Loading…

Face Anti-Spoofing Using Texture-Based Techniques and Filtering Methods

User authentication for an accurate biometric system is the demand of the hour in today's world. When somebody attempts to take on the appearance of another person by introducing a phony face or video before the face detection camera and gets illegitimate access, a face presentation attack usua...

Full description

Saved in:
Bibliographic Details
Published in:Journal of physics. Conference series 2019-05, Vol.1229 (1), p.12044
Main Authors: Hasan, Md Rezwan, Hasan Mahmud, S M, Li, Xiang Yu
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:User authentication for an accurate biometric system is the demand of the hour in today's world. When somebody attempts to take on the appearance of another person by introducing a phony face or video before the face detection camera and gets illegitimate access, a face presentation attack usually happens. To effectively protect the privacy of a person, it is very critical to build a face authentication and anti-spoofing system. This paper introduces a novel and appealing face spoof detection technique, which is primarily based on the study of contrast and dynamic texture features of both seized and spoofed photos. Valid identification of photo spoofing is anticipated here. A modified version of the DoG filtering method, and local binary pattern variance (LBPV) based technique, which is invariant to rotation, are designated to be used in this paper. Support vector machine (SVM) is used when feature vectors are extracted for further analysis. The publicly available NUAA photo-imposter database is adapted to test the system, which includes facial images with different illumination and area. The accuracy of the method can be assessed using the false acceptance rate (FAR) and false rejection rate (FRR). The results express that our method performs better on key indices compared to other state-of-the-art techniques following the provided evaluation protocols tested on a similar dataset.
ISSN:1742-6588
1742-6596
DOI:10.1088/1742-6596/1229/1/012044