Skip to main content

LBP − TOP Based Countermeasure against Face Spoofing Attacks

  • Conference paper
Computer Vision - ACCV 2012 Workshops (ACCV 2012)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 7728))

Included in the following conference series:

Abstract

User authentication is an important step to protect information and in this field face biometrics is advantageous. Face biometrics is natural, easy to use and less human-invasive. Unfortunately, recent work has revealed that face biometrics is vulnerable to spoofing attacks using low-tech cheap equipments. This article presents a countermeasure against such attacks based on the LBP − TOP operator combining both space and time information into a single multiresolution texture descriptor. Experiments carried out with the REPLAY ATTACK database show a Half Total Error Rate (HTER) improvement from 15.16% to 7.60%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ahonen, T., Hadid, A., Pietikainen, M.: Face Description with Local Binary Patterns: Application to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Inteligence 28, 2037–2041 (2006)

    Article  Google Scholar 

  2. Anjos, A., El Shafey, L., Wallace, R., Günther, M., McCool, C., Marcel, S.: Bob: a free signal processing and machine learning toolbox for researchers. In: 20th ACM Conference on Multimedia Systems (ACMMM), Nara, Japan (2012)

    Google Scholar 

  3. Anjos, A., Marcel, S.: Counter-measures to photo attacks in face recognition: a public database and a baseline. In: IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, USA (2011)

    Google Scholar 

  4. Chakka, M., Anjos, A., Marcel, S., Tronci, R., Muntoni, D., Fadda, G., Pili, M., Sirena, N., Murgia, G., Ristori, M., Roli, F., Yan, J., Yi, D., Lei, Z., Zhang, Z.: Competition on counter measures to 2-d facial spoofing attacks. In: IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, USA (2011)

    Google Scholar 

  5. Chetty, G., Wagner, M.: Liveness verification in audio-video speaker authentication. In: Proceeding of International Conference on Spoken Language Processing, ICSLP, vol. 4, pp. 2509–2512 (2004)

    Google Scholar 

  6. Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: IEEE BIOSIG 2012 (2012)

    Google Scholar 

  7. Eveno, N., Besacier, L.: A speaker independent “liveness” test for audio-visual biometrics. In: Ninth European Conference on Speech Communication and Technology (2005)

    Google Scholar 

  8. Flynn, P., Jain, A., Ross, A.: Handbook of biometrics. Springer (2008)

    Google Scholar 

  9. Froba, B., Ernst, A.: Face detection with the modified census transform. In: 2004 Proceedings of the Sixth IEEE International Conference on Automatic Face and Gesture Recognition, pp. 91–96. IEEE (2004)

    Google Scholar 

  10. Inen, M., Pietikäinen, M., Hadid, A., Zhao, G., Ahonen, T.: Computer Vision Using Local Binary Patterns, vol. 40. Springer (2011)

    Google Scholar 

  11. Johnson, P., Tan, B., Schuckers, S.: Multimodal fusion vulnerability to non-zero effort (spoof) imposters. In: 2010 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–5. IEEE (2010)

    Google Scholar 

  12. Kanematsu, M., Takano, H., Nakamura, K.: Highly reliable liveness detection method for iris recognition. In: 2007 Annual Conference, SICE, pp. 361–364. IEEE (2007)

    Google Scholar 

  13. Kollreider, K., Fronthaler, H., Bigun, J.: Non-intrusive liveness detection by face images. Image and Vision Computing 27, 233–244 (2009)

    Article  Google Scholar 

  14. Leyden, J.: Gummi bears defeat fingerprint sensors. The Register - 16 (2002)

    Google Scholar 

  15. Li, J., Wang, Y., Tan, T., Jain, A.: Live face detection based on the analysis of fourier spectra. Biometric Technology for Human Identification 5404, 296–303 (2004)

    Article  Google Scholar 

  16. Li, S., Jain, A.: Handbook of face recognition. Springer (2011)

    Google Scholar 

  17. Maatta, J., Hadid, A., Pietikäinen, M.: Face spoofing detection from single images using texture and local shape analysis. IET Biometrics 1, 3–10 (2012)

    Article  Google Scholar 

  18. Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial gummy fingers on fingerprint systems. In: Proceedings of SPIE, vol. 4677, pp. 275–289 (2002)

    Google Scholar 

  19. Pacut, A., Czajka, A.: Aliveness detection for iris biometrics. In: Proceedings of the 2006 40th Annual IEEE International Carnahan Conferences Security Technology, pp. 122–129. IEEE (2006)

    Google Scholar 

  20. Pan, G., Sun, L., Wu, Z., Lao, S.: Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: IEEE 11th International Conference on Computer Vision, ICCV 2007, pp. 1–8. IEEE (2007)

    Google Scholar 

  21. Tan, X., Li, Y., Liu, J., Jiang, L.: Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010, Part VI. LNCS, vol. 6316, pp. 504–517. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  22. Trefnỳ, J., Matas, J.: Extended set of local binary patterns for rapid object detection. In: Proceedings of the Computer Vision Winter Workshop, vol. 2010 (2010)

    Google Scholar 

  23. Uludag, U., Jain, A.: Attacks on biometric systems: a case study in fingerprints. In: Proc. SPIE-EI, pp. 622–633 (2004)

    Google Scholar 

  24. Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 26–31. IEEE (2012)

    Google Scholar 

  25. Zhao, G., Pietikainen, M.: Dynamic texture recognition using local binary patterns with an application to facial expressions. IEEE Transactions on Pattern Analysis and Machine Intelligence 29, 915–928 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

de Freitas Pereira, T., Anjos, A., De Martino, J.M., Marcel, S. (2013). LBP − TOP Based Countermeasure against Face Spoofing Attacks. In: Park, JI., Kim, J. (eds) Computer Vision - ACCV 2012 Workshops. ACCV 2012. Lecture Notes in Computer Science, vol 7728. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37410-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37410-4_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37409-8

  • Online ISBN: 978-3-642-37410-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics