Skip to main content

Temporal Convolutional Networks for Robust Face Liveness Detection

  • Conference paper
  • First Online:
Pattern Recognition and Image Analysis (IbPRIA 2022)

Abstract

Face authentication and biometrics are becoming a commodity in many situations of our society. As its application becomes widespread, vulnerability to attacks becomes a challenge that needs to be tackled. In this paper, we propose a non-intrusive on the fly liveness detection system, based on 1D convolutional neural networks, that given pulse signals estimated through skin color variation from face videos, classify each signal as genuine or as an attack. We assess how fundamentally different approaches – sequence and non-sequence modelling – perform in detecting presentation attacks through liveness detection. For this, we leverage on the Temporal Convolutional Network (TCN) architecture, and exploit distinct and TCN grounded types of convolution and architectural design schemes. Experiments show that our TCN model provides the best balance in terms of usability and attack detection performance, achieving up to 90% AUC. We further verify that while our 1D-CNN with a residual block variant performs on par with the TCN model in detecting fake pulses, it underperforms in detecting genuine ones, leading to the conclusion that the TCN model is the most adequate for a production environment. The dataset will be made publicly available to foster research on the topic. (https://github.com/novasearch/Mobile-1-D-Face-Liveness-Detection)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abbas, G., Khan, M.J., Qureshi, R., Khurshid, K.: Scope of video magnification in human pulse rate estimation. In: 2017 International Conference on Machine Vision and Information Technology (CMVIT), pp. 69–75 (2017). https://doi.org/10.1109/CMVIT.2017.28

  2. Agarwal, A., Yadav, D., Kohli, N., Singh, R., Vatsa, M., Noore, A.: Face presentation attack with latex masks in multispectral videos. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 275–283 (2017). https://doi.org/10.1109/CVPRW.2017.40

  3. Bai, S., Kolter, J.Z., Koltun, V.: An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. CoRR abs/1803.01271 (2018). http://arxiv.org/abs/1803.01271

  4. Bousefsaf, F., Pruski, A., Maaoui, C.: 3D convolutional neural networks for remote pulse rate measurement and mapping from facial video. Appl. Sci. 9, 4364 (2019). https://doi.org/10.3390/app9204364

  5. Huang, B., Chang, C.M., Lin, C.L., Chen, W., Juang, C.F., Wu, X.: Visual heart rate estimation from facial video based on CNN. In: 2020 15th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 1658–1662 (2020). https://doi.org/10.1109/ICIEA48937.2020.9248356

  6. Kolberg, J., Gomez-Barrero, M., Venkatesh, S., Ramachandra, R., Busch, C.: Presentation Attack Detection for Finger Recognition, pp. 435–463. Springer International Publishing, Cham (2020). https://doi.org/10.1007/978-3-030-27731-4_14

  7. Krišto, M., Ivasic-Kos, M.: An overview of thermal face recognition methods. In: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1098–1103 (2018). https://doi.org/10.23919/MIPRO.2018.8400200

  8. Li, X., Komulainen, J., Zhao, G., Yuen, P., Pietikäinen, M.: Generalized face anti-spoofing by detecting pulse from face videos. In: 2016 23rd International Conference on Pattern Recognition (ICPR), pp. 4244–4249 (2016)

    Google Scholar 

  9. Lin, B., Li, X., Yu, Z., Zhao, G.: Face liveness detection by rPPG features and contextual patch-based CNN. In: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications, pp. 61–68. ICBEA 2019. Association for Computing Machinery, New York, NY, USA (2019). https://doi.org/10.1145/3345336.3345345

  10. Padnevych, R.: Smartyflow - biometria facial robusta para identificação virtual (2021)

    Google Scholar 

  11. Poh, M.Z., McDuff, D.J., Picard, R.W.: Non-contact, automated cardiac pulse measurements using video imaging and blind source separation. Opt. Express 18(10), 10762–10774 (2010)

    Article  Google Scholar 

  12. Ramachandra, R., Busch, C.: Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput. Surv. (CSUR) 50(1), 1–37 (2017)

    Article  Google Scholar 

  13. Tarassenko, L., Villarroel, M., Guazzi, A., Jorge, J., Clifton, D., Pugh, C.: Non-contact video-based vital sign monitoring using ambient light and auto-regressive models. Physiol. Meas. 35(5), 807 (2014)

    Article  Google Scholar 

  14. Tirunagari, S., Poh, N., Windridge, D., Iorliam, A., Suki, N., Ho, A.: Detection of face spoofing using visual dynamics. IEEE Trans. Inf. Forensics Secur. 10, 762–777 (2015). https://doi.org/10.1109/TIFS.2015.2406533

  15. Toosi, A., Bottino, A., Cumani, S., Negri, P., Sottile, P.L.: Feature fusion for fingerprint liveness detection: a comparative study. IEEE Access 5, 23695–23709 (2017). https://doi.org/10.1109/ACCESS.2017.2763419

    Article  Google Scholar 

  16. Verkruysse, W., Svaasand, L.O., Nelson, J.S.: Remote plethysmographic imaging using ambient light. Opt. Express 16(26), 21434–21445 (2008)

    Article  Google Scholar 

  17. Wang, S.Y., Yang, S.H., Chen, Y.P., Huang, J.W.: Face liveness detection based on skin blood flow analysis. Symmetry 9(12) (2017). https://doi.org/10.3390/sym9120305, https://www.mdpi.com/2073-8994/9/12/305

  18. Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746–761 (2015)

    Article  Google Scholar 

  19. Wu, H.Y., Rubinstein, M., Shih, E., Guttag, J., Durand, F., Freeman, W.: Eulerian video magnification for revealing subtle changes in the world. ACM Trans. Graph. 31(4) (2012). https://doi.org/10.1145/2185520.2185561

  20. Wu, H.Y., Rubinstein, M., Shih, E., Guttag, J., Durand, F., Freeman, W.T.: Eulerian video magnification for revealing subtle changes in the world. ACM Trans. Graph. (Proc. SIGGRAPH 2012) 31(4), 1–8 (2012)

    Google Scholar 

  21. Yousef, A., Yaojie, L., Amin, J., Xiaoming, L.: Face anti-spoofing using patch and depth-based CNNs. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), pp. 319–328 (2017)

    Google Scholar 

  22. Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23(10), 1499–1503 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to João Magalhães .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Padnevych, R., Carmo, D., Semedo, D., Magalhães, J. (2022). Temporal Convolutional Networks for Robust Face Liveness Detection. In: Pinho, A.J., Georgieva, P., Teixeira, L.F., Sánchez, J.A. (eds) Pattern Recognition and Image Analysis. IbPRIA 2022. Lecture Notes in Computer Science, vol 13256. Springer, Cham. https://doi.org/10.1007/978-3-031-04881-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-04881-4_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-04880-7

  • Online ISBN: 978-3-031-04881-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics