Abstract
Compared to 2D face presentation attacks (e.g. printed photos and video replays), 3D type attacks are more challenging to face recognition systems (FRS) by presenting 3D characteristics or materials similar to real faces. Existing 3D face spoofing databases, however, mostly based on 3D masks, are restricted to small data size or poor authenticity due to the production difficulty and high cost. In this work, we introduce the first wax figure face database, WFFD, as one type of super-realistic 3D presentation attacks to spoof the FRS. This database consists of 2200 images with both real and wax figure faces (totally 4400 faces) with a high diversity from online collections. Experiments on this database first investigate the vulnerability of three popular FRS to this kind of new attack. Further, we evaluate the performance of several face presentation attack detection methods to show the attack abilities of this super-realistic face spoofing database.
Supported by Wuhan University.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhang, Z., Yan, J., et al.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 26–31. IEEE (2012)
Erdogmus, N., Marcel, S.: Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–6. IEEE (September 2013)
Liu, S., Yang, B., Yuen, P.C., Zhao, G.: A 3D mask face anti-spoofing database with real world variations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 100–106 (2016)
Galbally, J., Satta, R.: Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models. IET Biometrics 5(2), 83–91 (2016)
Manjani, I., Tariyal, S., Vatsa, M., Singh, R., Majumdar, A.: Detecting silicone mask-based presentation attack via deep dictionary learning. IEEE Trans. Inf. Forensics Secur. 12(7), 1713–1723 (2017)
Agarwal, A., Yadav, D., Kohli, N., Singh, R., Vatsa, M., Noore, A.: Face presentation attack with latex masks in multispectral videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 81–89 (2017)
Bhattacharjee, S., Marcel, S.: What you can’t see can help you-extended-range imaging for 3D-mask presentation attack detection. In 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–7. IEEE (September 2017)
ISO/IEC JTC 1/SC 37 Biometrics, Information Technology–Biometric presentation attack detection–Part 1: Framework. International Organization for Standardization (2016)
Kim, Y., Na, J., Yoon, S., Yi, J.: Masked fake face detection using radiance measurements. JOSA A 26(4), 760–766 (2009)
Zhang, Z., Yi, D., Lei, Z., Li, S.Z.: Face liveness detection by learning multispectral reflectance distributions. In: FG, pp. 436–441 (March 2011)
Steiner, H., Kolb, A., Jung, N.: Reliable face anti-spoofing using multispectral SWIR imaging. In: 2016 International Conference on Biometrics (ICB), pp. 1–8. IEEE (June 2016)
Kose, N., Dugelay, J.L.: Countermeasure for the protection of face recognition systems against mask attacks. In: 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), pp. 1–6. IEEE (April 2013)
Kose, N., Dugelay, J.L.: Shape and texture based countermeasure to protect face recognition systems against mask attacks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 111–116 (2013)
Naveen, S., Fathima, R.S., Moni, R.S.: Face recognition and authentication using LBP and BSIF mask detection and elimination. In: 2016 International Conference on Communication Systems and Networks (ComNet), pp. 99–102. IEEE (July 2016)
Agarwal, A., Singh, R., Vatsa, M.: Face anti-spoofing using Haralick features. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–6. IEEE (September 2016)
Hamdan, B., Mokhtar, K.: The detection of spoofing by 3D mask in a 2D identity recognition system. Egypt. Inform. J. 19(2), 75–82 (2018)
Wang, Y., Chen, S., Li, W., Huang, D., Wang, Y.: Face anti-spoofing to 3D masks by combining texture and geometry features. In: Zhou, J., et al. (eds.) CCBR 2018. LNCS, vol. 10996, pp. 399–408. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97909-0_43
Menotti, D., et al.: Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 864–879 (2015)
Lucena, O., Junior, A., Moia, V., Souza, R., Valle, E., Lotufo, R.: Transfer learning using convolutional neural networks for face anti-spoofing. In: Karray, F., Campilho, A., Cheriet, F. (eds.) ICIAR 2017. LNCS, vol. 10317, pp. 27–34. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59876-5_4
Ali, A., Hoque, S., Deravi, F.: Gaze stability for liveness detection. Pattern Anal. Appl. 21(2), 437–449 (2018)
Liu, S.Q., Lan, X., Yuen, P.C.: Remote photoplethysmography correspondence feature for 3D mask face presentation attack detection. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 558–573 (2018)
Hernandez-Ortega, J., Fierrez, J., Morales, A., Tome, P.: Time analysis of pulse-based face anti-spoofing in visible and NIR. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 544–552 (2018)
Amos, B., Ludwiczuk, B., Satyanarayanan, M.: Openface: a general-purpose face recognition library with mobile applications. CMU Sch. Comput. Sci. 6 (2016)
Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 2636–2640. IEEE (September 2015)
Benlamoudi, A., Samai, D., Ouafi, A., Bekhouche, S.E., Taleb-Ahmed, A., Hadid, A.: Face spoofing detection using multi-level local phase quantization (ML-LPQ). In: Proceeding of the First International Conference on Automatic Control, Telecommunication and signals ICATS15 (November 2015)
Tu, X., Fang, Y.: Ultra-deep neural network for face anti-spoofing. In International Conference on Neural Information Processing, pp. 686–695. Springer, Cham (November 2017). https://doi.org/10.1007/978-3-319-70096-0_70
Kose, N., Dugelay, J.L.: Reflectance analysis based countermeasure technique to detect face mask attacks. In: 2013 18th International Conference on Digital Signal Processing (DSP), pp. 1–6. IEEE (July 2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Jia, S., Hu, C., Guo, G., Xu, Z. (2019). A Database for Face Presentation Attack Using Wax Figure Faces. In: Cristani, M., Prati, A., Lanz, O., Messelodi, S., Sebe, N. (eds) New Trends in Image Analysis and Processing – ICIAP 2019. ICIAP 2019. Lecture Notes in Computer Science(), vol 11808. Springer, Cham. https://doi.org/10.1007/978-3-030-30754-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-30754-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30753-0
Online ISBN: 978-3-030-30754-7
eBook Packages: Computer ScienceComputer Science (R0)