Abstract
In this paper, we explore the prospects for using Intel RealSense depth cameras to solve the problem of presentation attack detection in facial authentication systems. Studies known to date use quantized depth data. Such an approach makes it impossible to connect these data with anthropometric facial features and scene geometry. In addition, in recent papers, some researchers declared the limitation of using depth cameras in this problem only at small (less than 1 m) distances to the face. In this regard, we have made our collection of 480 samples containing bonafide images and two types of presentation attacks. The samples were taken at distances up to 2 m, as well as in different face positions relative to the camera axis. We also designed a set of features based on texture analysis, anthropometric properties, and face oval localization. The conducted experiments show the advantage of using the original, not quantized depth data. Our study also refutes the thesis that depth cameras can be used for presentation attack detection only at short distances. Additionally, we demonstrate the applicability of the proposed features on one of the publicly available datasets.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhang, M., Zeng, K., Wang, J.: A survey on face anti-spoofing algorithms. J. Inf. Hiding Priv. Prot. 2(1), 21 (2020)
Daniel, N., Anitha, A.: Texture and quality analysis for face spoofing detection. Comput. Electr. Eng. 94, 107293 (2021)
Shu, X., Tang, H., Huang, S.: Face spoofing detection based on chromatic ED-LBP texture feature. Multimed. Syst. 27(2), 161–176 (2020). https://doi.org/10.1007/s00530-020-00719-9
Sthevanie, F., Ramadhani, K.N.: Spoofing detection on facial images recognition using LBP and GLCM combination. J. Phys.: Conf. Ser. 971(1), 012014 (2018)
Hadiprakoso, R.B.: Face anti-spoofing method with blinking eye and HSV texture analysis. IOP Conf. Ser.: Mater. Sci. Eng. 1007(1), 012034 (2020)
Li, Y., Wang, Y., Zhao, Z.: Face anti-spoofing methods based on physical technology and deep learning. In: International Conference on Computer Vision, Application, and Design (CVAD 2021), vol. 12155, pp. 173–184 (2021)
Singh, A.K., Joshi, P., Nandi, G.C.: Face recognition with liveness detection using eye and mouth movement. In: Proceedings of International Conference on Signal Propagation and Computer Technology, pp. 592–597 (2014)
Ng, E.S., Chia, Y.S.: Face verification using temporal affective cues. In: Proceedings of the 21st International Conference on Pattern Recognition, pp. 1249–1252 (2012)
Zhou, J., Ge, C., Yang, J., Yao, H., Qiao, X., Deng, P.: Research and application of face anti-spoofing based on depth camera. In: 2019 2nd China Symposium on Cognitive Computing and Hybrid Intelligence (CCHI), pp. 225–229 (2019)
Bao, W., Li, H., Li, N., Jiang, W.: A liveness detection method for face recognition based on optical flow field. In: Proceedings of International Conference on Image Analysis and Signal Processing, pp. 233–236 (2009)
Smiatacz, M.: Liveness measurements using optical flow for biometric person authentication. Metrol. Meas. Syst. 19(2), 257–268 (2012)
Li, X., Komulainen, J., Zhao, G.: Generalized face anti-spoofing by detecting pulse from face videos. In: Proceedings of IEEE 23rd International Conference on Pattern Recognition, pp. 4239–4244 (2016)
Chang, H.H., Yeh, C.H.: Face anti-spoofing detection based on multi-scale image quality assessment. Image Vis. Comput. 121, 104428 (2022)
Galbally, J., Marcel, S.: Face anti-spoofing based on general image quality assessment. In: Proceedings of 22nd International Conference on Pattern Recognition, pp. 1173–1178 (2014)
Galbally, J., Marcel, S., Fierrez, J.: Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans. Image Process. 23(2), 710–724 (2014)
Mohamed, S., Ghoneim, A., Youssif, A.: Visible/infrared face spoofing detection using texture descriptors. MATEC Web Conf. 292, 04006 (2019)
Sun, L., Huang, W.B., Wu, M.H.: TIR/VIS correlation for liveness detection in face recognition. In: International Conference on Computer Analysis of Images and Patterns, pp. 114–121 (2011)
Erdogmus, N., Marcel, S.: Spoofing 2D face recognition systems with 3D masks and antispoofing with Kinect. In: 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG), pp. 1–8 (2013)
Sun, X., Huang, L., Liu, C.: Multimodal face spoofing detection via RGB-D images. In: 2018 24th International Conference on Pattern Recognition (ICPR), pp. 2221–2226 (2018)
Naveen, S., Fathima, R.S., Moni, R.S.: Face recognition and authentication using LBP and BSIF mask detection and elimination. In: 2016 International Conference on Communication Systems and Networks (ComNet), pp. 99–102 (2016)
Raghavendra, R., Busch, C.: Novel presentation attack detection algorithm for face recognition system: application to 3d face mask attack. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 323–327 (2014)
Albakri, G., Alghowinem, S.: The effectiveness of depth data in liveness face authentication using 3D sensor cameras. Sensors 19(8), 1928 (2019)
Wang, Y., Nian, F., Li, T., Meng, Z., Wang, K.: Robust face anti-spoofing with depth information. J. Vis. Commun. Image Represent. 49, 332–337 (2017)
Ewald, K.E., Zeng, L., Mawuli, C.B., Abubakar, H.S., Victor, A.: Applying CNN with extracted facial patches using 3 modalities to detect 3D face spoof. In: 2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 216–221 (2020)
George, A., Mostaani, Z., Geissenbuhler, D., Nikisins, O., Anjos, A., Marcel, S.: Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE Trans. Inf. Forensics Secur. 15, 42–55 (2019)
Erdogmus, N., Marcel, S.: Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–6 (2013)
Zhang, S., et al.: Casia-surf: a large-scale multi-modal benchmark for face anti-spoofing. IEEE Trans. Biom., Behav., Identity Sci. 2(2), 182–193 (2020)
Bhattacharjee, S., Mohammadi, A., Marcel, S.: Spoofing deep face recognition with custom silicone masks. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–7 (2018)
Heusch, G., George, A., Geissbühler, D., Mostaani, Z., Marcel, S.: Deep models and shortwave infrared information to detect face presentation attacks. IEEE Trans. Biom., Behav., Identity Sci. 2(4), 399–409 (2020)
Jiang, B., Ren, Q., Dai, F., **ong, J., Yang, J., Gui, G.: Multi-task cascaded convolutional neural networks for real-time dynamic face recognition method. In: Liang, Q., Liu, X., Na, Z., Wang, W., Mu, J., Zhang, B. (eds.) Communications, Signal Processing, and Systems, pp. 59–66. Springer, Singapore (2020). https://doi.org/10.1007/978-981-13-6508-9_8
Bulat, A., Tzimiropoulos, G.: How far are we from solving the 2D & 3D face alignment problem? (and a dataset of 230,000 3D facial landmarks). In: 2017 IEEE International Conference on Computer Vision (ICCV), pp. 1021–1030. IEEE, Venice (2017)
Acknowledgments
This work was supported by the Russian Foundation for Basic Research (project 19-29-09045).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Tarasov, A.A., Denisova, A.Y., Fedoseev, V.A. (2023). Detection of Presentation Attacks on Facial Authentication Systems Using Intel RealSense Depth Cameras. In: Abraham, A., Hong, TP., Kotecha, K., Ma, K., Manghirmalani Mishra, P., Gandhi, N. (eds) Hybrid Intelligent Systems. HIS 2022. Lecture Notes in Networks and Systems, vol 647. Springer, Cham. https://doi.org/10.1007/978-3-031-27409-1_119
Download citation
DOI: https://doi.org/10.1007/978-3-031-27409-1_119
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-27408-4
Online ISBN: 978-3-031-27409-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)