[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Learning Generalizable and Identity-Discriminative Representations for Face Anti-Spoofing

Published: 26 July 2020 Publication History

Abstract

Face anti-spoofing aims to detect presentation attack to face recognition--based authentication systems. It has drawn growing attention due to the high security demand. The widely adopted CNN-based methods usually well recognize the spoofing faces when training and testing spoofing samples display similar patterns, but their performance would drop drastically on testing spoofing faces of novel patterns or unseen scenes, leading to poor generalization performance. Furthermore, almost all current methods treat face anti-spoofing as a prior step to face recognition, which prolongs the response time and makes face authentication inefficient. In this article, we try to boost the generalizability and applicability of face anti-spoofing methods by designing a new generalizable face authentication CNN (GFA-CNN) model with three novelties. First, GFA-CNN introduces a simple yet effective total pairwise confusion loss for CNN training that properly balances contributions of all spoofing patterns for recognizing the spoofing faces. Second, it incorporate a fast domain adaptation component to alleviate negative effects brought by domain variation. Third, it deploys filter diversification learning to make the learned representations more adaptable to new scenes. In addition, the proposed GFA-CNN works in a multi-task manner—it performs face anti-spoofing and face recognition simultaneously. Experimental results on five popular face anti-spoofing and face recognition benchmarks show that GFA-CNN outperforms previous face anti-spoofing methods on cross-test protocols significantly and also well preserves the identity information of input face images.

References

[1]
Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, et al. 2016. TensorFlow: A system for large-scale machine learning. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI’16). 265--283.
[2]
Zinelabdine Boulkenafet, Jukka Komulainen, Zahid Akhtar, Azeddine Benlamoudi, Djamel Samai, Salah Eddine Bekhouche, Abdelkrim Ouafi, et al. 2017a. A competition on generalized software-based face presentation attack detection in mobile scenarios. In Proceedings of the 2017 IEEE International Joint Conference on Biometrics (IJCB’17). IEEE, Los Alamitos, CA, 688--696.
[3]
Zinelabidine Boulkenafet, Jukka Komulainen, and Abdenour Hadid. 2015. Face anti-spoofing based on color texture analysis. In Proceedings of the 2015 IEEE International Conference on Image Processing (ICIP’15). IEEE, Los Alamitos, CA, 2636--2640.
[4]
Zinelabidine Boulkenafet, Jukka Komulainen, and Abdenour Hadid. 2016. Face spoofing detection using colour texture analysis. IEEE Transactions on Information Forensics and Security 11, 8 (2016), 1818--1830.
[5]
Zinelabidine Boulkenafet, Jukka Komulainen, and Abdenour Hadid. 2017b. Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Processing Letters 24, 2 (2017), 141--145.
[6]
Zinelabidine Boulkenafet, Jukka Komulainen, and Abdenour Hadid. 2018. On the generalization of color texture-based face anti-spoofing. Image and Vision Computing 77 (2018), 1--9.
[7]
Zinelabinde Boulkenafet, Jukka Komulainen, Lei Li, Xiaoyi Feng, and Abdenour Hadid. 2017c. OULU-NPU: A mobile face presentation attack database with real-world variations. In Proceedings of the 2017 12th IEEE International Conference on Automatic Face and Gesture Recognition (FG’17). IEEE, Los Alamitos, CA, 612--618.
[8]
Olivier Bousquet and André Elisseeff. 2002. Stability and generalization. Journal of Machine Learning Research 2 (March 2002), 499--526.
[9]
Ivana Chingovska, André Anjos, and Sébastien Marcel. 2012. On the effectiveness of local binary patterns in face anti-spoofing. In Proceedings of the 2012 International Conference of the Biometrics Special Interest Group (BIOSIG’12). IEEE, Los Alamitos, CA, 1--7.
[10]
Tiago de Freitas Pereira, André Anjos, José Mario De Martino, and Sébastien Marcel. 2012. LBP- TOP based countermeasure against face spoofing attacks. In Proceedings of the Asian Conference on Computer Vision. 121--132.
[11]
Tiago de Freitas Pereira, André Anjos, José Mario De Martino, and Sébastien Marcel. 2013. Can face anti-spoofing countermeasures work in a real world scenario? In Proceedings of the 2013 International Conference on Biometrics (ICB’13). IEEE, Los Alamitos, CA, 1--8.
[12]
Jiankang Deng, Jia Guo, Niannan Xue, and Stefanos Zafeiriou. 2019. ArcFace: Additive angular margin loss for deep face recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’19). 4690--4699.
[13]
Abhimanyu Dubey, Otkrist Gupta, Pei Guo, Ramesh Raskar, Ryan Farrell, and Nikhil Naik. 2018. Pairwise confusion for fine-grained visual classification. In Proceedings of the European Conference on Computer Vision (ECCV’18). 70--86.
[14]
Logan Engstrom. 2016. Fast Style Transfer. Retrieved June 17, 2020 from https://github.com/lengstrom/fast-style-transfer/.
[15]
Casey A. Graff and Jeffrey Ellen. 2016. Correlating filter diversity with convolutional neural network accuracy. In Proceedings of the 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA’16). IEEE, Los Alamitos, CA, 75--80.
[16]
Javier Hernandez-Ortega, Julian Fierrez, Aythami Morales, and Pedro Tome. 2018. Time analysis of pulse-based face anti-spoofing in visible and NIR. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops. 544--552.
[17]
Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural Computation 9, 8 (1997), 1735--1780.
[18]
Gary B. Huang, Marwan Mattar, Tamara Berg, and Eric Learned-Miller. 2008. Labeled faces in the wild: A database for studying face recognition in unconstrained environments. In Proceedings of the Workshop on Faces in ‘Real-Life’ Images: Detection, Alignment, and Recognition.
[19]
Justin Johnson, Alexandre Alahi, and Li Fei-Fei. 2016. Perceptual losses for real-time style transfer and super-resolution. In Proceedings of the European Conference on Computer Vision (ECCV’16). 694--711.
[20]
Amin Jourabloo, Yaojie Liu, and Xiaoming Liu. 2018. Face de-spoofing: Anti-spoofing via noise modeling. In Computer Vision—ECCV 2018. Lecture Notes in Computer Science, Vol. 11217. Springer, 297--315.
[21]
Klaus Kollreider, Hartwig Fronthaler, Maycel Isaac Faraj, and Josef Bigun. 2007. Real-time face detection and motion analysis with application in “liveness” assessment. IEEE Transactions on Information Forensics and Security 2, 3 (2007), 548--558.
[22]
Jukka Komulainen, Abdenour Hadid, and Matti Pietikäinen. 2013. Context based face anti-spoofing. In Proceedings of the 2013 IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems (BTAS’13). IEEE, Los Alamitos, CA, 1--8.
[23]
Haoliang Li, Peisong He, Shiqi Wang, Anderson Rocha, Xinghao Jiang, and Alex C. Kot. 2018a. Learning generalized deep feature representation for face anti-spoofing. IEEE Transactions on Information Forensics and Security 13, 10 (2018), 2639--2652.
[24]
Haoliang Li, Wen Li, Hong Cao, Shiqi Wang, Feiyue Huang, and Alex C. Kot. 2018b. Unsupervised domain adaptation for face anti-spoofing. IEEE Transactions on Information Forensics and Security 13, 7 (2018), 1794--1809.
[25]
Yixuan Li, Jason Yosinski, Jeff Clune, Hod Lipson, and John E. Hopcroft. 2015. Convergent learning: Do different neural networks learn the same representations? In Proceedings of the 1st Workshop on Feature Extraction: Modern Questions and Challenges at NIPS 2015 (FE@NIPS’15). 196--212.
[26]
Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, and C. Lawrence Zitnick. 2014. Microsoft COCO: Common objects in context. In Proceedings of the European Conference on Computer Vision (ECCV’14). 740--755.
[27]
Siqi Liu, Pong C. Yuen, Shengping Zhang, and Guoying Zhao. 2016. 3D mask face anti-spoofing with remote photoplethysmography. In Proceedings of the European Conference on Computer Vision (ECCV’16). 85--100.
[28]
Yaojie Liu, Amin Jourabloo, and Xiaoming Liu. 2018. Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’18). 389--398.
[29]
Gang Pan, Lin Sun, Zhaohui Wu, and Shihong Lao. 2007. Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In Proceedings of the 2007 IEEE 11th International Conference on Computer Vision (ICCV’07). 1--8.
[30]
Xingang Pan, Ping Luo, Jianping Shi, and Xiaoou Tang. 2018. Two at once: Enhancing learning and generalization capacities via IBN-Net. In Computer Vision—ECCV 2018. Lecture Notes in Computer Science, Vol. 11208. Springer, 484--500.
[31]
Alec Radford, Luke Metz, and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv:1511.06434.
[32]
Aruni RoyChowdhury, Prakhar Sharma, and Erik Learned-Miller. 2017. Reducing duplicate filters in deep neural networks. In Proceedings of the NIPS Workshop on Deep Learning: Bridging Theory and Practice, Vol. 1.
[33]
Muhammad Sajjad, Salman Khan, Tanveer Hussain, Khan Muhammad, Arun Kumar Sangaiah, Aniello Castiglione, Christian Esposito, and Sung Wook Baik. 2018. CNN-based anti-spoofing two-tier multi-factor authentication system. Pattern Recognition Letters 126 (2018), 123--131.
[34]
William Robson Schwartz, Anderson Rocha, and Helio Pedrini. 2011. Face spoofing detection through partial least squares and low-level descriptors. In Proceedings of the 2011 International Joint Conference on Biometrics (IJCB’11). IEEE, Los Alamitos, CA, 1--8.
[35]
Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556.
[36]
Yi Sun, Xiaogang Wang, and Xiaoou Tang. 2014. Deep learning face representation from predicting 10,000 classes. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’14). 1891--1898.
[37]
Roberto Tronci, Daniele Muntoni, Gianluca Fadda, Maurizio Pili, Nicola Sirena, Gabriele Murgia, Marco Ristori, Sardegna Ricerche, and Fabio Roli. 2011. Fusion of multiple clues for photo-attack detection in face recognition systems. In Proceedings of the 2011 International Joint Conference on Biometrics (IJCB’11). IEEE, Los Alamitos, CA, 1--6.
[38]
Xiaoguang Tu, Hengsheng Zhang, Mei Xie, Yao Luo, Yuefei Zhang, and Zheng Ma. 2019a. Deep transfer across domains for face anti-spoofing. arXiv:1901.05633.
[39]
Xiaoguang Tu, Hengsheng Zhang, Mei Xie, Yao Luo, Yuefei Zhang, and Zheng Ma. 2019b. Enhance the motion cues for face anti-spoofing using CNN-LSTM architecture. arXiv:1901.05635.
[40]
Guoqing Wang, Hu Han, Shiguang Shan, and Xilin Chen. 2019. Improving cross-database face presentation attack detection via adversarial domain adaptation. In Proceedings of the International Conference on Biometrics (ICB’19).
[41]
Di Wen, Hu Han, and Anil K. Jain. 2015. Face spoof detection with image distortion analysis. IEEE Transactions on Information Forensics and Security 10, 4 (2015), 746--761.
[42]
Zhenqi Xu, Shan Li, and Weihong Deng. 2015. Learning temporal features using LSTM-CNN architecture for face anti-spoofing. In Proceedings of the 2015 3rd IAPR Asian Conference on Pattern Recognition (ACPR’15). IEEE, Los Alamitos, CA, 141--145.
[43]
Jianwei Yang, Zhen Lei, and Stan Z. Li. 2014. Learn convolutional neural network for face anti-spoofing. arXiv:1408.5601.
[44]
Jianwei Yang, Zhen Lei, Shengcai Liao, and Stan Z. Li. 2013. Face liveness detection with component dependent descriptor. In Proceedings of the 2013 International Conference on Biometrics (ICB’13). IEEE, Los Alamitos, CA, 1--6.
[45]
Zhiwei Zhang, Junjie Yan, Sifei Liu, Zhen Lei, Dong Yi, and Stan Z. Li. 2012. A face antispoofing database with diverse attacks. In Proceedings of the 2012 5th IAPR International Conference on Biometrics (ICB’12). IEEE, Los Alamitos, CA, 26--31.
[46]
Jian Zhao, Lin Xiong, Panasonic Karlekar Jayashree, Jianshu Li, Fang Zhao, Zhecan Wang, Panasonic Sugiri Pranata, Panasonic Shengmei Shen, Shuicheng Yan, and Jiashi Feng. 2017. Dual-agent GANs for photorealistic and identity preserving profile face synthesis. In Advances in Neural Information Processing Systems. 66--76.
[47]
Fengshun Zhou, Chenqiang Gao, Fang Chen, Chaoyu Li, Xindou Li, Feng Yang, and Yue Zhao. 2019. Face anti-spoofing based on multi-layer domain adaptation. In Proceedings of the 2019 IEEE International Conference on Multimedia and Expo Workshops (ICMEW’19). IEEE, Los Alamitos, CA, 192--197.

Cited By

View all
  • (2025)Unmasking Deception: A Comprehensive Survey on the Evolution of Face Anti‐spoofing MethodsNeurocomputing10.1016/j.neucom.2024.128992617(128992)Online publication date: Feb-2025
  • (2024)Representasi Identitas Virtual dalam Komunikasi Mahasiswa Urban di Instagram: Studi Netnografi pada Universitas Pembangunan JayaJurnal Bisnis dan Komunikasi Digital10.47134/jbkd.v1i3.25171:3(13)Online publication date: 20-May-2024
  • (2024)AVENUE: A Novel Deepfake Detection Method Based on Temporal Convolutional Network and rPPG InformationACM Transactions on Intelligent Systems and Technology10.1145/370223216:1(1-16)Online publication date: 28-Oct-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Intelligent Systems and Technology
ACM Transactions on Intelligent Systems and Technology  Volume 11, Issue 5
Survey Paper and Regular Paper
October 2020
325 pages
ISSN:2157-6904
EISSN:2157-6912
DOI:10.1145/3409643
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 July 2020
Accepted: 01 May 2020
Revised: 01 April 2020
Received: 01 November 2019
Published in TIST Volume 11, Issue 5

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Deep learning
  2. computer vision
  3. domain adaptation
  4. face anti-spoofing
  5. face recognition

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • National Key Research and Development Program of China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)34
  • Downloads (Last 6 weeks)5
Reflects downloads up to 18 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Unmasking Deception: A Comprehensive Survey on the Evolution of Face Anti‐spoofing MethodsNeurocomputing10.1016/j.neucom.2024.128992617(128992)Online publication date: Feb-2025
  • (2024)Representasi Identitas Virtual dalam Komunikasi Mahasiswa Urban di Instagram: Studi Netnografi pada Universitas Pembangunan JayaJurnal Bisnis dan Komunikasi Digital10.47134/jbkd.v1i3.25171:3(13)Online publication date: 20-May-2024
  • (2024)AVENUE: A Novel Deepfake Detection Method Based on Temporal Convolutional Network and rPPG InformationACM Transactions on Intelligent Systems and Technology10.1145/370223216:1(1-16)Online publication date: 28-Oct-2024
  • (2024)Presentation Attack Detection: A Systematic Literature ReviewACM Computing Surveys10.1145/368726457:1(1-32)Online publication date: 7-Oct-2024
  • (2024)IFAST: Weakly Supervised Interpretable Face Anti-Spoofing From Single-Shot Binocular NIR ImagesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.346593019(9270-9284)Online publication date: 1-Jan-2024
  • (2024)Enhancing Transferability of Adversarial Examples Through Mixed-Frequency InputsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.343050819(7633-7645)Online publication date: 1-Jan-2024
  • (2024)Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face SwappingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.338364819(4628-4641)Online publication date: 8-May-2024
  • (2024)Cross-Scenario Unknown-Aware Face Anti-Spoofing With Evidential Semantic Consistency LearningIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335623419(3093-3108)Online publication date: 2024
  • (2024)Task-Specific Importance-Awareness Matters: On Targeted Attacks Against Object DetectionIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2024.342565534:11_Part_2(11619-11629)Online publication date: 9-Jul-2024
  • (2024)A Novel High-Performance Face Anti-Spoofing Detection MethodIEEE Access10.1109/ACCESS.2024.340028512(67379-67391)Online publication date: 2024
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media