[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

IriTrack: Face Presentation Attack Detection Using Iris Tracking

Published: 24 June 2021 Publication History

Abstract

With a growing adoption of face authentication systems in various application scenarios, face Presentation Attack Detection (PAD) has become of great importance to withstand artefacts. Existing methods of face PAD generally focus on designing intelligent classifiers or customized hardware to differentiate between the image or video samples of a real legitimate user and the imitated ones. Although effective, they can be resource-consuming and suffer from performance degradation due to environmental changes.
In this paper, we propose IriTrack, which is a simple and efficient PAD system that takes iris movement as a significant evidence to identify face artefacts. More concretely, users are required to move their eyes along with a randomly generated poly-line, where the resulting trajectories of their irises are used as an evidence for PAD i.e., a presentation attack will be identified if the deviation of one's actual iris trajectory from the given poly-line exceeds a threshold. The threshold is carefully selected to balance the latency and accuracy of PAD. We have implemented a prototype and conducted extensive experiments to evaluate the performance of the proposed system. The results show that IriTrack can defend against artefacts with moderate time and memory overheads.

References

[1]
2020. Facial Recognition Market- Global Industry Analysis and Forecast 2015-2022. https://www.transparencymarketresearch.com/facial-recognition-market.html. (Accessed on 05/24/2018).
[2]
2020. SmartGates. https://www.abf.gov.au/entering-and-leaving-australia/smartgates/arrivals. Accessed Nov 7, 2019.
[3]
2020. Windows Hello | Windows 10 | Microsoft. https://www.microsoft.com/en-us/windows/windows-hello. Accessed May 24, 2018.
[4]
Z. Akhtar, C. Micheloni, and G. L. Foresti. 2015. Biometric Liveness Detection: Challenges and Research Opportunities. IEEE Secur. Priv. 13, 5 (2015), 63--72. https://doi.org/10.1109/MSP.2015.116
[5]
A. Ali, S. Hoque, and F. Deravi. 2018. Gaze stability for liveness detection. Pattern Anal. Appl. 21, 2 (2018), 437--449.
[6]
W. Bao, H. Li, N. Li, and W. Jiang. 2009. A liveness detection method for face recognition based on optical flow field. In 2009 International Conference on Image Analysis and Signal Processing. 233--236. https://doi.org/10.1109/IASP.2009.5054589
[7]
P. P. K. Chan, W. Liu, D. Chen, D. S. Yeung, F. Zhang, X. Wang, and C. Hsu. 2018. Face Liveness Detection Using a Flash Against 2D Spoofing Attack. IEEE Trans. Inf. Forensics Secur. 13, 2 (2018), 521--534. https://doi.org/10.1109/TIFS.2017.2758748
[8]
I. Chingovska, A. R. Anjos, and S. Marcel. 2014. Biometrics Evaluation Under Spoofing Attacks. IEEE Trans. Inf. Forensics Secur. 9, 12 (2014), 2264--2276. https://doi.org/10.1109/TIFS.2014.2349158
[9]
A. Czajka. 2015. Pupil Dynamics for Iris Liveness Detection. IEEE Trans. Inf. Forensics Secur. 10, 4 (2015), 726--735.
[10]
A. Czajka and P. Bulwan. 2013. Biometric verification based on hand thermal images. In International Conference on Biometrics, ICB 2013, 4-7 June, 2013, Madrid, Spain, Julian Fiérrez, Ajay Kumar, Mayank Vatsa, Raymond N. J. Veldhuis, and Javier Ortega-Garcia (Eds.). IEEE, 1--6. https://doi.org/10.1109/ICB.2013.6612982
[11]
J. Dong, C. Tian, and Y. Xu. 2017. Face liveness detection using color gradient features. In International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2017, Shenzhen, China, December 15-17, 2017. IEEE, 377--382. https://doi.org/10.1109/SPAC.2017.8304308
[12]
R. B. Dubey and A. Madan. 2014. Iris localization using Daugman's intero-differential operator. International Journal of Computer Applications 93, 3 (2014), 6--12.
[13]
J. Galbally, S. Marcel, and J. Fiérrez. 2014. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition. IEEE Trans. Image Process. 23, 2 (2014), 710--724. https://doi.org/10.1109/TIP.2013.2292332
[14]
C. Galdi, W. Nappi, D. Riccio, and H. Wechsler. 2016. Eye movement analysis for human authentication: a critical survey. Pattern Recognit. Lett. 84 (2016), 272--283. https://doi.org/10.1016/j.patrec.2016.11.002
[15]
Y. Guo, G. Ubul, N. Yadikar, M. Mamut, and K. Ubul. 2020. A Survey of Multi-Ethnic Face Feature Recognition. In Proceedings of the 2020 9th International Conference on Computing and Pattern Recognition (ICCPR 2020). Association for Computing Machinery, New York, NY, USA, 168--173. https://doi.org/10.1145/3436369.3437412
[16]
A. Gupta, K. C. Thakkar, V. Gandhi, and P. J. Narayanan. 2019. Nose, Eyes and Ears: Head Pose Estimation by Locating Facial Keypoints. In IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2019, Brighton, United Kingdom, May 12-17, 2019. IEEE, 1977--1981. https://doi.org/10.1109/ICASSP.2019.8683503
[17]
ISO 30107-1:2016 2016. Information technology - Biometric presentation attack detection - Part 1: Framework. document ISO/IEC 30107-1:2016. International Organization for Standardization.
[18]
G. Kim, S. Eum, J. K. Suhr, I. Kim, K. R. Park, and J. Kim. 2012. Face liveness detection based on texture and frequency analyses. In 5th IAPR International Conference on Biometrics, ICB 2012, New Delhi, India, March 29 - April 1, 2012, Anil K. Jain, Arun Ross, Salil Prabhakar, and Jaihie Kim (Eds.). IEEE, 67--72. https://doi.org/10.1109/ICB.2012.6199760
[19]
W. Kim, S. Suh, and J. Han. 2015. Face Liveness Detection From a Single Image via Diffusion Speed Model. IEEE Trans. Image Process. 24, 8 (2015), 2456--2465. https://doi.org/10.1109/TIP.2015.2422574
[20]
O. V. Komogortsev, A. Karpov, and C. D. Holland. 2015. Attack of Mechanical Replicas: Liveness Detection With Eye Movements. IEEE Trans. Inf. Forensics Secur. 10, 4 (2015), 716--725. https://doi.org/10.1109/TIFS.2015.2405345
[21]
A. Lagorio, M. Tistarelli, M. Cadoni, C. Fookes, and S. Sridharan. 2013. Liveness detection based on 3D face shape analysis. In 1st International Workshop on Biometrics and Forensics, IWBF 2013, Lisbon, Portugal, April 4-5, 2013. IEEE, 1--4.
[22]
H. Li, P. He, S. Wang, A. Rocha, X. Jiang, and A. C. Kot. 2018. Learning Generalized Deep Feature Representation for Face Anti-Spoofing. IEEE Trans. Inf. Forensics Secur. 13, 10 (2018), 2639--2652. https://doi.org/10.1109/TIFS.2018.2825949
[23]
L. Li, X. Feng, Z. Boulkenafet, Z. Xia, M. Li, and A. Hadid. 2016. An original face anti-spoofing approach using partial convolutional neural network. In Sixth International Conference on Image Processing Theory, Tools and Applications, IPTA 2016, Oulu, Finland, December 12-15, 2016. IEEE, 1--6. https://doi.org/10.1109/IPTA.2016.7821013
[24]
Y. Li, Y. Li, K. Xu, Q. Yan, and R. H. Deng. 2018. Empirical Study of Face Authentication Systems Under OSNFD Attacks. IEEE Trans. Dependable Secur. Comput. 15, 2 (2018), 231--245. https://doi.org/10.1109/TDSC.2016.2550459
[25]
R. Lienhart and J. Maydt. 2002. An extended set of Haar-like features for rapid object detection. In Proceedings of the 2002 International Conference on Image Processing, ICIP 2002, Rochester, New York, USA, September 22-25, 2002. IEEE, 900--903.
[26]
Y. Liu, A. Jourabloo, and X. Liu. 2018. Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision. In 2018 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2018, Salt Lake City, UT, USA, June 18-22, 2018. IEEE Computer Society, 389--398. https://doi.org/10.1109/CVPR.2018.00048
[27]
G. B. Marshalko and L. O. Nikiforova. 2019. Spoofing attack on eigenfaces-based biometric identification system. Automatic Control and Computer Sciences 53, 8 (2019), 980--986. https://doi.org/10.3103/S0146411619080200
[28]
D. T. Nguyen, T. D. Pham, G. Batchuluun, K. J. Noh, and K. R. Park. 2020. Presentation Attack Face Image Generation Based on a Deep Generative Adversarial Network. Sensors 20, 7 (2020). https://doi.org/10.3390/s20071810
[29]
M. Oliva and A. Anikin. 2018. Pupil dilation reflects the time course of emotion recognition in human vocalizations. Scientific Reports 8, 1 (2018), 4871. https://doi.org/10.1038/s41598-018-23265-x
[30]
G. Pan, L. Sun, Z. Wu, and S. Lao. 2007. Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera. In IEEE 11th International Conference on Computer Vision, ICCV 2007, Rio de Janeiro, Brazil, October 14-20, 2007. IEEE Computer Society, 1--8.
[31]
R. Raghavendra and C. Busch. 2017. Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey. ACM Comput. Surv. 50, 1 (2017), 8:1-8:37. https://doi.org/10.1145/3038924
[32]
F. Schroff, D. Kalenichenko, and J. Philbin. 2015. FaceNet: A unified embedding for face recognition and clustering. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015. IEEE Computer Society, 815--823.
[33]
A. Sepas-Moghaddam, F. Pereira, and P. L. Correia. 2018. Light Field-Based Face Presentation Attack Detection: Reviewing, Benchmarking and One Step Further. IEEE Trans. Information Forensics and Security 13, 7 (2018), 1696--1709. https://doi.org/10.1109/TIFS.2018.2799427
[34]
A. K. Singh, P. Joshi, and G. C. Nandi. 2014. Face recognition with liveness detection using eye and mouth movement. In 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014). IEEE, 592--597.
[35]
S. Thavalengal, T. Nedelcu, P. Bigioi, and P. M. Corcoran. 2016. Iris liveness detection for next generation smartphones. IEEE Trans. Consumer Electron. 62, 2 (2016), 95--102. https://doi.org/10.1109/TCE.2016.7514667
[36]
S. Tirunagari, N. Poh, D. Windridge, A. Iorliam, N. Suki, and A. T. S. Ho. 2015. Detection of Face Spoofing Using Visual Dynamics. IEEE Trans. Inf. Forensics Secur. 10, 4 (2015), 762--777. https://doi.org/10.1109/TIFS.2015.2406533
[37]
R. Tolosana, M. Gomez-Barrero, C. Busch, and J. Ortega-Garcia. 2020. Biometric Presentation Attack Detection: Beyond the Visible Spectrum. IEEE Trans. Inf. Forensics Secur. 15 (2020), 1261--1275. https://doi.org/10.1109/TIFS.2019.2934867
[38]
L. Wu, X. Du, and X. Fu. 2014. Security threats to mobile multimedia applications: Camera-based attacks on mobile phones. IEEE Commun. Mag. 52, 3 (2014), 80--87. https://doi.org/10.1109/MCOM.2014.6766089
[39]
Y. Zhang, W. Hu, W. Xu, C. T. Chou, and J. Hu. 2017. Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 4 (2017), 177:1-177:22. https://doi.org/10.1145/3161410
[40]
Z. Zhao and A. Kumar. 2015. An Accurate Iris Segmentation Framework Under Relaxed Imaging Constraints Using Total Variation Model. In 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015. IEEE Computer Society, 3828--3836.

Cited By

View all
  • (2023)Fusang: Graph-inspired Robust and Accurate Object Recognition on Commodity mmWave DevicesProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3596849(489-502)Online publication date: 18-Jun-2023
  • (2023)Accurate iris segmentation and recognition using an end-to-end unified framework based on MADNet and DSANetNeurocomputing10.1016/j.neucom.2022.10.064517:C(264-278)Online publication date: 14-Jan-2023
  • (2023)Introduction to Presentation Attack Detection in Face Biometrics and Recent AdvancesHandbook of Biometric Anti-Spoofing10.1007/978-981-19-5288-3_9(203-230)Online publication date: 24-Feb-2023
  • Show More Cited By

Index Terms

  1. IriTrack: Face Presentation Attack Detection Using Iris Tracking

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 5, Issue 2
    June 2021
    932 pages
    EISSN:2474-9567
    DOI:10.1145/3472726
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 June 2021
    Published in IMWUT Volume 5, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Presentation attack detection
    2. authentication
    3. face recognition
    4. facial biometric artefact
    5. iris tracking

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • NSFC Projects
    • National Key R&D Program of China
    • Beijing Natural Science Foundation
    • Open Research Projects of Zhejiang Lab
    • Beijing Nova Program

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)27
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 31 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Fusang: Graph-inspired Robust and Accurate Object Recognition on Commodity mmWave DevicesProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3596849(489-502)Online publication date: 18-Jun-2023
    • (2023)Accurate iris segmentation and recognition using an end-to-end unified framework based on MADNet and DSANetNeurocomputing10.1016/j.neucom.2022.10.064517:C(264-278)Online publication date: 14-Jan-2023
    • (2023)Introduction to Presentation Attack Detection in Face Biometrics and Recent AdvancesHandbook of Biometric Anti-Spoofing10.1007/978-981-19-5288-3_9(203-230)Online publication date: 24-Feb-2023
    • (2022)Presentation attack detection and biometric recognition in a challenge-response formalismEURASIP Journal on Information Security10.1186/s13635-022-00131-y2022:1Online publication date: 5-Sep-2022
    • (2022)Taekwondo Trajectory Tracking Based on Multitarget Detection AlgorithmMobile Information Systems10.1155/2022/34166822022Online publication date: 13-Sep-2022
    • (2021)Effective and Robust Physical-World Attacks on Deep Learning Face Recognition SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.310249216(4063-4077)Online publication date: 2021

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media