An Efficient Pre-processing and Transfer Learning-Based Deep-Network for Face Anti-Spoofing
Keywords:
Image editing tools, antispoofing, deep-network, YOLOV5, transfer learning, and Replay AttackAbstract
Sophisticated and enhanced image editing tools have created chaos in the modern world and are intended to fool the best recognition systems. Many such tools are available for spoofing images which has made the authority's task miserable. Anti-social elements with such sophisticated image and video spoofing packages and advanced hardware tools have made the antispoofing mechanism a complex task. The work introduced in this paper for face-antispoofing uses an efficient pre-processing framework followed by deep-network-based feature extraction and classification. The complete model can discriminate between real and spoofed faces under uneven illumination conditions. The first part of the model enhances the face details for better quality features. The YOLOV5 network extracts the features and classifies the faces as the real and the spoof ones using a transfer learning approach. The work considered images subjected to Replay Attack from a well-known dataset and obtained an accuracy of about 99%. Experimental analysis of imbalanced data showed that the proposed face-antispoofing model performed better than other state-of-the-art work found in the literature.
Downloads
References
Jain, A.K. and Ross, A., “Handbook of biometrics”, pp. 1–22. Springer, London (2008)
Sharma, D., and Selwal, A., “FinPAD: state-of-the-art of fingerprint presentation attack detection mechanisms, taxonomy and future perspectives”, Pattern Recognit. Lett. Volume 152, Issue 1, pp. 225–252, 2021.
Jain A. K., Ross A., and Prabhakar S., “An introduction to biometric recognition”, IEEE Trans. Circuits Syst. Video Technol., Volume 14, Issue 1, pp. 4–20, 2004.
Selwal A., Gupta S. K., and Kumar S., “A scheme for template security at feature fusion level”, Adv. Sci. Technol. Res. J., Volume 10, Issue 31, pp. 23–30, 2016.
Jain A.K., Ross A., Pankanti S., and Member S., “Biometrics: a tool for information security”, IEEE Trans. Inf. Foren. Secure, Volume 1, Issue 2, pp. 125–143, 2006.
Manzoor S. I. and Selwal A., “An analysis of biometric-based”, In: 2018 Fifth Int. Conf. Parallel, Distrib. Grid Comput., no. 4, pp. 306–311, 2018.
Sharma D. and Selwal A., “An intelligent approach for fingerprint presentation attack detection using ensemble learning with improved local image features”, No 0123456789. Springer, 2021.
Kresimir D. and Mislav G., “A survey of biometric recognition methods”, In: 46th Int. Symposium Electron. Mar. ELMAR-2004. 16–18 June, 2004. Zadar. Croat. A, no. June, pp. 184–193, 2004.
Akhtar Z. and Foresti G. L., “Face spoof attack recognition using discriminative image patches”, J. Electr. Comput. Eng. 2016.
S. Kumar, S. Singh, and J. Kumar, “A comparative study on face spoofing attacks”, in 2017 International Conference on Computing, Communication, and Automation (ICCCA), pp. 1104–1108, IEEE, 2017.
L. Sun, W. Huang, and M. Wu, “Tir/vis correlation for liveness detection in face recognition”, in International Conference on Computer Analysis of Images and Patterns, pp. 114–121, Springer, 2011.
Z. Zhang, D. Yi, Z. Lei, and S. Z. Li, “Face liveness detection by learning multispectral reflectance distributions”, in 2011 IEEE International Conference on Automatic Face & Gesture Recognition (FG), pp. 436– 441, IEEE, 2011.
G. Pan, L. Sun, Z. Wu, and S. Lao, “Eyeblink-based anti-spoofing in face recognition from a generic web camera”, in Proc. IEEE Int. Conf. Comput. Vis., pp. 1–8, 2007.
X. Li, J. Komulainen, G. Zhao, P.-C. Yuen, and M. Pietikainen, “Generalized face anti-spoofing by detecting pulse from face videos”, in Proc. IEEE 23rd Int. Conf. Pattern Recognit., pp. 4244–4249, 2016.
T. de Freitas Pereira, A. Anjos, J. M. De Martino, and S. Marcel, “LBP - TOP based countermeasure against face spoofing attacks”, in Proc. Asian Conf. Comput. Vis., pp. 121–132, 2012.
J. Komulainen, A. Hadid, and M. Pietikainen, “Context-based face anti-spoofing”, in Proc. IEEE 6th Int. Conf. Biometrics: Theory Appl. Syst., pp. 1–8, 2013.
K. Patel, H. Han, and A. K. Jain, “Secure face unlock: Spoof detection on smartphones”, IEEE Trans. Inf. Forensics Security, vol. 11, no. 10, pp. 2268–2283, Oct. 2016.
H.-K. Jee, S.-U. Jung, and J.-H. Yoo, “Liveness detection for embedded face recognition system”, Int. J. Biol. Med. Sci., vol. 1, pp. 235–238, 2006.
J.-W. Li, “Eye blink detection based on multiple Gabor response waves”, in Proc. IEEE Int. Conf. Mach. Learn. Cybern., pp. 2852–2856, 2008.
L. Wang, X. Ding, and C. Fang, “Face live detection method based on physiological motion analysis”, Tsinghua Sci. Technol., vol. 14, no. 6, pp. 685–690, 2009.
W. Bao, H. Li, N. Li, and W. Jiang, “A liveness detection method for face recognition based on optical flow field”, in Proc. IEEE Int. Conf. Acoust. Speech Signal Processing, pp. 233–236, 2009.
J. Bigun, H. Fronthaler, and K. Kollreider, “Assuring liveness in biometric identity authentication by real-time face tracking”, in Proc. IEEE Int. Conf. Comput. Intell. Homeland Security. Pers. Saf., pp. 104–111, 2004.
Ali, F. Deravi, and S. Hoque, “Liveness detection using gaze collinearity”, in Proc. IEEE 3rd Int. Conf. Emerg. Secure. Technol., pp. 62–65, 2012.
Y. Liu, A. Jourabloo, and X. Liu, “Learning deep models for face anti-spoofing: Binary or auxiliary supervision”, in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., pp. 389–398, 2018.
B. Lin, X. Li, Z. Yu, and G. Zhao, “Face liveness detection by rPPG features and contextual patch-based CNN”, in Proc. 3rd Int. Conf. Biometric Eng. Appl., pp. 61–68. 2019.
Z. Yu, W. Peng, X. Li, X. Hong, and G. Zhao, “Remote heart rate measurement from highly compressed facial videos: An end-to-end deep learning solution with video enhancement”, in Proc. IEEE Int. Conf. Comput. Vis., pp. 151–160, 2019.
Z. Boulkenafet, J. Komulainen, and A. Hadid, “Face antispoofing using speeded-up robust features and fisher vector encoding”, IEEE Signal Process. Lett., vol. 24, no. 2, pp. 141–145, Feb. 2017.
X. Tan, Y. Li, J. Liu, and L. Jiang, “Face liveness detection from a single image with the sparse low rank bilinear discriminative model”, in Proc. Eur. Conf. Comput. Vis., pp. 504–517, 2010.
Sandoval Verissimo, Guilherme Gadelha, Leonardo Batista, Joao Janduy and Fabio Falcao, “Transfer Learning for Face Anti-Spoofing Detection,” IEEE Latin America Transactions, Volume 21, No. 4, April 2023.
Ruchi Zawar and Vrishali Chakkarwar, “Real-Time Face Liveliness Detection and Face Anti-spoofing Using Deep Learning”, ACVAIT 2022, AISR 176, pp. 626-636, 2023.
K Balamurali et al., “Journal of Physics: Conference Series”, 1917, 012010, 2021.
Zhang K., Zhang Z., Li Z. and Qiao Y., “Joint face detection and alignment using multitask cascaded convolutional networks”, IEEE Signal Process. Letters, Volume 23, pp. 1499–1503, 2016.
Chunyan Li, Zhiyong, Jianhong Sun and Rui Li, “Middle-shallow feature aggregation in multimodality for face anti-spoofing”, Scientific Reports, Volume 13, 9870, 2023.
Zhang S. and Nie W., “Multi-Domain Feature Alignment for Face Anti-Spoofing”, Sensors, Volume 23, 4077, 2023.
Amal H. Alharbi, S. Karthick, K. Venkatachalam, Mohamed Abouhawwash and Doaa Sami Khafaga, “Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security”, Intelligent Automation & Soft Computing, Volume 35, No. 3, pp. 2773-2787, 2023.
Pereira Tiago de Freitas, Komulainen Jukka, Anjos Andre, Martino Jose Mario De, Hadid Abdenour, Pietikainen Matti and Marcel Sebastien, “Face liveness detection using dynamic texture”, EURASIP Journal on Image and Video Processing, volume 2, 2014.
Simone Gabriele, Pedersen Marius, and Hardeberg John Yngve, “Measuring perceptual contrast in digital images”, Journal of Vis. Communication R., volume 23, pp. 491-506, 2012.
Tadmor Y. and Tolhurst D., “Calculating the contrasts that retinal ganglion cells and LGN neurones encounter in natural scenes.”, Vision Research, Volume 40, Issue 22, pp. 3145–3157, 2000.
Wetzler A. and Kimmel R., “Efficient Beltrami Flow in Patch-Space. In: Bruckstein, A.M., ter Haar Romeny, B.M., Bronstein, A.M., Bronstein, M.M. (eds) Scale Space and Variational Methods in Computer Vision”, SSVM 2011. Lecture Notes in Computer Science, volume 6667. Springer, Berlin, Heidelberg, pp. 134-143, 2012.
Cuong Nguyen The, Vladimir Ivanovich Syryamkin, Thang Nguyen Chien, Trang Nguyen Hoang Thuy and Lyanshenko Dmtriy, “Evaluating methods of anti-spoofing of living entities and propose solutions”, E3S Web of Conferences, 389, 02023, 2023.
Xin Chen, Jingmei Zhou, Xiangmo Zhao, Hongfei Wang and Yuqi Li., “A presentation attack detection network based on dynamic convolution and multilevel feature fusion with security and reliability”, Future Generation Computer Systems, Volume 146, September 2023, pp. 114-121, 2023.
S. D. Thepade, M. R. Dindorkar, P. R. Chaudhari and S. V. Bang, “Enhanced Face Presentation Attack Prevention Employing Feature Fusion of Pretrained Deep CNN Model and Thepade’s Sorted Block Truncation Coding. IJE Transactions A: Basics, Volume 36, No. 04. pp. 807-816, 2023.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.