| Literature DB >> 31022904 |
Ghazel Albakri1, Sharifa Alghowinem2.
Abstract
Even though biometric technology increases the security of systems that use it, they are prone to spoof attacks where attempts of fraudulent biometrics are used. To overcome these risks, techniques on detecting liveness of the biometric measure are employed. For example, in systems that utilise face authentication as biometrics, a liveness is assured using an estimation of blood flow, or analysis of quality of the face image. Liveness assurance of the face using real depth technique is rarely used in biometric devices and in the literature, even with the availability of depth datasets. Therefore, this technique of employing 3D cameras for liveness of face authentication is underexplored for its vulnerabilities to spoofing attacks. This research reviews the literature on this aspect and then evaluates the liveness detection to suggest solutions that account for the weaknesses found in detecting spoofing attacks. We conduct a proof-of-concept study to assess the liveness detection of 3D cameras in three devices, where the results show that having more flexibility resulted in achieving a higher rate in detecting spoofing attacks. Nonetheless, it was found that selecting a wide depth range of the 3D camera is important for anti-spoofing security recognition systems such as surveillance cameras used in airports. Therefore, to utilise the depth information and implement techniques that detect faces regardless of the distance, a 3D camera with long maximum depth range (e.g., 20 m) and high resolution stereo cameras could be selected, which can have a positive impact on accuracy.Entities:
Keywords: 3D face authentication; anti-spoofing techniques; biometric technology; face authentication; liveness assurance
Year: 2019 PMID: 31022904 PMCID: PMC6515036 DOI: 10.3390/s19081928
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Biometric enrolment and verification process.
List of face authentication public datasets.
| Dataset Name | Dataset Size | Dataset File | Spoofing Cases | Liveness Features |
|---|---|---|---|---|
| ZJU Eyeblink | 80 video clips of 20 candidates | Video clips | 4 clips per subject: a frontal view without glasses, a frontal view and wearing thin rim glasses, a frontal view and black frame glasses, and with upward view without glasses | Eyes blinking |
| Print-Attack Replay | 200 video clips of 50 clients | Video clips, 2D images | Video attacks of clients, 2D printed-photo attack of clients | Real-access attempt videos |
| SLIET | 65 video clips | Video clips, 2D images | videos of authentic users, pictures of valid users held by attacker | Eye blink, lips and chin movement |
| Replay-Attack Database | 1300 photo and video attack attempts of 50 clients | Video clips, 2D images | Video attacks of clients under different lighting, 2D printed-photo attack of clients under different lighting, On-screen attacks | 25 general image quality measures and Context-based using correlation between face motion vs. background motion |
| NUAA | 12,614 of live and photographed faces | 2D images | 2D printed photos | Face texture using Lambertian model and Eye blink detection using Conditional Random Fields |
| CASIA | 50 subjects | video recordings of genuine and fake faces | warped photo attacks, cut photo attacks, video attacks | Facial motion and eyes blinking |
| 3DMAD | 76,500 frames of 17 persons | depth image, RGB image | Video attacks, 3D mask attacks | Eye position |
| Patrick Chan | 50 subjects 600 videos | 2D images | paper photo attack, iPad photo attack, video attack, 2D mask attack, curved mask attack | Temperature |
| MSU MFSD | 280 video clips of photo and video attack attempts to 35 clients | Video clips | printed attacks, replay attacks generated with a mobile phone and a tablet | Image distortion based quality measures |
| Replay-mobile database | 1030 videos from 40 subjects | Video clips | print photo attack, tablet photo attack, mobile video attack | Image resolution |
| IIIT-D | 4603 RGB-D images of 106 subjects | RGB Depth Images | Flat images | Pose and expression variation |
| BUAA Lock3DFace | 5711 RGB-D video sequences of 509 subjects | RGB Depth Videos | Video attacks | Face2D liveness detection |
| Jiyun Cui | RGB-D images of 747 subjects | RGB Depth Images | Flat images | 2D face recognition |
| SMAD | 130 video | Video clips | vivid silicone masks | Dynamic Texture for 3D Mask |
| Oulu-NPU | 4950 bona fide and artefact face videos corresponding to the 55 subjects | Video clips, 2D images | Print photo, Replay video | Image resolution |
| Yale-Recaptured | 28 subjects | Images | LCD screen | Different resolutions |
| MS-Face | 21 subject | Images | Printed images | Colour |
| Florence 2D/3D Face | 53 subject | 3D scans of human faces Videos and images | No spoof attack | N/A |
Related work summary.
