Loading…
Efficient Face Spoofing Detection With Flash
In light of the rising demand for biometric-authentication systems, preventing face spoofing attacks is a critical issue for the safe deployment of face recognition systems. Here, we propose an efficient face presentation attack detection (PAD) algorithm that requires minimal hardware and only a sma...
Saved in:
Published in: | IEEE transactions on biometrics, behavior, and identity science behavior, and identity science, 2021-10, Vol.3 (4), p.535-549 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | In light of the rising demand for biometric-authentication systems, preventing face spoofing attacks is a critical issue for the safe deployment of face recognition systems. Here, we propose an efficient face presentation attack detection (PAD) algorithm that requires minimal hardware and only a small database, making it suitable for resource-constrained devices such as mobile phones. Utilizing one monocular visible-light camera, the proposed algorithm takes two facial photos, taken with and without a flash, respectively. The proposed SpecDiff descriptor is constructed by leveraging two types of reflection: (i) specular reflections from the iris region that have a specific intensity distribution depending on liveness, and (ii) diffuse reflections from the entire face region that represents the 3D structure of a subject's face. Classifiers trained with the SpecDiff descriptor outperform other flash-based PAD algorithms on both an in-house database and four publicly available databases: NUAA, Replay-Attack, Spoofing in the Wild, and OULU-NPU. Furthermore, the proposed algorithm achieves statistically significantly better accuracy to that of an end-to-end, deep neural network classifier, while being approximately six-times faster execution speed. The limitation of the proposed algorithm is also quantified under various adversarial lighting conditions, to guide users for the safe deployment of the algorithm. The code is publicly available at https://github.com/Akinori-F-Ebihara/SpecDiff-spoofing-detector . Example images of in-house database are also available at https://github.com/Akinori-F-Ebihara/SpecDiff_in_house_database_sample . |
---|---|
ISSN: | 2637-6407 2637-6407 |
DOI: | 10.1109/TBIOM.2021.3076816 |