Skip to main content
Log in

A self-immune to 3D masks attacks face recognition system

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

Due to their advantages, facial recognition systems are among the most widely used biometric systems in recent years. However, their drawback is that they can easily be deceived by using 3D masks, which are replicas of real faces. To confirm this fact, we have tested the vulnerability to 3D masks attacks of the already approved Legendre moments invariants (LMI)-based face recognition method. This has been achieved by using the 3D mask attack database (3DMAD), which consists of real faces and faces with 3D masks. The obtained spoof false acceptance rate (SFAR) was close to 65%, which proves that this recognition system is vulnerable to 3D masks attacks. This is generally the case of other face recognition systems, with no anti-spoofing provision. In this paper, a face recognition method is proposed to prevent hackers from deceiving face recognition systems by using 3D masks of people belonging to the system database. This method combines the LMI and the linear discriminant analysis for characteristic features extraction, and the maximum likelihood for classification. With a 97.6% recognition rate and a SFAR equal to 0.83%, the results obtained may be considered as very satisfactory. These results, while obtained with a lower computational time, compare favorably with those of the state-of-the-art method that uses the same 3DMAD database.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)

    Article  Google Scholar 

  2. Daugman, J.: The importance of being random: statistical principles of iris recognition. Pattern Recognit. 36(2), 279–291 (2003)

    Article  Google Scholar 

  3. Semwal, V.B., Nandi, G.C.: Design of vector field for different sub-phases of gait and regeneration of gait pattern. IEEE Trans. Autom. Sci. Eng. 15(1), 104–110

  4. Semwal, V.B., Nandi, G.C.: Generation of joint trajectories using hybrid automate-based model: a rocking block-based approach. IEEE Sens. J. 16(14), 5805–5816 (2016)

    Article  Google Scholar 

  5. Semwal, V.B., Mondal, K., Nandi, G.C.: Robust and accurate feature selection for humanoid push recovery and classification: deep learning approach. Neural Comput. Appl. 28(3), 565–574 (2017)

    Article  Google Scholar 

  6. Turk, M., Pentland, A.: Eigenfaces for recognition. J. Cogn. Neurosci. 3(1), 71–86 (1991)

    Article  Google Scholar 

  7. Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley, New York (2001)

    MATH  Google Scholar 

  8. Pan, G., Sun, L., Wu, Z., Laon, S.: Eyeblink-based antispoong in face recognition from a generic web camera. In: IEEE International Conference on Computer Vision, pp. 1–8 (Oct 2007)

  9. Bai, J., Ng, T.-T., Gao, X., Shi, Y.-Q.: Is physics-based liveness detection truly possible with a single image? In: IEEE International Symposium on Circuits and Systems, pp. 3425–3428 (Jun 2010)

  10. Chetty, G., Wagner, M.: Multi-level liveness verication for face-voice biometric authentication. In: Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference, pp. 1–6 (2006)

  11. Kollreider, K., Fronthaler, H., Bigun, J.: Evaluating liveness by face images and the structure tensor. In: IEEE Workshop on Automatic Identication Advanced Technologies, pp. 75–80 (Oct 2005)

  12. Kim, Y., Na, J., Yoon, S., Yi, J.: Masked fake face detection using radiance measurements. J. Opt. Soc. Am. A 26(4), 760–766 (2009)

    Article  Google Scholar 

  13. Zhang, Z., Yi, D., Lei, Z., Li, S.: Face liveness detection by learning multispectral reectance distributions. In: IEEE International Conference on Automatic Face Gesture Recognition and Workshops, pp. 436–441 (Mar 2011)

  14. Kose, N., Dugelay, J.L.: Countermeasure for the protection of face recognition systems against mask attacks. In: IEEE International Conference on Automatic Face and Gesture Recognition (2013)

  15. Erdogmus, N., Marcel, S.: Spoong 2d face recognition systems with 3d masks. In: Conference of the Biometrics Special Interest Group (2013)

  16. Erdogmus, N., Marcel, S.: Spoofing face recognition with 3D masks. IEEE Trans. Inf. Forensics Secur. 9(7), 1084–1097 (2014). https://doi.org/10.1109/TIFS.2014.2322255

  17. https://www.idiap.ch/dataset/3dmad. Accessed 01 Dec 2017

  18. Menotti, D., Chiachia, G., Pinto, A., Schwartz, W.Robson, Pedrini, H., Falcao, A.Xavier, Rocha, A.: Deep representations for iris, face, and fingerprint spoofing detection. IEEE TIFS 10(4), 864–879 (2015)

    Google Scholar 

  19. Agarwal, A., Singh, R., Vatsa, M.: Face anti-spoofing using Haralick features. In: IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS) (2016)

  20. Vatkin, M., Selinger, M.: The system of hand written characters recognition on the basis of Legendre moments and Neural networks. In: Proceedings of International Workshop on Digital Event System Design, DESDes01 (2001)

  21. Sonka, M., Hlavac, V., Boyle, R.: Image Processing, Analysis and Machine Vision. Vikas publishing house, Chennai (2001)

    Google Scholar 

  22. Mukundan, R., Ong, S.H., Lee, P.A.: Discrete versus continuous orthogonal moments for image analysis. In: Proceedings of International conference CIsst01 (2001)

  23. Cox, I., Ghosn, J., Yianilos, P.: Feature-based face recognition using mixture-distance. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 209–216 (1996)

  24. Bensenane, H., Keche, M.: Face recognition using angular radial transform. J. King Saud Univ. Comput. Inf. Sci. (2016). https://doi.org/10.1016/j.jksuci.2016.10.006

  25. Teague, M.R.: Image analysis via the general theory of moments. J. Opt. Soc. Am. 70, 920–930 (1980)

    Article  MathSciNet  Google Scholar 

  26. Annadurai, S., Saradha, A.: Face recognition using legendre moments. In: Proceedings of the Fourth Indian Conference on Computer Vision, Graphics and Image Processing (2004)

  27. Belhumeur, P., Hespanha, J., Kriegman, D.: Eigenfaces versus Fisherfaces: recognition using class specific linear projection. IEEE Trans. Pattern Anal. Mach. Intell. 19, 711–720 (1997)

    Article  Google Scholar 

  28. Mohan, A., Papageorgiou, C., Poggio, T.: Example-based object detection in images by components. PAMI 23(1), 349–361 (2001)

    Article  Google Scholar 

  29. http://www.uk.research.att.com/pub/data/att_faces.zip. Accessed 01 Jan 2016

  30. http://www.cswww.essex.ac.uk/mv/allfaces/grimace.zip. Accessed 01 Jan 2016

  31. http://www.cvc.yale.edu/projects/yalefaces/yalefaces.html. Accessed 01 Jan 2016

  32. http://www.cswww.essex.ac.uk/mv/allfaces/faces94.zip. Accessed 01 Jan 2016

  33. Semwal, V.B., Singha, J., Sharma, P.K., Chauhan, A., Behera, B.: An optimized feature selection technique based on incremental feature analysis for bio-metric gait data classification. Multimed. Tools Appl. 1–19 (2016)

  34. Semwal, V.B., Mondal, K., Nandi, G.C.: Robust and accurate feature selection for humanoid push recovery and classification: deep learning approach. Neural Computing and Applications 28(3), 565–574 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bensenane Hamdan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hamdan, B., Mokhtar, K. A self-immune to 3D masks attacks face recognition system. SIViP 12, 1053–1060 (2018). https://doi.org/10.1007/s11760-018-1253-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-018-1253-5

Keywords

Navigation