Detecting face presentation attacks in mobile devices with a patch-based CNN and a sensor-aware loss function
Open Access
- 4 September 2020
- journal article
- research article
- Published by Public Library of Science (PLoS) in PLOS ONE
- Vol. 15 (9), e0238058
- https://doi.org/10.1371/journal.pone.0238058
Abstract
With the widespread use of biometric authentication comes the exploitation of presentation attacks, possibly undermining the effectiveness of these technologies in real-world setups. One example takes place when an impostor, aiming at unlocking someone else’s smartphone, deceives the built-in face recognition system by presenting a printed image of the user. In this work, we study the problem of automatically detecting presentation attacks against face authentication methods, considering the use-case of fast device unlocking and hardware constraints of mobile devices. To enrich the understanding of how a purely software-based method can be used to tackle the problem, we present a solely data-driven approach trained with multi-resolution patches and a multi-objective loss function crafted specifically to the problem. We provide a careful analysis that considers several user-disjoint and cross-factor protocols, highlighting some of the problems with current datasets and approaches. Such analysis, besides demonstrating the competitive results yielded by the proposed method, provides a better conceptual understanding of the problem. To further enhance efficacy and discriminability, we propose a method that leverages the available gallery of user data in the device and adapts the method decision-making process to the user’s and the device’s own characteristics. Finally, we introduce a new presentation-attack dataset tailored to the mobile-device setup, with real-world variations in lighting, including outdoors and low-light sessions, in contrast to existing public datasets.Keywords
Funding Information
- Motorola
This publication has 44 references indexed in Scilit:
- Using Visual Rhythms for Detecting Video-Based Facial Spoof AttacksIEEE Transactions on Information Forensics and Security, 2015
- Face Spoof Detection With Image Distortion AnalysisIEEE Transactions on Information Forensics and Security, 2015
- Deep Representations for Iris, Face, and Fingerprint Spoofing DetectionIEEE Transactions on Information Forensics and Security, 2015
- Motion‐based counter‐measures to photo attacks in face recognitionIET Biometrics, 2014
- Face liveness detection using dynamic textureEURASIP Journal on Image and Video Processing, 2014
- Representation Learning: A Review and New PerspectivesIEEE Transactions on Pattern Analysis and Machine Intelligence, 2013
- Monocular camera-based face liveness detection by combining eyeblink and scene contextTelecommunication Systems, 2010
- Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative ModelLecture Notes in Computer Science, 2010
- Digital Camera Identification From Sensor Pattern NoiseIEEE Transactions on Information Forensics and Security, 2006
- Learning representations by back-propagating errorsNature, 1986