Motion‐based counter‐measures to photo attacks in face recognition
Open Access
- 1 September 2014
- journal article
- research article
- Published by Institution of Engineering and Technology (IET) in IET Biometrics
- Vol. 3 (3), 147-158
- https://doi.org/10.1049/iet-bmt.2012.0071
Abstract
Identity spoofing is a contender for high-security face-recognition applications. With the advent of social media and globalised search, peoples face images and videos are wide-spread on the Internet and can be potentially used to attack biometric systems without previous user consent. Yet, research to counter these threats is just on its infancy – the authors lack public standard databases, protocols to measure spoofing vulnerability and baseline methods to detect these attacks. The contributions of this work to the area are 3-fold: first, the authors a publicly available PHOTO-ATTACK database with associated protocols to measure the effectiveness of counter-measures is introduced. Based on the data available, a study is conducted on current state-of-the-art spoofing detection algorithms based on motion analysis, showing they fail under the light of this new dataset. By last, the authors propose a new technique of counter-measure solely based on foreground/background motion correlation using optical flow that outperforms all other algorithms achieving nearly perfect scoring with an equal-error rate of 1.52% on the available test data. The source code leading to the reported results is made available for the replicability of findings in this study.Keywords
This publication has 21 references indexed in Scilit:
- Monocular camera-based face liveness detection by combining eyeblink and scene contextTelecommunication Systems, 2010
- On the vulnerability of face verification systems to hill-climbing attacksPattern Recognition, 2010
- Robustness of multimodal biometric fusion methods against spoof attacksJournal of Visual Languages & Computing, 2009
- Non-intrusive liveness detection by face imagesImage and Vision Computing, 2009
- Liveness Detection for Face RecognitionPublished by IntechOpen ,2008
- Lucas/Kanade Meets Horn/Schunck: Combining Local and Global Optic Flow MethodsInternational Journal of Computer Vision, 2005
- A Secure Multimodal Biometric Verification SchemeLecture Notes in Computer Science, 2005
- Face Recognition with Local Binary PatternsLecture Notes in Computer Science, 2004
- Spoofing and Anti-Spoofing MeasuresInformation Security Technical Report, 2002
- DETERMINING OPTICAL-FLOWArtificial Intelligence, 1980