Abstract
Face Recognition Systems (FRS) are vulnerable to spoofing attacks (a.k.a presentation attacks), which can be carried out by presenting a printed photo (print-photo), displaying a photo (display-photo), or displaying a video (replay-video). The issue of presentation attacks can be alleviated by algorithms known as presentation attack detection (PAD) mechanisms. In this paper, we propose a novel framework based on Hierarchical Cosine/Spherical Linear Interpolation of deep learning feature vectors followed by training a Linear SVM for PAD Classification. The deep learning feature vectors are extracted from existing networks trained on the Imagenet dataset. Our proposed approach hierarchically interpolates the extracted feature vectors using Cosine/Spherically Linear Interpolation, followed by using a Linear SVM for classification, and sum-rule fusion for generating final scores. We show our results on cross-dataset PAD for the classifier trained on OULU P1 Dataset and tested on Replay Mobile Dataset. We compare it with the current state-of-the-art (SOTA) algorithms published in the literature and achieve considerably lower detection error-rate (D-EER). The extraction of features from pre-trained networks makes our approach simple to use, apart from it, giving highly accurate results, which are much better than current SOTA.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Apple Face ID (2017). https://en.wikipedia.org/wiki/Face_ID. Accessed May 2020
Costa-Pazo, A., Bhattacharjee, S., Vazquez-Fernandez, E., Marcel, S.: The replay-mobile face presentation-attack database. In: International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–7, September 2016. https://doi.org/10.1109/BIOSIG.2016.7736936
Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248–255. IEEE (2009)
Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2019
George, A., Marcel, S.: Deep pixel-wise binary supervision for face presentation attack detection. In: 2019 International Conference on Biometrics, ICB 2019, Crete, Greece, pp. 1–8, 4–7 June 2019. IEEE (2019). https://doi.org/10.1109/ICB45273.2019.8987370
Huang, G., Liu, Z., Van Der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700–4708 (2017)
ISO/IEC JTC1 SC37 Biometrics: ISO/IEC IS 30107–3. Information Technology - Biometric presentation attack detection - Part 3: Testing and Reporting. International Organization for Standardization (2017)
JV Chamary: How Face ID works on iPhone X (2017). https://www.forbes.com/sites/jvchamary/2017/09/16/how-face-id-works-apple-iphone-x/. Accessed May 2020
Liu, Y., Stehouwer, J., Jourabloo, A., Atoum, Y., Liu, X.: Presentation attack detection for face in mobile phones. In: Rattani, A., Derakhshani, R., Ross, A. (eds.) Selfie Biometrics. ACVPR, pp. 171–196. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26972-2_8
Marcel, S., Nixon, M.S., Li, S.Z.: Handbook of Biometric Anti-Spoofing: Trusted Biometrics Under Spoofing Attacks. Springer, New York (2014). https://doi.org/10.1007/978-1-4471-6524-8. Incorporated
Mohammadi, A., Bhattacharjee, S., Marcel, S.: Improving cross-dataset performance of face presentation attack detection systems using face recognition datasets. In: 45th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2020), p. 125 (2020)
Raghavendra, R., Busch, C.: Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput. Surv. (CSUR) 50(1), 1–37 (2017)
Raghavendra, R., Raja, K.B., Busch, C.: Presentation attack detection for face recognition using light field camera. IEEE Trans. Image Process. 24(3), 1060–1075 (2015)
Ramachandra, R., Singh, J.M., Venkatesh, S., Raja, K., Busch, C.: Face presentation attack detection using multi-classifier fusion of off-the-shelf deep features. In: Nain, N., Vipparthi, S.K., Raman, B. (eds.) CVIP 2019. CCIS, vol. 1148, pp. 49–61. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-4018-9_5
Raghavendra, R., et al.: Smartphone multi-modal biometric authentication: Database and evaluation. arXiv preprint arXiv:1912.02487 (2019)
Raghavendra, R., Ashok, R., Kumar, G.H.: Multimodal biometric score fusion using gaussian mixture model and Monte Carlo method. J. Comput. Sci. Technol. 25(4), 771–782 (2010). https://doi.org/10.1007/s11390-010-9364-7
Ross, A., Poh, N.: Multibiometric systems: overview, case studies, and open issues. In: Tistarelli, M., Li, S.Z., Chellappa, R. (eds.) Handbook of Remote Biometrics. Advances in Pattern Recognition. Springer, London (2009). https://doi.org/10.1007/978-1-84882-385-3_11
Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815–823 (2015)
Shoemake, K.: Animating rotation with quaternion curves. In: Proceedings of the 12th Annual Conference on Computer Graphics and Interactive Techniques, pp. 245–254 (1985)
Vishi, K., Mavroeidis, V.: An evaluation of score level fusion approaches for fingerprint and finger-vein biometrics. arXiv preprint arXiv:1805.10666 (2018)
Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.Z.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 26–31. IEEE (2012)
Zinelabidine, B., Jukka, K., Li, L., Feng, X., Hadid, A.: OULU-NPU: a mobile face presentation attack database with real-world variations. In: IEEE International Conference on Automatic Face & Gesture Recognition (AFGR), pp. 1–7. IEEE (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Singh, J.M., Ramachandra, R., Busch, C. (2021). Hierarchical Interpolation of Imagenet Features for Cross-Dataset Presentation Attack Detection. In: Yildirim Yayilgan, S., Bajwa, I.S., Sanfilippo, F. (eds) Intelligent Technologies and Applications. INTAP 2020. Communications in Computer and Information Science, vol 1382. Springer, Cham. https://doi.org/10.1007/978-3-030-71711-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-71711-7_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71710-0
Online ISBN: 978-3-030-71711-7
eBook Packages: Computer ScienceComputer Science (R0)