Skip to main content

Face Presentation Attack Detection Using Multi-classifier Fusion of Off-the-Shelf Deep Features

  • Conference paper
  • First Online:
Computer Vision and Image Processing (CVIP 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1148))

Included in the following conference series:

Abstract

Face recognition systems are vulnerable to the presentation (or spoof or direct) attacks that can be carried out by presenting the face artefact corresponding to the legitimate user. Thus, it is essential to develop a Presentation Attack Detection (PAD) algorithms that can automatically detect the presentation attacks the face recognition systems. In this paper, we present a novel method for face presentation attack detection based on the multi-classifier fusion of deep features that are computed using the off-the-shelf pre-trained deep Convolutional Neural Network (CNN) architecture based on AlexNet. Extracted features are compared using softmax and Spectral Regression Kernel Discriminant Analysis (SRKDA) classifiers to obtain the comparison scores that are combined using a weighted sum rule. Extensive experiments are carried out on the publicly available OULU-NPU database and performance of the proposed method is benchmarked with fifteen different state-of-the-art techniques. Obtained results have indicated the outstanding performance of the proposed method on OULU-NPU database.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ali, A., Deravi, F., Hoque, S.: Liveness detection using gaze collinearity. In: 2012 Third International Conference on Emerging Security Technologies, pp. 62–65. IEEE (2012)

    Google Scholar 

  2. Baudat, G., Anouar, F.: Generalized discriminant analysis using a kernel approach. Neural Comput. 12(10), 2385–2404 (2000)

    Article  Google Scholar 

  3. Bekhouche, S.E., Ouafi, A., Dornaika, F., Taleb-Ahmed, A., Hadid, A.: Pyramid multi-level features for facial demographic estimation. Expert Syst. Appl. 80, 297–310 (2017)

    Article  Google Scholar 

  4. Boulkenafet, Z., et al.: A competition on generalized software-based face presentation attack detection in mobile scenarios. In: IEEE International Joint Conference on Biometrics (IJCB), pp. 688–696, October 2017. https://doi.org/10.1109/BTAS.2017.8272758

  5. Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 2636–2640, September 2015. https://doi.org/10.1109/ICIP.2015.7351280

  6. Costa-Pazo, A., Bhattacharjee, S., Vazquez-Fernandez, E., Marcel, S.: The replay-mobile face presentation-attack database. In: International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–7, September 2016. https://doi.org/10.1109/BIOSIG.2016.7736936

  7. Galbally, J., Marcel, S., Fierrez, J.: Biometric antispoofing methods: a survey in face recognition. IEEE Access 2, 1530–1552 (2014). https://doi.org/10.1109/ACCESS.2014.2381273

    Article  MATH  Google Scholar 

  8. He, K., Sun, J., Tang, X.: Guided image filtering. IEEE Trans. Pattern Anal. Mach. Intell. 35(6), 1397–1409 (2012)

    Article  Google Scholar 

  9. Iandola, F.N., Han, S., Moskewicz, M.W., Ashraf, K., Dally, W.J., Keutzer, K.: SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and \(<\)0.5 mb model size. arXiv preprint arXiv:1602.07360 (2016)

  10. International Organization for Standardization: ISO/IEC DIS 30107–3:2017. Information Technology - Biometric presentation attack detection - Part 3: Testing and Reporting (2016)

    Google Scholar 

  11. ISO/IEC JTC1 SC37 Biometrics: ISO/IEC 30107–1:2016. Information Technology - Biometric presentation attack detection - Part 1: Framework. International Organization for Standardization (2016)

    Google Scholar 

  12. Jain, A., Vishwanathan, S.V., Varma, M.: SPF-GMKL: generalized multiple kernel learning with a million kernels. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 750–758. ACM (2012)

    Google Scholar 

  13. Kannala, J., Rahtu, E.: BSIF: binarized statistical image features. In: 21st International Conference on Pattern Recognition (ICPR), pp. 1363–1366 (2012)

    Google Scholar 

  14. Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60(6), 84–90 (2017). https://doi.org/10.1145/3065386

    Article  Google Scholar 

  15. Maatta, J., Hadid, A., Pietikainen, M.: Face spoofing detection from single images using micro-texture analysis. In: International Joint Conference on Biometrics (IJCB), pp. 1–7, October 2011

    Google Scholar 

  16. Ojala, T., Pietikainen, M., Maenpaa, T.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 971–987 (2002). https://doi.org/10.1109/TPAMI.2002.1017623

    Article  MATH  Google Scholar 

  17. Ojansivu, V., Heikkilä, J.: Blur insensitive texture classification using local phase quantization. In: Elmoataz, A., Lezoray, O., Nouboud, F., Mammass, D. (eds.) ICISP 2008. LNCS, vol. 5099, pp. 236–243. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69905-7_27

    Chapter  Google Scholar 

  18. Palm, C.: Color texture classification by integrative co-occurrence matrices. Pattern Recogn. 37(5), 965–976 (2004)

    Article  Google Scholar 

  19. Patel, K., Han, H., Jain, A.K.: Secure smartphone unlock: Robust face spoof detection on mobile. Technical report MSU-CSE-15-15, Department of Computer Science, Michigan State University, East Lansing, Michigan, October 2015

    Google Scholar 

  20. Raghavendra, R., Busch, C.: Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput. Surv. 50(1), 8:1–8:37 (2017). https://doi.org/10.1145/3038924

    Article  Google Scholar 

  21. Raghavendra, R., Raja, K.B., Venkatesh, S., Busch, C.: Improved ear verification after surgery - an approach based on collaborative representation of locally competitive features. Pattern Recogn. 83, 416–429 (2018). https://doi.org/10.1016/j.patcog.2018.06.008

    Article  Google Scholar 

  22. Raghavendra, R., Venkatesh, S., Raja, K.B., Busch, C.: Transferable deep convolutional neural network features for fingervein presentation attack detection. In: 5th International Workshop on Biometrics and Forensics (IWBF), pp. 1–5, April 2017

    Google Scholar 

  23. Raghavendra, R., Venkatesh, S., Raja, K.B., Wasnik, P., Stokkenes, M., Busch, C.: Fusion of multi-scale local phase quantization features for face presentation attack detection. In: 2018 21st International Conference on Information Fusion (FUSION), pp. 2107–2112, July 2018

    Google Scholar 

  24. Raghavendra, R., Kiran, R., Sushma, V., Faouzi, C., Busch, C.: On the vulnerability of extended multispectral face recognition systems towards presentation attacks. In: IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), pp. 1–8. IEEE (2017)

    Google Scholar 

  25. Raghavendra, R., Raja, K., Busch, C.: Presentation attack detection for face recognition using light field camera. IEEE Trans. Image Process. 24(3), 1–16 (2015)

    Article  MathSciNet  Google Scholar 

  26. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)

  27. Souza, L., Oliveira, L., Pamplona, M., Papa, J.: How far did we get in face spoofing detection? Eng. Appl. Artif. Intell. 72(C), 368–381 (2018). https://doi.org/10.1016/j.engappai.2018.04.013

    Article  Google Scholar 

  28. Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818–2826 (2016)

    Google Scholar 

  29. Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746–761 (2015). https://doi.org/10.1109/TIFS.2015.2400395

    Article  Google Scholar 

  30. Zinelabidine, B., Jukka, K., Li, L., Feng, X., Hadid, A.: OULU-NPU: a mobile face presentation attack database with real-world variations. In: IEEE International Conference on Automatic Face and Gesture Recognition (AFGR), pp. 1–7. IEEE (2017)

    Google Scholar 

  31. Zuiderveld, K.: Contrast limited adaptive histogram equalization. In: Graphics Gems IV, pp. 474–485. Academic Press Professional Inc., San Diego (1994). http://dl.acm.org/citation.cfm?id=180895.180940

Download references

Acknowledgment

This work is carried out under the partial funding of the Research Council of Norway (Grant No. IKTPLUSS 248030/O70).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jag Mohan Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ramachandra, R., Singh, J.M., Venkatesh, S., Raja, K., Busch, C. (2020). Face Presentation Attack Detection Using Multi-classifier Fusion of Off-the-Shelf Deep Features. In: Nain, N., Vipparthi, S., Raman, B. (eds) Computer Vision and Image Processing. CVIP 2019. Communications in Computer and Information Science, vol 1148. Springer, Singapore. https://doi.org/10.1007/978-981-15-4018-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-4018-9_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-4017-2

  • Online ISBN: 978-981-15-4018-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics