Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 443-447.doi: 10.11896/jsjkx.200900207

• Information Security • Previous Articles     Next Articles

Face Anti-spoofing Algorithm for Noisy Environment

ZHUO Ya-qian, OU Bo   

  1. College of Computer Science and Electronic Engineering,Hunan University,Changsha 410082,China
  • Online:2021-06-10 Published:2021-06-17
  • About author:ZHUO Ya-qian,born in 1997,postgra-duate.Her main research interests include information security and image processing.
    OU Bo,born in 1985,Ph.D,associate professor,Ph.D supervisor.His main research interests include information security and digital watermarking.
  • Supported by:
    National Natural Science Foundation of China(61502160) and Hunan Provincial Natural Science Foundation of China(2018JJ3078).

Abstract: In the era of intelligent,face recognition algorithm is one of the key technologies for smart identity authentication,and widely used in the fields of access control,mobile phone unlocking,and financial payment.Face anti-spoofing recognition is used to identify the real face and resist the fake face attacks.Among the existing methods,local binary pattern(LBP) can provide a good anti-spoofing performance in practice,but its recognition performance in noisy scenes can be improved.For this reason,we proposed a pairwise local binary pattern (PLBP) based on adjacent pixel pairs,which can improve the performance in noisy environments by exploiting the correlations between pixel pairs.Compared with LBP-based methods,the proposed algorithm compared the mean value of adjacent pixel pairs with neighboring pixels to generate a binary pattern,so that the spatial correlations between pixel pairs can be used to obtain more facial features.Experiment results show that the performance of the proposed method is better than the current mainstream LBP-based methods,the accuracy rate is nearly 95.05% under noise-free conditions.Our method also can reduce performance loss under Gaussian noise environment and provide a stronger robustness.

Key words: Face anti-spoofing, Pairwise local binary pattern, Support vector machine

CLC Number: 

