Skip to main content

Multi-channel Face Presentation Attack Detection Using Deep Learning

  • Chapter
  • First Online:
Deep Learning-Based Face Analytics

Abstract

Face recognition has emerged as a widely used biometric modality. However, its vulnerability to presentation attacks remains a significant security threat. Although Presentation Attack Detection (PAD) methods attempt to remedy this problem, often they fail in generalizing to unseen attacks and environments. As the quality of presentation attack instruments improves over time, achieving reliable PA detection using only visual spectra remains a major challenge. We argue that multi-channel systems could help solve this problem. In this chapter, we first present an approach based on a multi-channel convolutional neural network for the detection of presentation attacks. We further extend this approach to a one-class classifier framework by introducing a novel loss function that forces the network to learn a compact embedding for the bonafide class while being far from the representation of attacks. The proposed framework introduces a novel way to learn a robust PAD system from bonafide and available (known) attack classes. The superior performance in unseen attack samples in publicly available multi-channel PAD database WMCA shows the effectiveness of the proposed approach. Software, data, and protocols for reproducing the results are made publicly available.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The term spoofing should be deprecated in favor of presentation attacks to comply with ISO standards.

  2. 2.

    Source code: https://gitlab.idiap.ch/bob/bob.paper.oneclass_mccnn_2019.

  3. 3.

    Database available at: https://www.idiap.ch/dataset/wmca.

  4. 4.

    Available from: https://github.com/AlexanderParkin/ChaLearn_liveness_challenge.

  5. 5.

    Source code: https://gitlab.idiap.ch/bob/bob.paper.oneclass_mccnn_2019.

References

  1. Agarwal A, Yadav D, Kohli N, Singh R, Vatsa M, Noore A (2017) Face presentation attack with latex masks in multispectral videos. In: 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp 275–283. https://doi.org/10.1109/CVPRW.2017.40

  2. Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: 2011 international joint conference on biometrics (IJCB), pp 1–7. IEEE

    Google Scholar 

  3. Arashloo SR, Kittler J, Christmas W (2017) An anomaly detection approach to face spoofing detection: a new formulation and evaluation protocol. IEEE Access 5:13868–13882

    Article  Google Scholar 

  4. Atoum Y, Liu Y, Jourabloo A, Liu X (2017) Face anti-spoofing using patch and depth-based CNNS. In: 2017 IEEE international joint conference on biometrics (IJCB), pp 319–328. IEEE

    Google Scholar 

  5. Bhattacharjee S, Marcel S (2017) What you can’t see can help you–extended-range imaging for 3D-mask presentation attack detection. In: Proceedings of the 16th international conference on biometrics special interest group., EPFL-CONF-231840. Gesellschaft fuer Informatik eV (GI)

    Google Scholar 

  6. Bhattacharjee S, Mohammadi A, Marcel S (2018) Spoofing deep face recognition with custom silicone masks. In: 2018 IEEE 9th international conference on biometrics theory, applications and systems (BTAS)

    Google Scholar 

  7. Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche SE, Ouafi A, Dornaika F, Taleb-Ahmed A, Qin L et al (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. IJCB 7

    Google Scholar 

  8. Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: 2015 IEEE international conference on image processing (ICIP), pp 2636–2640. IEEE

    Google Scholar 

  9. Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: Proceedings of the 11th international conference of the biometrics special interest group, EPFL-CONF-192369

    Google Scholar 

  10. Chingovska I, Dos Anjos AR (2015) On the use of client identity information for face antispoofing. IEEE Trans Inf Forensics Secur 10(4):787–796

    Article  Google Scholar 

  11. Costa-Pazo A, Bhattacharjee S, Vazquez-Fernandez E, Marcel S (2016) The replay-mobile face presentation-attack database. In: 2016 international conference of the biometrics special interest group (BIOSIG). IEEE, pp 1–7

    Google Scholar 

  12. Dempster AP, Laird NM, Rubin DB (1977) Maximum likelihood from incomplete data via the EM algorithm. J R Stat Soc Series B 39(1):1–38

    MathSciNet  MATH  Google Scholar 

  13. Dhamecha TI, Nigam A, Singh R, Vatsa M (2013) Disguise detection and face recognition in visible and thermal spectrums. In: 2013 international conference on biometrics (ICB), pp 1–8. IEEE

    Google Scholar 

  14. Engelsma JJ, Jain AK (2019) Generalizing fingerprint spoof detector: learning a one-class classifier. arXiv preprint arXiv:1901.03918

  15. Erdogmus N, Marcel S (2014) Spoofing face recognition with 3D masks. IEEE Trans Inf Forensics Secur 9(7):1084–1097

    Article  Google Scholar 

  16. Fatemifar S, Awais M, Arashloo SR, Kittler J (2019) Combining multiple one-class classifiers for anomaly based face spoofing attack detection. In: International conference on biometrics (ICB)

    Google Scholar 

  17. de Freitas Pereira T, Anjos A, Marcel S (2018) Heterogeneous face recognition using domain specific units. IEEE Trans Inf Forensics Secur