| Ref | Biometrics | Spoof Attack | Anti-Spoofing | |
|---|---|---|---|---|
| Hardware | Software | |||
| [ | Face biometrics | Shaking a regular photograph in front of the camera and real time video on a mobile phone | Basic hardware equipment | Pupil Tracking |
| [ | Iris, Fingerprint, Face Recognition | Synthetic iris samples, A database of fake fingerprint, A database containing short videos of face images | - | Image quality assessment |
| [ | Face biometrics | 3D mask, print and video | Pulse detection from facial videos | Analyse colour changes corresponding to heart rate |
| [ | Face biometrics | Two cameras: one that captures an infrared, image and another which captures a normal image | Using light reflection—infrared led | - |
| [ | Face biometrics | Images presented on smart-phone screen | - | Raw data sensors |
| [ | Iris, Face, Palm images | Fusion Technique | - | Image quality assessment |
| [ | Fingerprint, Face | Fake fevicol fingerprint, Mobile Images both high and low resolution, Photo print image | - | Image quality assessment |
| [ | Face biometrics | A regular live video, printed pictures, wearing a mask with printed pictures, pictures in a LCD monitor, video displayed in mobile devices | - | Similarity is measured (using similarity index measure (SSIM) and a background motion index (BMI)) |
| [ | Face biometrics | Genuine photo, planar photo, photo wrapped horizontally and photo wrapped vertically | - | Analysing 3D structure |
| [ | Face biometrics | Face images printed on A4 paper | - | Non-rigid motion, face-background consistency, banding effect. |
| [ | Face biometrics | Imitating high resolution photographs in motion | - | Utilising optical flow of lines |
| [ | Face biometrics | Fake face images are taken from faces printed on paper or displayed on an LCD screen | - | Using noise local variance model |
| [ | Face biometrics | 2D printed photograph presented either wrapped or unwrapped | - | Image quality assessment |
| [ | Face biometrics | Wrapped photo attack, cut photo attack, video attack | - | Spectral analysis |
| [ | Face biometrics | Print and replay attacks from live (valid)videos containing an authentic face | - | Dynamic Mode Decomposition |
| [ | Iris Face Fingerprint | Printed images | - | Using hyper-parameter optimisation of network architectures ( architecture optimisation) |
| [ | Face biometrics | Used spoofing attacks provided in these databases: CASIA, Replay-Attack, NUAA | - | Using Multiscale Dynamic Binarized Statistical Image Features |
| [ | Face biometrics | Printed faces, video displays or masks | - | Colour texture analysis |
| [ | Face biometrics | A set of polarised images, And printed paper masks | Polarised light | |
| [ | Face biometrics | Image displayed on iPad, image displayed on iPhone, and printed photo | - | Image distortion analysis |
| [ | Face biometrics | Using the Extended Multispectral Presentation Attack Face Database (EMSPAD) | - | analysing the spectral signature |
| [ | Face biometrics | Warped photo attack, cut photo attack and video attack | - | Fisher score |
| [ | Face biometrics | 2D photographs, video attacks and masks | - | HOG-LPQ and Fuz-SVM Classifier |
| [ | Face Biometrics | 3D Printed Masks | ArtecID 3D Face Log On System | |
| [ | Face Biometrics | A4 paper photo attack, iPad photo attack, video attack, mask attack, and curved mask attack | Flash light | Light illumination detection |
| [ | Face Biometrics | video and photo attacks | - | Eyeblink, lip movement and chin movement, background changes |
| [ | Face Biometrics | Different environments and lighting conditions | Flash light | Computing 3D features |
| [ | Face Biometrics | video attacks | - | Deep CNN networks |
| [ | Face Biometrics | 2D images | - | Depth estimation |
| [ | Face Biometrics | 2D images, video clips attacks | - | Guided scale space to reduce noise |
| [ | Face Biometrics | video attacks | - | Colour texture analysis |
| [ | Face Biometrics | 3D mask attacks | - | Deep dynamic texture |
| [ | Face Biometrics | 2D images, video clips attacks | - | Nonlinear diffusion |
| [ | Face Biometrics | 2D images, iPad image display attacks | - | Characteristics of the display and probabilistic neural network |
Figure 2Flowchart of the process.
Summary of spoof attacks.
| Spoof Attack | Material |
|---|---|
| Real face | Real face wearing scarf (Baseline) |
| Real face without scarf | |
| Real face wearing glasses (Occlusion) | |
| Face displayed on device | iPhone 6s Screen |
| Face printed on A4 image paper | Matte |
| Printed Face mask (bent and worn on the face) | Matte |
| Video attack - face moving and eyes blinking | iPhone 6s Screen |
Device screen specifications.
| iPhone 6s | Huawei Tablet | Lenovo Laptop | |
|---|---|---|---|
| Type | LED-backlit | IPS LCD | HD LED |
| Size | 4.7 inches | 7.0 inches | 14 inch |
| Resolution | 750 × 1334 pixels | 600 × 1024 pixels | 1366 × 768 pixels |
Summary of Spoof Attack Results.
| Spoof Attack | Material | Ground Truth * | Results | ||
|---|---|---|---|---|---|
| iFace 800 | iPhone X | Kinect | |||
| Real Face | Real face with scarf | Accept | Accept | Accept | Accept |
| Real face wearing glasses | Accept | Reject | Accept | Accept | |
| Real face without scarf | Accept | Reject | Accept | Accept | |
| Face displayed on device | iPhone 6s screen | Reject | Reject | Reject | Reject |
| Huawei tablet | Reject | Reject | Reject | Reject | |
| Lenovo laptop | Reject | Reject | Reject | Reject | |
| Printed Face image | Matte | Reject | Reject | Reject | Reject |
| Glossy | Reject | Reject | Reject | Reject | |
| Printed Face mask(bent and worn on face) | Matte | Reject | Reject | Reject | Reject |
| Glossy | Reject | Reject | Reject | Reject | |
| Video attack | iPhone 6s screen | Reject | Reject | Reject | Reject |
| Huawei tablet | Reject | Reject | Reject | Reject | |
| Lenovo laptop | Reject | Reject | Reject | Reject | |
* Accept: indicates successfully given access; Reject: indicates failure to give access.
Figure 3Overall results from the test-cases for the investigated 3D-camera devices.