Detection of Presentation Attacks on Facial Authentication Systems Using Intel RealSense Depth Cameras

  • Conference paper
  • First Online:
Hybrid Intelligent Systems (HIS 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 647))

Included in the following conference series:

  • 570 Accesses

Abstract

In this paper, we explore the prospects for using Intel RealSense depth cameras to solve the problem of presentation attack detection in facial authentication systems. Studies known to date use quantized depth data. Such an approach makes it impossible to connect these data with anthropometric facial features and scene geometry. In addition, in recent papers, some researchers declared the limitation of using depth cameras in this problem only at small (less than 1 m) distances to the face. In this regard, we have made our collection of 480 samples containing bonafide images and two types of presentation attacks. The samples were taken at distances up to 2 m, as well as in different face positions relative to the camera axis. We also designed a set of features based on texture analysis, anthropometric properties, and face oval localization. The conducted experiments show the advantage of using the original, not quantized depth data. Our study also refutes the thesis that depth cameras can be used for presentation attack detection only at short distances. Additionally, we demonstrate the applicability of the proposed features on one of the publicly available datasets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 234.33
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 299.59
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://github.com/vicanfed/depth-pad-dataset.

References

  1. Zhang, M., Zeng, K., Wang, J.: A survey on face anti-spoofing algorithms. J. Inf. Hiding Priv. Prot. 2(1), 21 (2020)

    Google Scholar 

  2. Daniel, N., Anitha, A.: Texture and quality analysis for face spoofing detection. Comput. Electr. Eng. 94, 107293 (2021)

    Article  Google Scholar 

  3. Shu, X., Tang, H., Huang, S.: Face spoofing detection based on chromatic ED-LBP texture feature. Multimed. Syst. 27(2), 161–176 (2020). https://doi.org/10.1007/s00530-020-00719-9

    Article  Google Scholar 

  4. Sthevanie, F., Ramadhani, K.N.: Spoofing detection on facial images recognition using LBP and GLCM combination. J. Phys.: Conf. Ser. 971(1), 012014 (2018)

    Google Scholar 

  5. Hadiprakoso, R.B.: Face anti-spoofing method with blinking eye and HSV texture analysis. IOP Conf. Ser.: Mater. Sci. Eng. 1007(1), 012034 (2020)

    Article  Google Scholar 

  6. Li, Y., Wang, Y., Zhao, Z.: Face anti-spoofing methods based on physical technology and deep learning. In: International Conference on Computer Vision, Application, and Design (CVAD 2021), vol. 12155, pp. 173–184 (2021)

    Google Scholar 

  7. Singh, A.K., Joshi, P., Nandi, G.C.: Face recognition with liveness detection using eye and mouth movement. In: Proceedings of International Conference on Signal Propagation and Computer Technology, pp. 592–597 (2014)

    Google Scholar 

  8. Ng, E.S., Chia, Y.S.: Face verification using temporal affective cues. In: Proceedings of the 21st International Conference on Pattern Recognition, pp. 1249–1252 (2012)

    Google Scholar 

  9. Zhou, J., Ge, C., Yang, J., Yao, H., Qiao, X., Deng, P.: Research and application of face anti-spoofing based on depth camera. In: 2019 2nd China Symposium on Cognitive Computing and Hybrid Intelligence (CCHI), pp. 225–229 (2019)

    Google Scholar 

  10. Bao, W., Li, H., Li, N., Jiang, W.: A liveness detection method for face recognition based on optical flow field. In: Proceedings of International Conference on Image Analysis and Signal Processing, pp. 233–236 (2009)

    Google Scholar 

  11. Smiatacz, M.: Liveness measurements using optical flow for biometric person authentication. Metrol. Meas. Syst. 19(2), 257–268 (2012)

    Article  Google Scholar 

  12. Li, X., Komulainen, J., Zhao, G.: Generalized face anti-spoofing by detecting pulse from face videos. In: Proceedings of IEEE 23rd International Conference on Pattern Recognition, pp. 4239–4244 (2016)

    Google Scholar 

  13. Chang, H.H., Yeh, C.H.: Face anti-spoofing detection based on multi-scale image quality assessment. Image Vis. Comput. 121, 104428 (2022)

    Article  Google Scholar 

  14. Galbally, J., Marcel, S.: Face anti-spoofing based on general image quality assessment. In: Proceedings of 22nd International Conference on Pattern Recognition, pp. 1173–1178 (2014)

    Google Scholar 

  15. Galbally, J., Marcel, S., Fierrez, J.: Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans. Image Process. 23(2), 710–724 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  16. Mohamed, S., Ghoneim, A., Youssif, A.: Visible/infrared face spoofing detection using texture descriptors. MATEC Web Conf. 292, 04006 (2019)

    Article  Google Scholar 

  17. Sun, L., Huang, W.B., Wu, M.H.: TIR/VIS correlation for liveness detection in face recognition. In: International Conference on Computer Analysis of Images and Patterns, pp. 114–121 (2011)

    Google Scholar 

  18. Erdogmus, N., Marcel, S.: Spoofing 2D face recognition systems with 3D masks and antispoofing with Kinect. In: 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG), pp. 1–8 (2013)

    Google Scholar 

  19. Sun, X., Huang, L., Liu, C.: Multimodal face spoofing detection via RGB-D images. In: 2018 24th International Conference on Pattern Recognition (ICPR), pp. 2221–2226 (2018)

    Google Scholar 

  20. Naveen, S., Fathima, R.S., Moni, R.S.: Face recognition and authentication using LBP and BSIF mask detection and elimination. In: 2016 International Conference on Communication Systems and Networks (ComNet), pp. 99–102 (2016)

    Google Scholar 

  21. Raghavendra, R., Busch, C.: Novel presentation attack detection algorithm for face recognition system: application to 3d face mask attack. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 323–327 (2014)

    Google Scholar 

  22. Albakri, G., Alghowinem, S.: The effectiveness of depth data in liveness face authentication using 3D sensor cameras. Sensors 19(8), 1928 (2019)

    Article  Google Scholar 

  23. Wang, Y., Nian, F., Li, T., Meng, Z., Wang, K.: Robust face anti-spoofing with depth information. J. Vis. Commun. Image Represent. 49, 332–337 (2017)

    Article  Google Scholar 

  24. Ewald, K.E., Zeng, L., Mawuli, C.B., Abubakar, H.S., Victor, A.: Applying CNN with extracted facial patches using 3 modalities to detect 3D face spoof. In: 2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 216–221 (2020)

    Google Scholar 

  25. George, A., Mostaani, Z., Geissenbuhler, D., Nikisins, O., Anjos, A., Marcel, S.: Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE Trans. Inf. Forensics Secur. 15, 42–55 (2019)

    Article  Google Scholar 

  26. Erdogmus, N., Marcel, S.: Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–6 (2013)

    Google Scholar 

  27. Zhang, S., et al.: Casia-surf: a large-scale multi-modal benchmark for face anti-spoofing. IEEE Trans. Biom., Behav., Identity Sci. 2(2), 182–193 (2020)

    Article  Google Scholar 

  28. Bhattacharjee, S., Mohammadi, A., Marcel, S.: Spoofing deep face recognition with custom silicone masks. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–7 (2018)

    Google Scholar 

  29. Heusch, G., George, A., Geissbühler, D., Mostaani, Z., Marcel, S.: Deep models and shortwave infrared information to detect face presentation attacks. IEEE Trans. Biom., Behav., Identity Sci. 2(4), 399–409 (2020)

    Article  Google Scholar 

  30. Jiang, B., Ren, Q., Dai, F., **ong, J., Yang, J., Gui, G.: Multi-task cascaded convolutional neural networks for real-time dynamic face recognition method. In: Liang, Q., Liu, X., Na, Z., Wang, W., Mu, J., Zhang, B. (eds.) Communications, Signal Processing, and Systems, pp. 59–66. Springer, Singapore (2020). https://doi.org/10.1007/978-981-13-6508-9_8

    Chapter  Google Scholar 

  31. Bulat, A., Tzimiropoulos, G.: How far are we from solving the 2D & 3D face alignment problem? (and a dataset of 230,000 3D facial landmarks). In: 2017 IEEE International Conference on Computer Vision (ICCV), pp. 1021–1030. IEEE, Venice (2017)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the Russian Foundation for Basic Research (project 19-29-09045).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Y. Denisova .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tarasov, A.A., Denisova, A.Y., Fedoseev, V.A. (2023). Detection of Presentation Attacks on Facial Authentication Systems Using Intel RealSense Depth Cameras. In: Abraham, A., Hong, TP., Kotecha, K., Ma, K., Manghirmalani Mishra, P., Gandhi, N. (eds) Hybrid Intelligent Systems. HIS 2022. Lecture Notes in Networks and Systems, vol 647. Springer, Cham. https://doi.org/10.1007/978-3-031-27409-1_119

Download citation

Publish with us

Policies and ethics

Navigation