[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Gaze stability for liveness detection

Published: 01 May 2018 Publication History

Abstract

Spoofing attacks on biometric systems are one of the major impediments to their use for secure unattended applications. This paper explores features for face liveness detection based on tracking the gaze of the user. In the proposed approach, a visual stimulus is placed on the display screen, at apparently random locations, which the user is required to follow while their gaze is measured. This visual stimulus appears in such a way that it repeatedly directs the gaze of the user to specific positions on the screen. Features extracted from sets of collinear and colocated points are used to estimate the liveness of the user. Data are collected from genuine users tracking the stimulus with natural head/eye movements and impostors holding a photograph, looking through a 2D mask or replaying the video of a genuine user. The choice of stimulus and features are based on the assumption that natural head/eye coordination for directing gaze results in a greater accuracy and thus can be used to effectively differentiate between genuine and spoofing attempts. Tests are performed to assess the effectiveness of the system with these features in isolation as well as in combination with each other using score fusion techniques. The results from the experiments indicate the effectiveness of the proposed gaze-based features in detecting such presentation attacks.

References

[1]
Tronci R, Muntoni D, Fadda G, Pili M, Sirena N, Murgia G, Ristori M, Roli F (2011) Fusion of multiple clues for photo-attack detection in face recognition systems. In: 2011 International joint conference on biometrics (IJCB), pp 1---6
[2]
Ali A, Deravi F, Hoque S (2012) Liveness detection using gaze collinearity. In: 2012 Third international conference on emerging security technologies (EST), pp 62---65
[3]
Ali A, Deravi F, Hoque S (2013) Spoofing attempt detection using gaze Colocation. In: 2013 International conference of the biometrics special interest group (BIOSIG), pp 1---12
[4]
Pan G, Sun L, Wu Z, Lao S (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: IEEE 11th International conference on in computer vision 2007. ICCV 2007, pp 1---8
[5]
Jee H-K, Jung S-U, Yoo J-H (2006) Liveness detection for embedded face recognition system. Int J Biomed Sci 1(4):235---238
[6]
Wang L, Ding X, Fang C (2009) Face live detection method based on physiological motion analysis. Tsinghua Sci Technol 14(6):685---690
[7]
Kollreider K, Fronthaler H, Bigun J (2009) Non-intrusive liveness detection by face images. Image Vis Comput 27(3):233---244
[8]
Kollreider K, Fronthaler H, Bigun J (2008) Verifying liveness by multiple experts in face biometrics. In: IEEE computer society conference on computer vision and pattern recognition workshops, 2008. CVPRW '08, pp 1---6
[9]
Kollreider K, Fronthaler H, Bigun J (2005) Evaluating liveness by face images and the structure tensor. In: Fourth IEEE workshop on automatic identification advanced technologies, pp 75---80
[10]
Li J, Wang Y, Tan T, Jain AK (2004) Live face detection based on the analysis of fourier spectra. In: Defense and Security. International society for optics and photonics, pp 296---303
[11]
Kim G, Eum S, Suhr JK, Kim DI, Park KR, Kim J (2012) Face liveness detection based on texture and frequency analyses. In: 2012 5th IAPR international conference on biometrics (ICB), pp 67---72
[12]
Komulainen J, Hadid A, Pietikäinen M (2013) Face spoofing detection using dynamic texture. In: 2012 Workshops computer vision-ACCV. Springer, pp 146---157
[13]
Komulainen J, Hadid A, Pietikainen M, Anjos A, Marcel S (2013)Complementary countermeasures for detecting scenic face spoofing attacks. In: 2013 International conference on biometrics (ICB), pp 1---7
[14]
Blum AL, Langley P (1997) Selection of relevant features and examples in machine learning. Artif Intell 97(1):245---271
[15]
Nunez AS (2009) A physical model of human skin and its application for search and rescue. DTIC Document, Technical report
[16]
Ryer DM, Bihl TJ, Bauer KW, Rogers SK (2012) Quest hierarchy for hyperspectral face recognition. Adv Artif Intell 2012:1
[17]
da Silva Pinto A, Pedrini H, Schwartz W, Rocha A (2012) Video-based face spoofing detection through visual rhythm analysis. In: 2012 25th SIBGRAPI conference on graphics, patterns and images (SIBGRAPI), pp 221---228
[18]
Frischholz R, Werner A (2003) Avoiding replay-attacks in a face recognition system using head-pose estimation. In: IEEE international workshop on analysis and modeling of faces and gestures, 2003. AMFG 2003, pp 234---235
[19]
Sharma DCKN (2013) Fake face detection based on skin elasticity. Int J Adv Res Comput Sci Softw Eng 3(5):1048---1051
[20]
Pelz J, Hayhoe M, Loeber R (2001) The coordination of eye, head, and hand movements in a natural task. Exp Brain Res 139(3):266---277
[21]
Volkmann FC (1986) Human visual suppression. Vis Res 26(9):1401---1416
[22]
Land MF (2006) Eye movements and the control of actions in everyday life. Prog. Retin Eye Res 25(3):296---324
[23]
Milborrow S, Nicolls F (2008) Locating facial features with an extended active shape model. In: Computer Vision-ECCV. Springer, pp 504---513
[24]
Jain A, Nandakumar K, Ross A (2005) Score normalization in multimodal biometric systems. Pattern Recogn 38(12):2270---2285
[25]
Singh AK, Joshi P, Nandi G (2014) Face recognition with liveness detection using eye and mouth movement. In: 2014 International conference on signal propagation and computer technology (ICSPCT). IEEE, pp 592---597
[26]
Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG--Proceedings of the international conference of the biometrics special interest group (BIOSIG), pp 1---7
[27]
Ross A, Jain A (2003) Information fusion in biometrics. Pattern Recogn Lett 24(13):2115---2125
[28]
Fawcett T (2004) Roc graphs: notes and practical considerations for researchers. Mach Learn 31:1---38
[29]
Kollreider K, Fronthaler H, Faraj M, Bigun J (2007) Real-time face detection and motion analysis with application in liveness assessment. IEEE Trans Inf Forens Secur 2(3):548---558
[30]
Peixoto B, Michelassi C, Rocha A (2011) Face liveness detection under bad illumination conditions. In: 2011 18th IEEE international conference on image processing (ICIP), pp 3557---3560
[31]
Chingovska I, Yang J, Lei Z, Yi D, Li SZ, Kahm O, Glaser C, Darner N, Kuijper A, Nouak A et al (2013) The 2nd competition on counter measures to 2D face spoofing attacks. In: ICB, pp 1---6

Cited By

View all
  • (2021)IriTrackProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/34635155:2(1-21)Online publication date: 24-Jun-2021
  • (2019)A Database for Face Presentation Attack Using Wax Figure FacesNew Trends in Image Analysis and Processing – ICIAP 201910.1007/978-3-030-30754-7_5(39-47)Online publication date: 9-Sep-2019

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Pattern Analysis & Applications
Pattern Analysis & Applications  Volume 21, Issue 2
May 2018
313 pages
ISSN:1433-7541
EISSN:1433-755X
Issue’s Table of Contents

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 May 2018

Author Tags

  1. Biometrics
  2. Feature extraction
  3. Fusion
  4. Liveness
  5. Presentation attacks
  6. Spoofing

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)IriTrackProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/34635155:2(1-21)Online publication date: 24-Jun-2021
  • (2019)A Database for Face Presentation Attack Using Wax Figure FacesNew Trends in Image Analysis and Processing – ICIAP 201910.1007/978-3-030-30754-7_5(39-47)Online publication date: 9-Sep-2019

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media