Face anti-spoofing with multifeature videolet aggregation
Biometric systems can be attacked in several ways and the most common being spoofing the input sensor. Therefore, anti-spoofing is one of the most essential prerequisite against attacks on biometric systems. For face recognition it is even more vulnerable as the image capture is non-contact based. S...
Saved in:
Published in | 2016 23rd International Conference on Pattern Recognition (ICPR) pp. 1035 - 1040 |
---|---|
Main Authors | , , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2016
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/ICPR.2016.7899772 |
Cover
Loading…
Abstract | Biometric systems can be attacked in several ways and the most common being spoofing the input sensor. Therefore, anti-spoofing is one of the most essential prerequisite against attacks on biometric systems. For face recognition it is even more vulnerable as the image capture is non-contact based. Several anti-spoofing methods have been proposed in the literature for both contact and non-contact based biometric modalities often using video to study the temporal characteristics of a real vs. spoofed biometric signal. This paper presents a novel multi-feature evidence aggregation method for face spoofing detection. The proposed method fuses evidence from features encoding of both texture and motion (liveness) properties in the face and also the surrounding scene regions. The feature extraction algorithms are based on a configuration of local binary pattern and motion estimation using histogram of oriented optical flow. Furthermore, the multi-feature windowed videolet aggregation of these orthogonal features coupled with support vector machine-based classification provides robustness to different attacks. We demonstrate the efficacy of the proposed approach by evaluating on three standard public databases: CASIA-FASD, 3DMAD and MSU-MFSD with equal error rate of 3.14%, 0%, and 0%, respectively. |
---|---|
AbstractList | Biometric systems can be attacked in several ways and the most common being spoofing the input sensor. Therefore, anti-spoofing is one of the most essential prerequisite against attacks on biometric systems. For face recognition it is even more vulnerable as the image capture is non-contact based. Several anti-spoofing methods have been proposed in the literature for both contact and non-contact based biometric modalities often using video to study the temporal characteristics of a real vs. spoofed biometric signal. This paper presents a novel multi-feature evidence aggregation method for face spoofing detection. The proposed method fuses evidence from features encoding of both texture and motion (liveness) properties in the face and also the surrounding scene regions. The feature extraction algorithms are based on a configuration of local binary pattern and motion estimation using histogram of oriented optical flow. Furthermore, the multi-feature windowed videolet aggregation of these orthogonal features coupled with support vector machine-based classification provides robustness to different attacks. We demonstrate the efficacy of the proposed approach by evaluating on three standard public databases: CASIA-FASD, 3DMAD and MSU-MFSD with equal error rate of 3.14%, 0%, and 0%, respectively. |
Author | Dhamecha, Tejas I. Singh, Richa Agarwal, Akshay Siddiqui, Talha Ahmad Vatsa, Mayank Ratha, Nalini Bharadwaj, Samarth |
Author_xml | – sequence: 1 givenname: Talha Ahmad surname: Siddiqui fullname: Siddiqui, Talha Ahmad organization: IIIT-Delhi, New Delhi, India – sequence: 2 givenname: Samarth surname: Bharadwaj fullname: Bharadwaj, Samarth organization: Res. Labs., IBM, Yorktown Heights, NY, USA – sequence: 3 givenname: Tejas I. surname: Dhamecha fullname: Dhamecha, Tejas I. organization: Res. Labs., IBM, Yorktown Heights, NY, USA – sequence: 4 givenname: Akshay surname: Agarwal fullname: Agarwal, Akshay organization: IIIT-Delhi, New Delhi, India – sequence: 5 givenname: Mayank surname: Vatsa fullname: Vatsa, Mayank organization: IIIT-Delhi, New Delhi, India – sequence: 6 givenname: Richa surname: Singh fullname: Singh, Richa organization: IIIT-Delhi, New Delhi, India – sequence: 7 givenname: Nalini surname: Ratha fullname: Ratha, Nalini organization: Res. Labs., IBM, Yorktown Heights, NY, USA |
BookMark | eNotz81KAzEUQOEIutDaBxA38wIz3vzeZCmD1UKhIt2XTLwZA9OkTFPFt3dhV2f3wblj17lkYuyBQ8c5uKd1__7RCeCmQ-scorhiS4eWa3CgrEJxy9zKB2p8rqk9HUuJKY_NT6pfzeE81RTJ1_NMzXf6pDJRbfw4zjT6mkq-ZzfRTydaXrpgu9XLrn9rN9vXdf-8aZOD2houpQ4KwVFUHgYgzSFAMMZj1BLQDVoKa4KIaLQkbjnooLmOqFAPJBfs8Z9NRLQ_zung59_95Uf-AYjkQ18 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICPR.2016.7899772 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781509048472 1509048472 |
EndPage | 1040 |
ExternalDocumentID | 7899772 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i90t-61335c4709ef4a0b0e510c0c66a7f53079b53286c2f7653e18105c515f7475be3 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:37:47 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-61335c4709ef4a0b0e510c0c66a7f53079b53286c2f7653e18105c515f7475be3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_7899772 |
PublicationCentury | 2000 |
PublicationDate | 2016-Dec. |
PublicationDateYYYYMMDD | 2016-12-01 |
PublicationDate_xml | – month: 12 year: 2016 text: 2016-Dec. |
PublicationDecade | 2010 |
PublicationTitle | 2016 23rd International Conference on Pattern Recognition (ICPR) |
PublicationTitleAbbrev | ICPR |
PublicationYear | 2016 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 2.147495 |
Snippet | Biometric systems can be attacked in several ways and the most common being spoofing the input sensor. Therefore, anti-spoofing is one of the most essential... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1035 |
SubjectTerms | Biometrics (access control) Encoding Face Feature extraction Histograms Support vector machines |
Title | Face anti-spoofing with multifeature videolet aggregation |
URI | https://ieeexplore.ieee.org/document/7899772 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB7anjyptOKbPXg023R38zoXSxWUIhV6K9l0UoqwFdle_PVOsmtF8eAthEAek_DNl3wzAbiRuMqsHWlWZGhY4bxhWlvNnDIjy9UqYGBQWzzJ6UvxsBCLDtzuY2EQMYrPMA3F-Ja_2rpduCobKiIH5A12oUvErYnVah8qR9wM78ez56DVkmnb7seHKREvJofw-NVTIxN5TXd1mbqPX0kY_zuUIxh8R-Ylsz3mHEMHqz6YiaVqWqINI5JKu6VaJ-F-NYlqQY8xd2cSAu62ZKXEroljr6NFBjCf3M3HU9Z-icA2htfE8_JcuEJxg76wvORIR8pxJ6VVXtBxNaXIMy1d5pUUORJ8c-HIZfHEGkSJ-Qn0qm2Fp5Dk0mQ-KwtHPmBBLMYQcXDKk4W0VcLrM-iHWS_fmqQXy3bC539XX8BBWPlG53EJvfp9h1eE1nV5Hc30Cc6NlcI |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MedCTyib-tgePpsva_DwPx6bbGDJht5FmyRhCJ9Jd_Ot9aetE8eCthEKTfA3f-5LvvQDcCbdMjOkqwhKnCbNeE6WMIlbqrqFyGTgwuC0mYvDCHud83oD7XS6Mc640n7k4PJZn-cuN3Yatso5EcYDR4B7sI-8zXWVr1UeVXao7w970Obi1RFy_-ePKlJIx-kcw_vpWZRR5jbdFFtuPX2UY_9uZY2h_5-ZF0x3rnEDD5S3QfYPNOElrgjIV_5d8FYUd1qj0C3pXVu-MQsrdBnGKzApV9qrEpA2z_sOsNyD1pQhkrWmBSi9NuWWSaueZoRl1uKgstUIY6TkuWJ3xNFHCJl4KnjokcMotBi0edQPPXHoKzXyTuzOIUqETn2TMYhTIUMdolA5WesRIGcm9OodWGPXirSp7sagHfPF38y0cDGbj0WI0nDxdwmFAoXJ9XEGzeN-6a-TuIrspIfsE3n2ZEg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+23rd+International+Conference+on+Pattern+Recognition+%28ICPR%29&rft.atitle=Face+anti-spoofing+with+multifeature+videolet+aggregation&rft.au=Siddiqui%2C+Talha+Ahmad&rft.au=Bharadwaj%2C+Samarth&rft.au=Dhamecha%2C+Tejas+I.&rft.au=Agarwal%2C+Akshay&rft.date=2016-12-01&rft.pub=IEEE&rft.spage=1035&rft.epage=1040&rft_id=info:doi/10.1109%2FICPR.2016.7899772&rft.externalDocID=7899772 |