection in surveillance videos. In: Proceedings of the IEEE Conference on Computer Vision and pattern recognition (2018)

    Google Scholar 

  9. Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60(6), 84–90 (2017)

    Article  Google Scholar 

  10. Huang, G., et al.: Densely connected convolutional networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2017)

    Google Scholar 

  11. Deng, J., et al.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition. IEEE (2009)

    Google Scholar 

  12. Yi, D., et al.: Learning face representation from scratch. arXiv preprint arXiv:1411.7923 (2014)

  13. Taigman, Y., et al.: DeepFace: closing the gap to human-level performance in face verification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2014)

    Google Scholar 

  14. Sun, Y., Xiaogang, W., Xiaoou, T.: Deeply learned face representations are sparse, selective, and robust. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2015)

    Google Scholar 

  15. Parkhi, O.M., Andrea, V., Andrew, Z.: Deep face recognition. In: BMVC 2015-Proceedings of the British Machine Vision Conference 2015 (2015)

    Google Scholar 

  16. Schroff, F., Dmitry, K., James, P.: FaceNet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2015)

    Google Scholar 

  17. Liu, W., et al.: SphereFace: deep hypersphere embedding for face recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2017)

    Google Scholar 

  18. Deng, J., et al.: ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (2019)

    Google Scholar 

  19. Li, J., et al.: Live face detection based on the analysis of Fourier spectra. Biometric Technology for Human Identification, vol. 5404. SPIE (2004)

    Google Scholar 

  20. Kollreider, K., Hartwig, F., Josef, B.: Evaluating liveness by face images and the structure tensor. In: Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005). IEEE (2005)

    Google Scholar 

  21. Kollreider, K., Fronthaler, H., Bigun, J.: Non-intrusive liveness detection by face images. Image Vis. Comput. 27(3), 233–244 (2009)

    Article  Google Scholar 

  22. Pan, G., et al.: Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: 2007 IEEE 11th International Conference on Computer Vision. IEEE (2007)

    Google Scholar 

  23. Sun, L., Pan, G., Wu, Z., Lao, S.: Blinking-based live face detection using conditional random fields. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 252–260. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74549-5_27

    Chapter  Google Scholar 

  24. Bao, W., et al.: A liveness detection method for face recognition based on optical flow field. In: 2009 International Conference on Image Analysis and Signal Processing. IEEE (2009)

    Google Scholar 

  25. Li, X., et al.: Generalized face anti-spoofing by detecting pulse from face videos. In: 2016 23rd International Conference on Pattern Recognition (ICPR). IEEE (2016)

    Google Scholar 

  26. Nowara, E.M., Ashutosh, S., Ashok, V.: PPGSecure: biometric presentation attack detection using photopletysmograms. In: 2017 12th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2017). IEEE (2017)

    Google Scholar 

  27. Yang, J., Zhen, L., Stan, Z.L.: Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601 (2014)

  28. Patel, K., Han, H., Jain, A.K.: Cross-database face antispoofing with robust feature representation. In: You, Z., Zhou, J., Wang, Y., Sun, Z., Shan, S., Zheng, W., Feng, J., Zhao, Q. (eds.) CCBR 2016. LNCS, vol. 9967, pp. 611–619. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46654-5_67

    Chapter  Google Scholar 

  29. Li, L., et al.: An original face anti-spoofing approach using partial convolutional neural network. In: 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA). IEEE (2016)

    Google Scholar 

  30. George, A., Sébastien, M.: Deep pixel-wise binary supervision for face presentation attack detection. In: 2019 International Conference on Biometrics (ICB). IEEE (2019)

    Google Scholar 

  31. Boulkenafet, Z., Komulainen, J., Hadid, A.: Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Process. Lett. 24(2), 141–145 (2016)

    Google Scholar 

  32. Ma, Y., Lifang, W., Li, Z.: A novel face presentation attack detection scheme based on multi-regional convolutional neural networks. Pattern Recogn. Lett. 131, 261–267 (2020)

    Article  Google Scholar 

  33. Atoum, Y., et al.: Face anti-spoofing using patch and depth-based CNNs. In: 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE (2017)

    Google Scholar 

  34. Wang, G., et al.: Improving cross-database face presentation attack detection via adversarial domain adaptation. In: 2019 International Conference on Biometrics (ICB). IEEE (2019)

    Google Scholar 

  35. Wang, G., et al.: Cross-domain face presentation attack detection via multi-domain disentangled representation learning. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (2020)

    Google Scholar 

  36. Wang, G., et al.: Unsupervised adversarial domain adaptation for cross-domain face presentation attack detection. IEEE Trans. Inf. Forensics Secur. 16, 56–69 (2020)

    Article  Google Scholar 

  37. Li, Z., et al.: One-class knowledge distillation for face presentation attack detection. IEEE Trans. Inf. Forensics Secur. 17, 2137–2150 (2022)

    Article  Google Scholar 

  38. Hong, Y.: Performance evaluation metrics for biometrics-based authentication systems, Diss. (2021)

    Google Scholar 

  39. Bengio, S., et al.: Confidence measures for multimodal identity verification. Inf. Fusion 3(4), 267–276 (2002)

    Article  Google Scholar 

Download references

Acknowledgements

This work is partially funded by TIM S.p.A. through its UniversiTIM granting program.

Portions of the research in this paper used the Replay-Attack Dataset made available by the Idiap Research Institute, Martigny, Switzerland.

Portions of the research in this paper used the Replay-Mobile Dataset made available by the Idiap Research Institute, Martigny, Switzerland. Such Corpus was captured in collaboration with the Galician R and D Center on Advanced Telecommunications (GRADIANT), Vigo, Spain.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Salvatore Giurato .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Giurato, S., Ortis, A., Battiato, S. (2024). Real-Time Multiclass Face Spoofing Recognition Through Spatiotemporal Convolutional 3D Features. In: Foresti, G.L., Fusiello, A., Hancock, E. (eds) Image Analysis and Processing - ICIAP 2023 Workshops. ICIAP 2023. Lecture Notes in Computer Science, vol 14365. Springer, Cham. https://doi.org/10.1007/978-3-031-51023-6_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-51023-6_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-51022-9

  • Online ISBN: 978-3-031-51023-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics