[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Database for Face Presentation Attack Using Wax Figure Faces

  • Conference paper
  • First Online:
New Trends in Image Analysis and Processing – ICIAP 2019 (ICIAP 2019)

Abstract

Compared to 2D face presentation attacks (e.g. printed photos and video replays), 3D type attacks are more challenging to face recognition systems (FRS) by presenting 3D characteristics or materials similar to real faces. Existing 3D face spoofing databases, however, mostly based on 3D masks, are restricted to small data size or poor authenticity due to the production difficulty and high cost. In this work, we introduce the first wax figure face database, WFFD, as one type of super-realistic 3D presentation attacks to spoof the FRS. This database consists of 2200 images with both real and wax figure faces (totally 4400 faces) with a high diversity from online collections. Experiments on this database first investigate the vulnerability of three popular FRS to this kind of new attack. Further, we evaluate the performance of several face presentation attack detection methods to show the attack abilities of this super-realistic face spoofing database.

Supported by Wuhan University.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 47.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 59.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    http://thatsmyface.com/.

  2. 2.

    https://www.sharebot.it. and http://www.cubify.com.

  3. 3.

    http://real-f.jp/en_the-realface.html.

References

  1. Zhang, Z., Yan, J., et al.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 26–31. IEEE (2012)

    Google Scholar 

  2. Erdogmus, N., Marcel, S.: Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–6. IEEE (September 2013)

    Google Scholar 

  3. Liu, S., Yang, B., Yuen, P.C., Zhao, G.: A 3D mask face anti-spoofing database with real world variations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 100–106 (2016)

    Google Scholar 

  4. Galbally, J., Satta, R.: Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models. IET Biometrics 5(2), 83–91 (2016)

    Article  Google Scholar 

  5. Manjani, I., Tariyal, S., Vatsa, M., Singh, R., Majumdar, A.: Detecting silicone mask-based presentation attack via deep dictionary learning. IEEE Trans. Inf. Forensics Secur. 12(7), 1713–1723 (2017)

    Article  Google Scholar 

  6. Agarwal, A., Yadav, D., Kohli, N., Singh, R., Vatsa, M., Noore, A.: Face presentation attack with latex masks in multispectral videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 81–89 (2017)

    Google Scholar 

  7. Bhattacharjee, S., Marcel, S.: What you can’t see can help you-extended-range imaging for 3D-mask presentation attack detection. In 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–7. IEEE (September 2017)

    Google Scholar 

  8. ISO/IEC JTC 1/SC 37 Biometrics, Information Technology–Biometric presentation attack detection–Part 1: Framework. International Organization for Standardization (2016)

    Google Scholar 

  9. Kim, Y., Na, J., Yoon, S., Yi, J.: Masked fake face detection using radiance measurements. JOSA A 26(4), 760–766 (2009)

    Article  Google Scholar 

  10. Zhang, Z., Yi, D., Lei, Z., Li, S.Z.: Face liveness detection by learning multispectral reflectance distributions. In: FG, pp. 436–441 (March 2011)

    Google Scholar 

  11. Steiner, H., Kolb, A., Jung, N.: Reliable face anti-spoofing using multispectral SWIR imaging. In: 2016 International Conference on Biometrics (ICB), pp. 1–8. IEEE (June 2016)

    Google Scholar 

  12. Kose, N., Dugelay, J.L.: Countermeasure for the protection of face recognition systems against mask attacks. In: 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), pp. 1–6. IEEE (April 2013)

    Google Scholar 

  13. Kose, N., Dugelay, J.L.: Shape and texture based countermeasure to protect face recognition systems against mask attacks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 111–116 (2013)

    Google Scholar 

  14. Naveen, S., Fathima, R.S., Moni, R.S.: Face recognition and authentication using LBP and BSIF mask detection and elimination. In: 2016 International Conference on Communication Systems and Networks (ComNet), pp. 99–102. IEEE (July 2016)

    Google Scholar 

  15. Agarwal, A., Singh, R., Vatsa, M.: Face anti-spoofing using Haralick features. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–6. IEEE (September 2016)

    Google Scholar 

  16. Hamdan, B., Mokhtar, K.: The detection of spoofing by 3D mask in a 2D identity recognition system. Egypt. Inform. J. 19(2), 75–82 (2018)

    Article  Google Scholar 

  17. Wang, Y., Chen, S., Li, W., Huang, D., Wang, Y.: Face anti-spoofing to 3D masks by combining texture and geometry features. In: Zhou, J., et al. (eds.) CCBR 2018. LNCS, vol. 10996, pp. 399–408. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97909-0_43

    Chapter  Google Scholar 

  18. Menotti, D., et al.: Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 864–879 (2015)

    Article  Google Scholar 

  19. Lucena, O., Junior, A., Moia, V., Souza, R., Valle, E., Lotufo, R.: Transfer learning using convolutional neural networks for face anti-spoofing. In: Karray, F., Campilho, A., Cheriet, F. (eds.) ICIAR 2017. LNCS, vol. 10317, pp. 27–34. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59876-5_4

    Chapter  Google Scholar 

  20. Ali, A., Hoque, S., Deravi, F.: Gaze stability for liveness detection. Pattern Anal. Appl. 21(2), 437–449 (2018)

    Article  MathSciNet  Google Scholar 

  21. Liu, S.Q., Lan, X., Yuen, P.C.: Remote photoplethysmography correspondence feature for 3D mask face presentation attack detection. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 558–573 (2018)

    Chapter  Google Scholar 

  22. Hernandez-Ortega, J., Fierrez, J., Morales, A., Tome, P.: Time analysis of pulse-based face anti-spoofing in visible and NIR. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 544–552 (2018)

    Google Scholar 

  23. http://www.neurotechnology.com/verilook.html

  24. Amos, B., Ludwiczuk, B., Satyanarayanan, M.: Openface: a general-purpose face recognition library with mobile applications. CMU Sch. Comput. Sci. 6 (2016)

    Google Scholar 

  25. https://www.faceplusplus.com/face-compare-sdk/

  26. Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 2636–2640. IEEE (September 2015)

    Google Scholar 

  27. Benlamoudi, A., Samai, D., Ouafi, A., Bekhouche, S.E., Taleb-Ahmed, A., Hadid, A.: Face spoofing detection using multi-level local phase quantization (ML-LPQ). In: Proceeding of the First International Conference on Automatic Control, Telecommunication and signals ICATS15 (November 2015)

    Google Scholar 

  28. Tu, X., Fang, Y.: Ultra-deep neural network for face anti-spoofing. In International Conference on Neural Information Processing, pp. 686–695. Springer, Cham (November 2017). https://doi.org/10.1007/978-3-319-70096-0_70

    Chapter  Google Scholar 

  29. Kose, N., Dugelay, J.L.: Reflectance analysis based countermeasure technique to detect face mask attacks. In: 2013 18th International Conference on Digital Signal Processing (DSP), pp. 1–6. IEEE (July 2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhengquan Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jia, S., Hu, C., Guo, G., Xu, Z. (2019). A Database for Face Presentation Attack Using Wax Figure Faces. In: Cristani, M., Prati, A., Lanz, O., Messelodi, S., Sebe, N. (eds) New Trends in Image Analysis and Processing – ICIAP 2019. ICIAP 2019. Lecture Notes in Computer Science(), vol 11808. Springer, Cham. https://doi.org/10.1007/978-3-030-30754-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30754-7_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30753-0

  • Online ISBN: 978-3-030-30754-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics