DocumentCode
51899
Title
Face Spoof Detection With Image Distortion Analysis
Author
Di Wen ; Hu Han ; Jain, Anil K.
Author_Institution
Dept. of Comput. Sci. & Eng., Michigan State Univ., East Lansing, MI, USA
Volume
10
Issue
4
fYear
2015
fDate
Apr-15
Firstpage
746
Lastpage
761
Abstract
Automatic face recognition is now widely used in applications ranging from deduplication of identity to authentication of mobile payment. This popularity of face recognition has raised concerns about face spoof attacks (also known as biometric sensor presentation attacks), where a photo or video of an authorized person´s face could be used to gain access to facilities or services. While a number of face spoof detection techniques have been proposed, their generalization ability has not been adequately addressed. We propose an efficient and rather robust face spoof detection algorithm based on image distortion analysis (IDA). Four different features (specular reflection, blurriness, chromatic moment, and color diversity) are extracted to form the IDA feature vector. An ensemble classifier, consisting of multiple SVM classifiers trained for different face spoof attacks (e.g., printed photo and replayed video), is used to distinguish between genuine (live) and spoof faces. The proposed approach is extended to multiframe face spoof detection in videos using a voting-based scheme. We also collect a face spoof database, MSU mobile face spoofing database (MSU MFSD), using two mobile devices (Google Nexus 5 and MacBook Air) with three types of spoof attacks (printed photo, replayed video with iPhone 5S, and replayed video with iPad Air). Experimental results on two public-domain face spoof databases (Idiap REPLAY-ATTACK and CASIA FASD), and the MSU MFSD database show that the proposed approach outperforms the state-of-the-art methods in spoof detection. Our results also highlight the difficulty in separating genuine and spoof faces, especially in cross-database and cross-device scenarios.
Keywords
face recognition; mobile computing; pattern classification; support vector machines; video signal processing; visual databases; Google Nexus 5; IDA feature vector; MSU MFSD; MSU MFSD database; MSU mobile face spoofing database; MacBook Air; automatic face recognition; cross-database scenarios; cross-device scenarios; ensemble classifier; face recognition; face spoof attacks; identity deduplication; image distortion analysis; mobile devices; mobile payment authentication; multiframe face spoof detection; multiple SVM classifiers; public-domain face spoof databases; spoof attacks; videos; voting-based scheme; Cameras; Databases; Face; Face recognition; Feature extraction; Image color analysis; Testing; Face recognition; cross-database; cross-device; ensemble classifier; image distortion analysis; spoof detection;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2015.2400395
Filename
7031384
Link To Document