Advertisement

Face Anti-spoofing via Deep Local Binary Pattern

  • Lei Li
  • Xiaoyi FengEmail author
Chapter

Abstract

In recent years, convolutional neural network (CNN) has achieved satisfactory performance in computer vision and pattern recognition. When we visualize the convolutional responses, we can conclude that the convolutional responses include some diacritically structural information. But for the high dimensionality of them, it is not feasible to directly use the responses to detect fake faces. Moreover, the small size of existing face anti-spoofing databases leads to the difficulty of training a new CNN model. Compared with deep learning, the traditional handcrafted features, such as local binary pattern (LBP), have been successfully used in face anti-spoofing and achieved good detection results. So in our work, we extracted the handcrafted features from the convolutional responses of the fine-tuned CNN model. More specifically, the CNN is first fine-tuned based on a pre-trained VGG-face model. Then, the LBP features are calculated from the convolutional responses and concatenated into one feature vector. After that, the final vectors are fed into a support vector machine (SVM) classifier to detect the fake faces. Validated on two public available databases, Replay-Attack and CASIA-FA, our proposed detection method can obtain promising results compared to the state-of-the-art methods.

References

  1. 1.
    Y. Li, K. Xu, Q. Yan, Y. Li, R.H. Deng, Proceedings of Acm Sigsac Symposium on Information Computer and Communications Security (2014)Google Scholar
  2. 2.
    L. Li, X. Feng, X. Jiang, Z. Xia, A. Hadid, in IEEE International Conference on Image Processing (ICIP) (2017), pp. 101–105. DOI 10.1109/ICIP.2017.8296251Google Scholar
  3. 3.
    L. Li, X. Feng, Z. Boulkenafet, Z. Xia, M. Li, A. Hadid, in 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA) (2016), pp. 1–6. DOI 10.1109/IPTA.2016.7821013Google Scholar
  4. 4.
    Z. Boulkenafet, J. Komulainen, A. Hadid, in Image Processing (ICIP), 2015 IEEE International Conference on (2015), pp. 2636–2640. DOI 10.1109/ICIP.2015.7351280Google Scholar
  5. 5.
    D. Wen, H. Han, A.K. Jain, IEEE Transactions on Information Forensics and Security 10(4), 746 (2015)CrossRefGoogle Scholar
  6. 6.
    J. Maatta, A. Hadid, M. Pietikainen, in International Joint Conference on Biometrics (2011), pp. 1–7Google Scholar
  7. 7.
    I. Chingovska, A. Anjos, S. Marcel, in IEEE International Conference of the Biometrics Special Interest Group (2012), pp. 1–7Google Scholar
  8. 8.
    Z. Boulkenafet, J. Komulainen, A. Hadid, IEEE Transactions on Information Forensics and Security 11(8), 1 (2016)CrossRefGoogle Scholar
  9. 9.
    J. Yang, Z. Lei, S.Z. Li, Eprint Arxiv 9218, 373 (2014)Google Scholar
  10. 10.
    D. Menotti, G. Chiachia, A. Pinto, W. Robson Schwartz, H. Pedrini, A. Xavier Falcao, A. Rocha, Computer Science 10, 864 (2014)Google Scholar
  11. 11.
    A. Krizhevsky, I. Sutskever, G.E. Hinton, Advances in Neural Information Processing Systems 25(2), 2012 (2012)Google Scholar
  12. 12.
    A. Anjos, S. Marcel, in Biometrics, International Joint Conference on (2011), pp. 1–7Google Scholar
  13. 13.
    T.D.F. Pereira, A. Anjos, J.M.D. Martino, S. Marcel, in Proceedings of the 11th international conference on Computer Vision - Volume Part I (2012), pp. 121–132Google Scholar
  14. 14.
    K. Kollreider, H. Fronthaler, J. Bigun, Image and Vision Computing 27(3), 233 (2009)CrossRefGoogle Scholar
  15. 15.
    M.M. Chakka, A. Anjos, S. Marcel, R. Tronci, in Proceedings of the 2011 International Joint Conference on Biometrics (2011), pp. 1–6Google Scholar
  16. 16.
    Z. Zhang, J. Yan, S. Liu, Z. Lei, in Biometrics (ICB), 2012 5th IAPR International Conference on (2012), pp. 26–31Google Scholar
  17. 17.
    J. Peng, P.P.K. Chan, in Wavelet Analysis and Pattern Recognition (ICWAPR), 2014 International Conference on (2014), pp. 176–181. DOI 10.1109/ICWAPR.2014.6961311Google Scholar
  18. 18.
    J. Galbally, S. Marcel, in International Conference on Pattern Recognition (ICPR) (2014), pp. 1173–1178. DOI 10.1109/ICPR.2014.211Google Scholar
  19. 19.
    Z. Zhang, D. Yi, Z. Lei, S.Z. Li, in IEEE International Conference on Automatic Face and Gesture Recognition and Workshops (2011), pp. 436–441Google Scholar
  20. 20.
    G. Chetty, 23(3), 1 (2010)Google Scholar
  21. 21.
    T. Wang, J. Yang, Z. Lei, S. Liao, in International Conference on Biometrics (2013), pp. 1–6Google Scholar
  22. 22.
    Z. Akhtar, C. Michelon, G.L. Foresti, in Security Technology (ICCST), 2014 International Carnahan Conference on (2014), pp. 6695–6695Google Scholar
  23. 23.
    Z. Akhtar, C. Micheloni, C. Piciarelli, G.L. Foresti, in Advanced Video and Signal Based Surveillance (AVSS), 2014 11th IEEE International Conference on (2014), pp. 187–192. DOI 10.1109/AVSS.2014.6918666Google Scholar
  24. 24.
    D. Menotti, G. Chiachia, A. Pinto, W. Robson Schwartz, H. Pedrini, A. Xavier Falcao, A. Rocha, Information Forensics and Security, IEEE Transactions on 10(4), 864 (2015)Google Scholar
  25. 25.
    O.M. Parkhi, A. Vedaldi, A. Zisserman, in British Machine Vision Conference (2015)Google Scholar
  26. 26.
    R. Lukac, K.N. Plataniotis, Color image processing: methods and applications (CRC, Taylor and Francis, 2007)Google Scholar
  27. 27.
    T. Ojala, M. Pietikainen, T. Maenpaa, IEEE Transactions on Pattern Analysis and Machine Intelligence 24(7), 971 (2002)CrossRefGoogle Scholar
  28. 28.
    R.E. Fan, K.W. Chang, C.J. Hsieh, X.R. Wang, C.J. Lin, Journal of Machine Learning Research 9(12), 1871 (2010)Google Scholar
  29. 29.
    I. Chingovska, A. Anjos, S. Marcel, in International Conference of the Biometrics Special Interest Group (BIOSIG) (2012), pp. 1–7Google Scholar
  30. 30.
    Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, S. Li, in International Conference on Biometrics (ICB) (2012), pp. 26–31Google Scholar
  31. 31.
    T. de Freitas Pereira, A. Anjos, J. De Martino, S. Marcel, in International Conference on Biometrics (ICB) (2013), pp. 1–8Google Scholar
  32. 32.
    J. Yang, Z. Lei, S. Liao, S. Li, in Biometrics (ICB), 2013 International Conference on (2013), pp. 1–6Google Scholar
  33. 33.
    J. Komulainen, A. Hadid, M. Pietikainen, A. Anjos, S. Marcel, in International Conference on Biometrics (ICB) (2013), pp. 1–7. DOI 10.1109/ICB.2013.6612968Google Scholar
  34. 34.
    A. Pinto, H. Pedrini, W.R. Schwartz, A. Rocha, IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society 24(12), 4726 (2015)CrossRefGoogle Scholar
  35. 35.
    S. Tirunagari, N. Poh, D. Windridge, A. Iorliam, N. Suki, A.T.S. Ho, IEEE Transactions on Information Forensics and Security 10(4), 762 (2015)CrossRefGoogle Scholar
  36. 36.
    Z. Boulkenafet, J. Komulainen, A. Hadid, in IEEE International Conference on Image Processing (ICIP2015) (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.School of Electronics and InformationNorthwestern Polytechnical UniversityXi’anChina

Personalised recommendations