CCBR 2015: Biometric Recognition pp 135-142 | Cite as

WLD-TOP Based Algorithm against Face Spoofing Attacks

  • Ling Mei
  • Dakun Yang
  • Zhanxiang Feng
  • Jianhuang Lai
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9428)

Abstract

Face liveness detection is more and more important in face recognition systems, which are vulnerable to spoof attacks made by non-real faces. Recent work has revealed that some algorithms based on image descriptors are applied to face liveness detection against face spoofing attacks, such as LBP and LBP-TOP. However, these image descriptors are not robust to spoofing attacks. In this paper, we propose a robust and powerful local descriptor, called WLD-TOP. It combines temporal and spatial information into a single descriptor with a multiresolution strategy. Extensive experiments on CASIA and our new SYSU-MFSD database demonstrate that the descriptor can achieve a better liveness detection performance in both intra and cross-databases compared to the state-of-the-art techniques based on descriptors.

Keywords

WLD-TOP Spoofing attack Local descriptor Dynamic texture 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Sun, L., Huang, W.B., Wu, M.H.: TIR/VIS correlation for liveness detection in face recognition. In: Real, P., Diaz-Pernil, D., Molina-Abril, H., Berciano, A., Kropatsch, W. (eds.) CAIP 2011, Part II. LNCS, vol. 6855, pp. 114–121. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  2. 2.
    Chakraborty, S., Das, D.: An overview of face liveness detection. arXiv preprint arXiv. 1405, 2227 (2014)Google Scholar
  3. 3.
    Ojala, T., Pietikäinen, M., Mäenpää, T.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. PAMI. 24(7), 971–987 (2002)CrossRefGoogle Scholar
  4. 4.
    Chen, J., Shan, S., He, C., Zhao, G., Pietikäinen, M., Chen, X., Gao, W.: WLD: A robust local image descriptor. IEEE Trans. PAMI. 32(9), 1705–1720 (2010)CrossRefGoogle Scholar
  5. 5.
    de Freitas Pereira, T., Anjos, A., De Martino, J.M., Marcel, S.: LBP \(-\) TOP based countermeasure against face spoofing attacks. In: Park, J.-I., Kim, J. (eds.) ACCV Workshops 2012, Part I. LNCS, vol. 7728, pp. 121–132. Springer, Heidelberg (2013) CrossRefGoogle Scholar
  6. 6.
    Zhang, Z.W., Yan, J.J., Liu, S.F., Lei, Z., Yi, D., Li, S.Z.: A face antispoofing database with diverse attacks. In: 5th IAPR International Conference on Biometrics, pp. 26–31. IEEE Press, New Delhi (2012)Google Scholar
  7. 7.
    Yang, J., Lei, Z., Liao, S. and Li, S. Z.: Face liveness detection with component dependent descriptor. In: 6th IAPR International Conference on Biometrics, pp. 1–6. IEEE Press, Madrid (2013)Google Scholar
  8. 8.
    Määttä, J., Hadid, A., Pietikäinen, M.: Face spoofing detection from single images using micro-texture analysis. In: 2011 IEEE International Joint Conference on Biometrics, pp. 1–7. IEEE press, Washington, DC (2011)Google Scholar
  9. 9.
    Tan, X.Y., Li, Y., Liu, J., Jiang, L.: Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: 11th European Conference on Computer Vision, pp. 504–517. IEEE press, Heraklion (2010)Google Scholar
  10. 10.
    Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: International Conference of Biometrics Special Interest Group, pp. 1–7. IEEE press, Darmstadt (2012)Google Scholar
  11. 11.
    Chang, C., Lin, C.: LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology 2(3), 27 (2011)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Ling Mei
    • 1
    • 2
  • Dakun Yang
    • 1
    • 2
  • Zhanxiang Feng
    • 1
    • 2
  • Jianhuang Lai
    • 1
    • 2
  1. 1.School of Information Science and TechnologySun-Yat-Sen UniversityGuangzhouChina
  2. 2.Guangdong Key Laboratory of Information Security TechnologySun Yat-sen UniversityGuangzhouChina

Personalised recommendations