    Google Scholar 

  18. Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724

    Article  MathSciNet  Google Scholar 

  19. Gan J, Li S, Zhai Y, Liu C (2017) 3D convolutional neural network based on face anti-spoofing. In: 2017 2nd international conference on multimedia and image processing (ICMIP), pp 1–5. IEEE

    Google Scholar 

  20. George A, Marcel S (2019) Deep pixel-wise binary supervision for face presentation attack detection. In: International conference on biometrics

    Google Scholar 

  21. George A, Marcel S (2020) Can your face detector do anti-spoofing? face presentation attack detection with a multi-channel face detector. Idiap Research Report, Idiap-RR-12-2020

    Google Scholar 

  22. George A, Marcel S (2020) Learning one class representations for face presentation attack detection using multi-channel convolutional neural networks. IEEE Trans Inf Forensics Secur 1 (2020)

    Google Scholar 

  23. George A, Mostaani Z, Geissenbuhler D, Nikisins O, Anjos A, Marcel S (2019) Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE Trans Inf Forensics Secur 1. DoI:https://doi.org/10.1109/TIFS.2019.2916652

  24. Hadsell R, Chopra S, LeCun Y (2006) Dimensionality reduction by learning an invariant mapping. In: 2006 ieee computer society conference on computer vision and pattern recognition (CVPR’06), vol 2. IEEE, pp 1735–1742

    Google Scholar 

  25. Haralick RM (1979) Statistical and structural approaches to texture. Proc IEEE 67(5):786–804

    Article  Google Scholar 

  26. Heusch G, George A, Geissbühler D, Mostaani Z, Marcel S (2020) Deep models and shortwave infrared information to detect face presentation attacks. IEEE Trans Biom Behav Identity Sci (T-BIOM)

    Google Scholar 

  27. Heusch G, Marcel S (2018) Pulse-based features for face presentation attack detection. In: 2018 IEEE 9th international conference on, special session On biometrics theory, applications and systems (BTAS), image and video forensics in biometrics (IVFIB)

    Google Scholar 

  28. Heusch G, Marcel S (2019) Remote blood pulse analysis for face presentation attack detection. In: Handbook of biometric anti-spoofing, pp 267–289. Springer

    Google Scholar 

  29. ISO/IEC JTC 1/SC 37 (2016) Biometrics: information technology—international organization for standardization. Iso standard, International Organization for Standardization

    Google Scholar 

  30. Jaiswal A, Xia S, Masi I, AbdAlmageed W (2019) Ropad: robust presentation attack detection through unsupervised adversarial invariance. arXiv preprint arXiv:1903.03691

  31. Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980

  32. Learned-Miller E, Huang GB, RoyChowdhury A, Li H, Hua G (2016) Labeled faces in the wild: a survey. In: Advances in face detection and facial image analysis. Springer, pp 189–248

    Google Scholar 

  33. Leys C, Ley C, Klein O, Bernard P, Licata L (2013) Detecting outliers: do not use standard deviation around the mean, use absolute deviation around the median. J Exp Soc Psychol 49(4):764–766

    Article  Google Scholar 

  34. Li H, He P, Wang S, Rocha A, Jiang X, Kot AC (2018) Learning generalized deep feature representation for face anti-spoofing. IEEE Trans Inf Forensics Secur 13(10):2639–2652

    Article  Google Scholar 

  35. Li H, Lu H, Lin Z, Shen X, Price B (2015) LCNN: low-level feature embedded CNN for salient object detection. arXiv preprint arXiv:1508.03928

  36. Liu, Y., Jourabloo, A., Liu, X.: Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 389–398

    Google Scholar 

  37. Liu, Y., Stehouwer, J., Jourabloo, A., Liu, X.: Deep tree learning for zero-shot face anti-spoofing. In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2019)

    Google Scholar 

  38. Maaten LVd, Hinton G (2008) Visualizing data using t-SNE. J Mach Learn Res 9:2579–2605

    Google Scholar 

  39. Määttä J, Hadid A, Pietikäinen M (2011) Face spoofing detection from single images using micro-texture analysis. In: 2011 international joint conference on biometrics (IJCB). IEEE, pp 1–7

    Google Scholar 

  40. Mallat S (2016) Understanding deep convolutional networks. Philo Trans R Soc A 374(2065):20150203

    Article  Google Scholar 

  41. Marcel S, Nixon M, Li S (2014) Handbook of biometric anti-spoofing-trusted biometrics under spoofing attacks. Adv Comput Vis Pattern Recognit. Springer

    Google Scholar 

  42. Marcel S, Nixon MS, Fierrez J, Evans N (2018) Handbook of biometric anti-spoofing: presentation attack detection. In: Marcel S, Nixon MS, Fierrez J, Evans N (eds). Springer International Publishing, 2nd edn. ISBN: 978-3319926261. https://doi.org/10.1007/978-3-319-92627-8.http://www.eurecom.fr/publication/5667

  43. Mehta S, Uberoi A, Agarwal A, Vatsa M, Singh R, Crafting a panoptic face presentation attack detector

    Google Scholar 

  44. Mostaani Z, George A, Heusch G, Geissenbuhler D, Marcel S (2020) The high-quality wide multi-channel attack (hq-wmca) database. Idiap-RR Idiap-RR-22-2020, Idiap

    Google Scholar 

  45. Nikisins O, George A, Marcel S (2019) Domain adaptation in multi-channel autoencoder based features for robust face anti-spoofing. In: 2019 international conference on biometrics (ICB). IEEE, pp 1–8

    Google Scholar 

  46. Nikisins O, Mohammadi A, Anjos A, Marcel S (2018) On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing. In: The 11th IAPR international conference on biometrics (ICB 2018), EPFL-CONF-233583

    Google Scholar 

  47. Parkin A, Grinchuk O (2019) Recognizing multi-modal face spoofing with face recognition networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 0–0

    Google Scholar 

  48. Paszke A, Gross S, Chintala S, Chanan G, Yang E, DeVito Z, Lin Z, Desmaison A, Antiga L, Lerer A (2017) Automatic differentiation in pytorch. In: NIPS-W

    Google Scholar 

  49. Patel K, Han H, Jain AK, Ott G (2015) Live face video vs. spoof face video: Use of moiré patterns to detect replay video attacks. In: 2015 international conference on biometrics (ICB). IEEE, pp 98–105

    Google Scholar 

  50. Perera P, Patel VM (2019) Learning deep features for one-class classification. IEEE Trans Image Process 28(11):5450–5463

    Article  MathSciNet  Google Scholar 

  51. Pérez-Cabo D, Jiménez-Cabello D, Costa-Pazo A, López-Sastre RJ (2019) Deep anomaly detection for generalized face anti-spoofing. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 0–0

    Google Scholar 

  52. Qi C, Su F (2017) Contrastive-center loss for deep neural networks. In: 2017 IEEE international conference on image processing (ICIP). IEEE, pp 2851–2855

    Google Scholar 

  53. Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434

  54. Raghavendra R, Raja KB, Venkatesh S, Busch C (2017) Extended multispectral face presentation attack detection: an approach based on fusing information from individual spectral bands. In: 2017 20th international conference on information fusion (Fusion). IEEE, pp 1–6

    Google Scholar 

  55. Ramachandra R, Busch C (2017) Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput Surv (CSUR) 50(1):8

    Article  Google Scholar 

  56. Shao R, Lan X, Yuen PC (2017) Deep convolutional dynamic texture learning with adaptive channel-discriminability for 3D mask face anti-spoofing. In: 2017 IEEE international joint conference on biometrics (IJCB). IEEE, pp 748–755

    Google Scholar 

  57. Steiner H, Kolb A, Jung N (2016) Reliable face anti-spoofing using multispectral SWIR imaging. In: 2016 international conference on biometrics (ICB). IEEE, pp 1–8

    Google Scholar 

  58. Wang G, Lan C, Han H, Shan S, Chen X (2019) Multi-modal face presentation attack detection via spatial and channel attentions. In: Proceedings of the IEEE Conference on computer vision and pattern recognition workshops, pp 0–0

    Google Scholar 

  59. Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761

    Article  Google Scholar 

  60. Wen Y, Zhang K, Li Z, Qiao Y (2016) A discriminative feature learning approach for deep face recognition. In: European conference on computer vision. Springer, pp 499–515

    Google Scholar 

  61. Wu X, He R, Sun Z, Tan T (2018) A light CNN for deep face representation with noisy labels. IEEE Trans Inf Forensics Secur 13(11):2884–2896

    Article  Google Scholar 

  62. Xiong F, AbdAlmageed W (2018) Unknown presentation attack detection with face RGB images. In: 2018 IEEE 9th international conference on biometrics theory, applications and systems (BTAS). IEEE, pp 1–9

    Google Scholar 

  63. Xiong X, De la Torre F (2013) Supervised descent method and its applications to face alignment. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 532–539

    Google Scholar 

  64. Yang J, Lei Z, Li SZ (2014) Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601

  65. Yosinski J, Clune J, Bengio Y, Lipson H (2014) How transferable are features in deep neural networks? In: Advances in neural information processing systems, pp 3320–3328

    Google Scholar 

  66. Zhang K, Zhang Z, Li Z, Qiao Y (2016) Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process Lett 23(10):1499–1503

    Article  Google Scholar 

  67. Zhang S, Wang X, Liu A, Zhao C, Wan J, Escalera S, Shi H, Wang Z, Li SZ (2018) Casia-surf: a dataset and benchmark for large-scale multi-modal face anti-spoofing. arXiv preprint arXiv:1812.00408

Download references

Acknowledgements

Part of this research is based on work supported by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA), via IARPA R&D Contract No. 2017-17020200005. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the ODNI, IARPA, or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anjith George .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

George, A., Marcel, S. (2021). Multi-channel Face Presentation Attack Detection Using Deep Learning. In: Ratha, N.K., Patel, V.M., Chellappa, R. (eds) Deep Learning-Based Face Analytics. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-030-74697-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-74697-1_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-74696-4

  • Online ISBN: 978-3-030-74697-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics