Skip to main content
Log in

Face spoofing detection via ensemble of classifiers toward low-power devices

  • Original Article
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

Facial biometrics tend to be spontaneous, instinctive and less human intrusive. It is regularly employed in the authentication of authorized users and personnel to protect data from violation attacks. A face spoofing attack usually comprises the illegal attempt to access valuable undisclosed information as a trespasser attempts to impersonate an individual holding desirable authentication clearance. In search of such violations, many investigators have devoted their efforts to studying either visual liveness detection or patterns generated during media recapture as predominant indicators to block spoofing violations. This work contemplates low-power devices through the aggregation of Fourier transforms, different classification methods and handcrafted descriptors to estimate whether face samples correspond to falsification attacks. To the best of our knowledge, the proposed method consists of low computational cost and is one of the few methods associating features derived from both spatial and frequency image domains. We conduct experiments on recent and well-known datasets under same and cross-database settings with artificial neural networks, support vector machines and partial least squares ensembles. Results show that although our methodology is geared for resource-limited single-board computers, it can produce significant results, outperforming state-of-the-art approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. Prices taken from BestBuy Retail store, and official Raspberry Pi and Nvidia resellers in July 2020.

References

  1. Bhattacharjee S, Mohammadi A, Marcel S (2018) Spoofing deep face recognition with custom silicone masks. In: Conference on biometrics: theory applications and systems. IEEE, New York

  2. Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche S, Ouafi A et al (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: International joint conference on biometrics. IEEE, New York, pp 688–696

  3. Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: International conference on image processing. IEEE, New York, pp 2636–2640

  4. Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. Trans Inf Forensics Secur 11(8):1818–1830

    Article  Google Scholar 

  5. Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) Oulu-NPU: a mobile face presentation attack database with real-world variations. In: International conference on automatic face & gesture recognition. IEEE, New York

  6. Breiman L (1996) Bagging predictors. Mach Learn 24(2):123–140

    MathSciNet  MATH  Google Scholar 

  7. Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: International conference of biometrics special interest group, EPFL-CONF-192369

  8. Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: Conference on computer vision and pattern recognition, vol 1. IEEE, New York, pp 886–893

  9. Efitorov A, Dolenko S, Dolenko T, Laptinskiy K, Burikov S (2019) Use of wavelet neural networks to solve inverse problems in spectroscopy of multi-component solutions. In: International conference on neuroinformatics. Springer, London, pp 285–294

  10. Feng L, Po LM, Li Y, Xu X, Yuan F, Cheung TCH, Cheung KW (2016) Integration of image quality and motion cues for face anti-spoofing: a neural network approach. J Vis Commun Image Represent 38:451–460

    Article  Google Scholar 

  11. Garcia DC, de Queiroz RL (2015) Face-spoofing 2D-detection based on moiré-pattern analysis. Trans Inf Forensics Secur 10(4):778–786

    Article  Google Scholar 

  12. Gardner MW, Dorling S (1998) Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences. Atmos Environ 32(14–15):2627–2636

    Article  Google Scholar 

  13. Goutte C, Gaussier E (2005) A probabilistic interpretation of precision, recall and f-score, with implication for evaluation. In: European conference on information retrieval. Springer, London, pp 345–359

  14. Haralick RM, Shanmugam K, Dinstein IH (1973) Textural features for image classification. Trans Syst Man Cybern 6:610–621

    Article  Google Scholar 

  15. Information Technology-biometric Presentation Attack Detection—Part 1: Framework (2016) International Organization for Standardization. Technical report, ISO/IEC JTC 1/SC 37 Biometrics

  16. Ilin R, Kozma R, Werbos PJ (2008) Beyond feedforward models trained by backpropagation: a practical training tool for a more efficient universal approximator. IEEE Trans Neural Netw 19(6):929–937

    Article  Google Scholar 

  17. Kumar S, Singh S, Kumar J (2017) A comparative study on face spoofing attacks. In: International conference on computing, communication and automation. IEEE, New York, pp 1104–1108

  18. Li L, Feng X, Boulkenafet Z, Xia Z, Li M, Hadid A (2016) An original face anti-spoofing approach using partial convolutional neural network. In: International conference on image processing theory, tools and applications. IEEE, New York, pp 1–6

  19. Liu S, Yang B, Yuen PC, Zhao G (2016) A 3D mask face anti-spoofing database with real world variations. In: Conference on computer vision and pattern recognition workshop

  20. Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: Conference on computer vision and pattern recognition, pp 389–398

  21. Määttä J, Hadid A, Pietikäinen M (2011) Face spoofing detection from single images using micro-texture analysis. In: International joint conference on biometrics. IEEE, New York, pp 1–7

  22. Manjani I, Tariyal S, Vatsa M, Singh R, Majumdar A (2017) Detecting silicone mask-based presentation attack via deep dictionary learning. Trans Inf Forensics Secur 12(7):1

    Article  Google Scholar 

  23. Menotti D, Chiachia G, Pinto A, Schwartz WR, Pedrini H, Falcao AX, Rocha A (2015) Deep representations for iris, face, and fingerprint spoofing detection. Trans Inf Forensics Secur 10(4):864–879

    Article  Google Scholar 

  24. Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. Trans Pattern Anal Mach Intell 24(7):971–987

    Article  Google Scholar 

  25. Pereira T, Anjos A, Martino JM, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: International conference on biometrics. IEEE, New York, pp 1–8

  26. Pinto A, Pedrini H, Schwartz WR, Rocha A (2015) Face spoofing detection through visual codebooks of spectral temporal cubes. Trans Image Process 24(12):4726–4740

    Article  MathSciNet  Google Scholar 

  27. Pinto A, Schwartz WR, Pedrini H, de Rezende Rocha A (2015) Using visual rhythms for detecting video-based facial spoof attacks. Trans Inf Forensics Secur 10(5):1025–1038

    Article  Google Scholar 

  28. Plataniotis KN, Venetsanopoulos AN (2013) Color image processing and applications. Springer, London

    Google Scholar 

  29. Rosipal R, Krämer N (2005) Overview and recent advances in partial least squares. In: International statistical and optimization perspectives workshop. Springer, London, pp 34–51

  30. Schwartz WR, Rocha A, Pedrini H (2011) Face spoofing detection through partial least squares and low-level descriptors. In: International joint conference on biometrics. IEEE, New York, pp 1–8

  31. Siddiqui TA, Bharadwaj S, Dhamecha TI, Agarwal A, Vatsa M, Singh R, Ratha N (2016) Face anti-spoofing with multifeature videolet aggregation. In: International conference on pattern recognition. IEEE, New York, pp 1035–1040

  32. Steinwart I, Christmann A (2008) Support vector machines. Springer, London

    MATH  Google Scholar 

  33. Valle E, Lotufo R (2017) Transfer learning using convolutional neural networks for face anti-spoofing. In: International conference image analysis and recognition, vol 10317. Springer, London, p 27

  34. Vareto RH, Diniz MA, Schwartz WR (2019) Face spoofing detection on low-power devices using embeddings with spatial and frequency-based descriptors. In: Iberoamerican congress on pattern recognition. Springer, London, pp 187–197

  35. Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. Trans Inf Forensics Secur 10(4):746–761

    Article  Google Scholar 

  36. Xiong Q, Liang YC, Li KH, Gong Y (2015) An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems. Trans Inf Forensics Secur 10(5):1

    Article  Google Scholar 

  37. Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: International conference on biometrics. IEEE, New York, pp 26–31

Download references

Acknowledgements

The authors would like to thank the National Council for Scientific and Technological Development—CNPq (Grants 438629/2018-3 and 309953/2019-7), the Minas Gerais Research Foundation—FAPEMIG (Grants APQ-00567-14 and PPM-00540-17) and the Coordination for the Improvement of Higher Education Personnel—CAPES (DeepEyes Project).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rafael Henrique Vareto.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vareto, R.H., Schwartz, W.R. Face spoofing detection via ensemble of classifiers toward low-power devices. Pattern Anal Applic 24, 511–521 (2021). https://doi.org/10.1007/s10044-020-00937-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-020-00937-x

Keywords

Navigation