Robust Hybrid Texture Descriptor (HTD) and a parallel score based fusion for face verification and liveness detection system
DOI:
https://doi.org/10.21015/vtse.v12i2.1828Abstract
Currently, most of the biometric recognition systems are based on face verification are susceptible to the spoof attacks. Video replays, printed photographs and 3D mask attacks provoke false acceptance lest some necessary counter-measures are employed. We focus on still face spoof attacks considered as one of the most easily generated attacks and challenging for modern face verification systems. To detect face spoofing, most of existing countermeasures focus on designing discriminative features to analyze the textural properties of facial skin. To improve the texture discriminating properties and get advantages from other texture descriptor, in this paper, a novel Hybrid Texture Descriptor (HTD) is proposed and models the joint performance of face verification and liveness detection by score fusion method, for which the multi-modeling is well recognized. Numbers of experiments are carried out on UPM face spoof and one public domain Replay attack databases as standalone countermeasure in addition to the consolidation with verification system by means of fusion of score. The potential of proposed method demonstrate the outperformance throughout the experiments.
References
Wu, Z., Cheng, Y., Zhang, S., Ji, X., and Xu, W., "Uniid: Spoofing face authentication system by universal identity," in Proceedings of Network and Distributed System Security Symposium (NDSS), 2024.
Sebastien, M., Nixon, M., and Li, S., Handbook of biometric anti-spoofing: trusted biometrics under spoofing attacks, 2014.
Sharma, S. B., Dhall, I., Nayak, S. R., and Chatterjee, P., "Reliable biometric authentication with privacy protection," in Advances in Communication, Devices and Networking: Proceedings of ICCDN 2021, Singapore: Springer Nature Singapore, 2022, pp. 233-249.
Alalayah, K. M., Irshad, R. R., Rassem, T. H., and Mohammed, B. A., "A new fast local laplacian completed local ternary count (FLL-CLTC) for facial image classification," IEEE Access, vol. 8, pp. 98244-98254, 2020.
Ibrahim, M., Efat, M. I. A., Shamol, H. K., Khaled, S. M., Shoyaib, M., and Abdullah-Al-Wadud, M., "Dynamic local ternary pattern for face recognition and verification," in International Conference on Computer Engineering and Applications, vol. 1012, no. 8, 2014.
Chingovska, I., Anjos, A., and Marcel, S., "Anti-spoofing in action: joint operation with a verification system," in Proceedings of the IEEE conference on computer vision and pattern recognition workshops, 2013, pp. 98-104. DOI: https://doi.org/10.1109/CVPRW.2013.22
Li, L., Yao, Z., Gao, S., Han, H., and Xia, Z., "Face anti-spoofing via jointly modeling local texture and constructed depth," Engineering Applications of Artificial Intelligence, vol. 133, p. 108345, 2024.
Chou, C. L., "Presentation attack detection based on score level fusion and challenge-response technique," The Journal of Supercomputing, vol. 77, no. 5, pp. 4681-4697, 2021.
Zhang, Y., Gao, C., Pan, S., Li, Z., Xu, Y., and Qiu, H., "A score-level fusion of fingerprint matching with fingerprint liveness detection," IEEE Access, vol. 8, pp. 183391-183400, 2020.
Moon, Y., Ryoo, I., and Kim, S., "Face antispoofing method using color texture segmentation on FPGA," Security and Communication Networks, vol. 2021, no. 1, p. 9939232, 2021.
Yu, Z., Qin, Y., Li, X., Zhao, C., Lei, Z., and Zhao, G., "Deep learning for face anti-spoofing: A survey," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 45, no. 5, pp. 5609-5631, 2022.
Rusia, M. K. and Singh, D. K., "A Color-Texture-Based Deep Neural Network Technique to Detect Face Spoofing Attacks," Cybernetics and Information Technologies, vol. 22, no. 3, pp. 127-145, 2022.
Jaswanth, P. and Ramprasad, M. V. S., "Deep learning based intelligent system for robust face spoofing detection using texture feature measurement," Measurement: Sensors, vol. 29, p. 100868, 2023.
Raghavendra, R. J. and Kunte, R. S., "A novel feature descriptor for face anti-spoofing using texture based method," Cybernetics and Information Technologies, vol. 20, no. 3, pp. 159-176, 2020.
Tan, X., Li, Y., Liu, J., and Jiang, L., "Face liveness detection from a single image with sparse low rank bilinear discriminative model," in Computer Vision–ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part VI 11, Springer Berlin Heidelberg, 2010, pp. 504-517.
Tan, X., Li, Y., Liu, J., and Jiang, L., "Face liveness detection from a single image with sparse low rank bilinear discriminative model," in Computer Vision–ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part VI 11, Springer Berlin Heidelberg, 2010, pp. 504-517. DOI: https://doi.org/10.1007/978-3-642-15567-3_37
Anjos, A., Chakka, M. M., and Marcel, S., "Motion‐based counter‐measures to photo attacks in face recognition," IET Biometrics, vol. 3, no. 3, pp. 147-158, 2014. DOI: https://doi.org/10.1049/iet-bmt.2012.0071
Parveen, S., Ahmad, S. M. S., Hanafi, M., and Adnan, W. A. W., "The design and compilation of a facial spoof database on various textures," in 2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology, 2014, pp. 182-186. DOI: https://doi.org/10.1109/ICAIET.2014.38
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY