Image Quality Countermeasures against Face Spoof Attacks
Abstract
Face authentication technique is one of the widely used user authentication method and the important application of image processing. It is easier to attack by printed photo, replayed video, etc. That type of attacks also known as presentation attacks. By this tendency computationally efficient algorithm for face spoof detection is still unavailable. A reliable anti-spoofing technique can prevent most of the presentation attacks. In this paper, we manage this problem effectively via different Image Quality Countermeasures. The objective of the proposed system is to enhance the face spoof Detection frame work by reducing the complexity and increasing the security level. This work conducted on a publically available print attack or video attack database that gives the effectiveness of the algorithm.
Keywords
Full Text:
PDFReferences
I. Chingovska, A. Anjos, and S. Marcel, “On the effectiveness of local binary patterns in face anti-spoofing,” in Proc. IEEE BIOSIG, 2012, pp. 1–7.
L. Sun, G. Pan, Z. Wu, and S. Lao, “Blinking-based live face detection using conditional random fields,” in Proc. AIB, 2007, pp. 252–260.
W. Bao, H. Li, N. Li, and W. Jiang, “A liveness detection method for face recognition based on optical flow field,” in Proc. IASP, 2009, pp. 233–236. Tabularasa-euproject.org/I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
K. Kollreider, H. Fronthaler, M. I. Faraj, and J. Bigun, “Real-time face detection and motion analysis with application in “liveness” assessment,” IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 548–558, 2007.
J. Yang and S. Z. Li, “Face Liveness Detection with Component Dependent Descriptor,” in Proc. IJCB, pp. 1–6, 2013.
J. Galbally, S. Marcel, and J. Fierrez, “Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition,” IEEE Trans. Image Process., vol. 23, no. 2, pp. 710–724, 2014.
C.-C. Chang and C.-J. Lin, “LIBSVM: A library for support vector machines,” ACM Trans. Intell. Syst. Technol., vol. 2, no. 3, pp. 27:1–27, May 2011.
Di Wen, Hu Han,Anil K. Jain, “Face Spoof Detection with Image Distortion Analysis,” in,” IEEE Trans. Inf. Forensics Security, Jun 2015.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.