An Efficient ROI-Based Transfer Learning to Discriminate Spoof Attacks

Authors

  • Hirendra R. Hajare Ph. D. Scholar, Computer Science & Engineering, Kalinga University, Chhattisgarh, India
  • Asha Ambhaikar Professor, Computer Science and Engineering, Kalinga University, Chhattisgarh, India

Keywords:

Advanced computer-aided systems, antispoofing, dual unit framework, YOLOV5s, transfer learning, IDIAP-Replay Attack, data augmentation

Abstract

Modern video processing tools and advanced computer-aided systems have made it difficult to distinguish between real and fake identities. The spoofing tools nowadays are very powerful to fool the best antispoofing framework. The article presents a simple but robust dual-unit framework for preprocessing and blind feature extraction plus classification to discriminate between real and fake subjects. A low-complexity preprocessing unit to enhance the image details and a quality feature extraction module using YOLOV5s are introduced using transfer learning. The dual unit framework is evaluated over IDIAP-Replay attack dataset images obtained 98.39% classification accuracy for distinguishing the authentic and the fooled samples. The work does not use data augmentation, or face alignments, and performs well on imbalance classes having uneven foreground illumination samples.

Downloads

Download data is not yet available.

References

Jain, A.K. and Ross, A., “Handbook of biometrics”, pp. 1–22. Springer, London (2008)

Sharma, D., and Selwal, A., “FinPAD: state-of-the-art of fingerprint presentation attack detection mechanisms, taxonomy and future perspectives”, Pattern Recognit. Lett. Volume 152, Issue 1, pp. 225–252, 2021.

Jain A. K., Ross A., and Prabhakar S., “An introduction to biometric recognition”, IEEE Trans. Circuits Syst. Video Technol., Volume 14, Issue 1, pp. 4–20, 2004.

Selwal A., Gupta S. K., and Kumar S., “A scheme for template security at feature fusion level”, Adv. Sci. Technol. Res. J., Volume 10, Issue 31, pp. 23–30, 2016.

Jain A.K., Ross A., Pankanti S., and Member S., “Biometrics: a tool for information security”, IEEE Trans. Inf. Foren. Secure, Volume 1, Issue 2, pp. 125–143, 2006.

Manzoor S. I. and Selwal A., “An analysis of biometric-based”, In: 2018 Fifth Int. Conf. Parallel, Distrib. Grid Comput., no. 4, pp. 306–311, 2018.

Sharma D. and Selwal A., “An intelligent approach for fingerprint presentation attack detection using ensemble learning with improved local image features”, No 0123456789. Springer, 2021.

Kresimir D. and Mislav G., “A survey of biometric recognition methods”, In: 46th Int. Symposium Electron. Mar. ELMAR-2004. 16–18 June, 2004. Zadar. Croat. A, no. June, pp. 184–193, 2004.

Akhtar Z. and Foresti G. L., “Face spoof attack recognition using discriminative image patches”, J. Electr. Comput. Eng. 2016.

S. Kumar, S. Singh, and J. Kumar, “A comparative study on face spoofing attacks”, in 2017 International Conference on Computing, Communication, and Automation (ICCCA), pp. 1104–1108, IEEE, 2017.

L. Sun, W. Huang, and M. Wu, “Tir/vis correlation for liveness detection in face recognition”, in International Conference on Computer Analysis of Images and Patterns, pp. 114–121, Springer, 2011.

Z. Zhang, D. Yi, Z. Lei, and S. Z. Li, “Face liveness detection by learning multispectral reflectance distributions”, in 2011 IEEE International Conference on Automatic Face & Gesture Recognition (FG), pp. 436– 441, IEEE, 2011.

G. Pan, L. Sun, Z. Wu, and S. Lao, “Eyeblink-based anti-spoofing in face recognition from a generic web camera”, in Proc. IEEE Int. Conf. Comput. Vis., pp. 1–8, 2007.

X. Li, J. Komulainen, G. Zhao, P.-C. Yuen, and M. Pietikainen, “Generalized face anti-spoofing by detecting pulse from face videos”, in Proc. IEEE 23rd Int. Conf. Pattern Recognit., pp. 4244–4249, 2016.

T. de Freitas Pereira, A. Anjos, J. M. De Martino, and S. Marcel, “LBP - TOP based countermeasure against face spoofing attacks”, in Proc. Asian Conf. Comput. Vis., pp. 121–132, 2012.

J. Komulainen, A. Hadid, and M. Pietikainen, “Context-based face anti-spoofing”, in Proc. IEEE 6th Int. Conf. Biometrics: Theory Appl. Syst., pp. 1–8, 2013.

K. Patel, H. Han, and A. K. Jain, “Secure face unlock: Spoof detection on smartphones”, IEEE Trans. Inf. Forensics Security, vol. 11, no. 10, pp. 2268–2283, Oct. 2016.

H.-K. Jee, S.-U. Jung, and J.-H. Yoo, “Liveness detection for embedded face recognition system”, Int. J. Biol. Med. Sci., vol. 1, pp. 235–238, 2006.

J.-W. Li, “Eye blink detection based on multiple Gabor response waves”, in Proc. IEEE Int. Conf. Mach. Learn. Cybern., pp. 2852–2856, 2008.

L. Wang, X. Ding, and C. Fang, “Face live detection method based on physiological motion analysis”, Tsinghua Sci. Technol., vol. 14, no. 6, pp. 685–690, 2009.

W. Bao, H. Li, N. Li, and W. Jiang, “A liveness detection method for face recognition based on optical flow field”, in Proc. IEEE Int. Conf. Acoust. Speech Signal Processing, pp. 233–236, 2009.

J. Bigun, H. Fronthaler, and K. Kollreider, “Assuring liveness in biometric identity authentication by real-time face tracking”, in Proc. IEEE Int. Conf. Comput. Intell. Homeland Security. Pers. Saf., pp. 104–111, 2004.

Ali, F. Deravi, and S. Hoque, “Liveness detection using gaze collinearity”, in Proc. IEEE 3rd Int. Conf. Emerg. Secure. Technol., pp. 62–65, 2012.

Y. Liu, A. Jourabloo, and X. Liu, “Learning deep models for face anti-spoofing: Binary or auxiliary supervision”, in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp. 389–398, 2018.

B. Lin, X. Li, Z. Yu, and G. Zhao, “Face liveness detection by rPPG features and contextual patch-based CNN”, in Proc. 3rd Int. Conf. Biometric Eng. Appl., pp. 61–68. 2019.

Z. Yu, W. Peng, X. Li, X. Hong, and G. Zhao, “Remote heart rate measurement from highly compressed facial videos: An end-to-end deep learning solution with video enhancement”, in Proc. IEEE Int. Conf. Comput. Vis., pp. 151–160, 2019.

Z. Boulkenafet, J. Komulainen, and A. Hadid, “Face antispoofing using speeded-up robust features and fisher vector encoding”, IEEE Signal Process. Lett., vol. 24, no. 2, pp. 141–145, Feb. 2017.

X. Tan, Y. Li, J. Liu, and L. Jiang, “Face liveness detection from a single image with the sparse low rank bilinear discriminative model”, in Proc. Eur. Conf. Comput. Vis., pp. 504–517, 2010.

Sandoval Verissimo, Guilherme Gadelha, Leonardo Batista, Joao Janduy and Fabio Falcao, “Transfer Learning for Face Anti-Spoofing Detection,” IEEE Latin America Transactions, Volume 21, No. 4, April 2023.

Ruchi Zawar and Vrishali Chakkarwar, “Real-Time Face Liveliness Detection and Face Anti-spoofing Using Deep Learning”, ACVAIT 2022, AISR 176, pp. 626-636, 2023.

K Balamurali et al., “Journal of Physics: Conference Series”, 1917, 012010, 2021.

Zhang K., Zhang Z., Li Z. and Qiao Y., “Joint face detection and alignment using multitask cascaded convolutional networks”, IEEE Signal Process. Letters, Volume 23, pp. 1499–1503, 2016.

Chunyan Li, Zhiyong, Jianhong Sun and Rui Li, “Middle-shallow feature aggregation in multimodality for face anti-spoofing”, Scientific Reports, Volume 13, 9870, 2023.

Zhang S. and Nie W., “Multi-Domain Feature Alignment for Face Anti-Spoofing”, Sensors, Volume 23, 4077, 2023.

Amal H. Alharbi, S. Karthick, K. Venkatachalam, Mohamed Abouhawwash and Doaa Sami Khafaga, “Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security”, Intelligent Automation & Soft Computing, Volume 35, No. 3, pp. 2773-2787, 2023.

Pereira Tiago de Freitas, Komulainen Jukka, Anjos Andre, Martino Jose Mario De, Hadid Abdenour, Pietikainen Matti and Marcel Sebastien, “Face liveness detection using dynamic texture”, EURASIP Journal on Image and Video Processing, volume 2, 2014.

Simone Gabriele, Pedersen Marius, and Hardeberg John Yngve, “Measuring perceptual contrast in digital images”, Journal of Vis. Communication R., volume 23, pp. 491-506, 2012.

Tadmor Y. and Tolhurst D., “Calculating the contrasts that retinal ganglion cells and LGN neurones encounter in natural scenes.”, Vision Research, Volume 40, Issue 22, pp. 3145–3157, 2000.

Wetzler A. and Kimmel R., “Efficient Beltrami Flow in Patch-Space. In: Bruckstein, A.M., ter Haar Romeny, B.M., Bronstein, A.M., Bronstein, M.M. (eds) Scale Space and Variational Methods in Computer Vision”, SSVM 2011. Lecture Notes in Computer Science, volume 6667. Springer, Berlin, Heidelberg, pp. 134-143, 2012.

Cuong Nguyen The, Vladimir Ivanovich Syryamkin, Thang Nguyen Chien, Trang Nguyen Hoang Thuy and Lyanshenko Dmtriy, “Evaluating methods of anti-spoofing of living entities and propose solutions”, E3S Web of Conferences, 389, 02023, 2023.

Xin Chen, Jingmei Zhou, Xiangmo Zhao, Hongfei Wang and Yuqi Li., “A presentation attack detection network based on dynamic convolution and multilevel feature fusion with security and reliability”, Future Generation Computer Systems, Volume 146, September 2023, pp. 114-121, 2023.

S. D. Thepade, M. R. Dindorkar, P. R. Chaudhari and S. V. Bang, “Enhanced Face Presentation Attack Prevention Employing Feature Fusion of Pretrained Deep CNN Model and Thepade’s Sorted Block Truncation Coding. IJE Transactions A: Basics, Volume 36, No. 04. pp. 807-816, 2023.

Downloads

Published

24.03.2024

How to Cite

R. Hajare, H. ., & Ambhaikar, A. . (2024). An Efficient ROI-Based Transfer Learning to Discriminate Spoof Attacks. International Journal of Intelligent Systems and Applications in Engineering, 12(18s), 411–419. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4985

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.