  • TP399
[1] JI Q B,XU S G.Efficient Face Recognition System[J].Indust-rial Control Computer,2020,33(5):97-99.
[2] ZHAO X,LIN Y,HEIKKILA J.Dynamic Texture Recognition Using Volume Local Binary Count Patterns with an Application to 2D Face Spoofing Detection[C]//IEEE Transactions on Multimedia.2017:1-1.
[3] LI X B,KOMULAINEN J,ZHAO G Y,et al.Generalized Face Anti-spoofing by Detecting Pulse from FaceVideos [C]//Proceedings of the 23rd IEEE International Conference on Pattern Recognition.New York:IEEE Press,2016:4239-4244.
[4] LIU S Q,LAN X Y,YUEN P C.Remote Photoplethysmography Correspondence Feature for 3D Mask Face Presentation Attack Detection [C]//Proceedings of the Conference on Computer Vision.New York:IEEE Press,2018:558-573.
[5] BOULKENAFET Z,KOMULAINEN J,HADID A.Face Anti-spoofing Using Speeded-up Robust Features and Fisher Vector Encoding[C]//IEEE Signal Processing Letters.2017:141-145.
[6] SMIATACZ M.Liveness Measurements Using Optical Flow for Biometric Person Authentication [J].Metrology and Measurement Systems,2012,19(2):257-268.
[7] MAHORE A,TRIPATHI M.Detection of 3D Mask in 2D Face Recognition System Using DWT andLBP[C]//2018 IEEE 3rd International Conference on Communication and Information Systems.New York:IEEE Press,2018.
[8] WEN D,HAN H,JAIN A K.Face Spoof Detection with Image Distortion Analysis[C]//IEEE Transaction Information Forensics and Security.2015:746-761.
[9] BOULKENAFET Z,KOMULAINEN J,HADID A.Face Spoofing Detection Using Colour Texture Analysis[C]//IEEE Transactions on Information Forensics and Security.2016:1818-1830.
[10] ZHANG P,ZHOU F H.Feather Nets:Convolutional NeuralNetworks as Light as Feather for Face Anti-spoofing[C]//IEEE International Conferenceon Computer Vision and Pattern Recognition Workshops.New York:IEEE Press,2019:1574-1583.
[11] LIU Y J,JOURABLOO A,LIU X M.Learning Deep Models for Face Anti-spoofing:Binary or Auxiliary Supervision[C]//Proceedings of Conference on Computer Vision and Pattern Recognition.New York:IEEE Press,2018:389-398.
[12] LI L,FENG X,BOULKENAFET Z,et al.An Original Face Anti-spoofing Approach Using Partial Convolutional neural network[C]//International Conference on Image Processing Theory,Tools and Applications.New York:IEEE Press,2016:1-6.
[13] OJALA T,PIETIKAINEN M,MAENPAA T.Multi-resolutionGray-scale and Rotation Invariant Texture Classification with Local Binary Patterns[C]//IEEE Transactions on Pattern Analysis and Machine Intelligence.2002:971-987.
[14] BENLAMOUDI A,SAMAI D,OUAFI A.Face Spoofing Detection Using Local Binary Patterns and Fisher Score[C]//The 3rd International Conference on Control,Engineering & Information Technology.New York:IEEE Press,2015.
[15] LIAO S C,ZHU X,ZHEN L.Learning Multiscale-Block Local Binary Patterns for Face Recognition[C]//International Confe-rence on Biometrics.New York:IEEE Press,2007:828-837.
[16] KANNALA J,RAHTU E.Bsif:Binarized Statistical Image Features.[C]//The International Conference on Pattern Recognition.New York:IEEE Press,2012:1363-1366.
[17] TAN X Y,LIU Y,LIU J,et al.Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model[C]//European Conference on Computer Vision.New York:IEEE Press,2010:504-517.
[18] CHINGOVSKA I,ANJOS A.On the effectiveness of Local Binary Patterns in Face Anti-spoofing[C]//The 2012InternationalConference of Biometrics Special Interest Group.New York:IEEE Press,2012:1-7.
[1] HOU Xia-ye, CHEN Hai-yan, ZHANG Bing, YUAN Li-gang, JIA Yi-zhen. Active Metric Learning Based on Support Vector Machines [J]. Computer Science, 2022, 49(6A): 113-118.
[2] SHAN Xiao-ying, REN Ying-chun. Fishing Type Identification of Marine Fishing Vessels Based on Support Vector Machine Optimized by Improved Sparrow Search Algorithm [J]. Computer Science, 2022, 49(6A): 211-216.
[3] CHEN Jing-nian. Acceleration of SVM for Multi-class Classification [J]. Computer Science, 2022, 49(6A): 297-300.
[4] SHEN Chao, HE Xi-ping. Face Anti-spoofing Algorithm Based on Texture Feature Enhancement and Light Neural Network [J]. Computer Science, 2022, 49(6A): 390-396.
[5] XING Yun-bing, LONG Guang-yu, HU Chun-yu, HU Li-sha. Human Activity Recognition Method Based on Class Increment SVM [J]. Computer Science, 2022, 49(5): 78-83.
[6] GUO Fu-min, ZHANG Hua, HU Rong-hua, SONG Yan. Study on Method for Estimating Wrist Muscle Force Based on Surface EMG Signals [J]. Computer Science, 2021, 48(6A): 317-320.
[7] LEI Jian-mei, ZENG Ling-qiu, MU Jie, CHEN Li-dong, WANG Cong, CHAI Yong. Reverse Diagnostic Method Based on Vehicle EMC Standard Test and Machine Learning [J]. Computer Science, 2021, 48(6): 190-195.
[8] WU Xiao-li, HU Wei. Attention-based Hot Block and Saliency Pixel Convolutional Neural Network Method for Face Anti-spoofing [J]. Computer Science, 2021, 48(4): 316-324.
[9] WANG You-wei, ZHU Chen, ZHU Jian-ming, LI Yang, FENG Li-zhou, LIU Jiang-chun. User Interest Dictionary and LSTM Based Method for Personalized Emotion Classification [J]. Computer Science, 2021, 48(11A): 251-257.
[10] CAO Su-e, YANG Ze-min. Prediction of Wireless Network Traffic Based on Clustering Analysis and Optimized Support Vector Machine [J]. Computer Science, 2020, 47(8): 319-322.
[11] XU Xiang-yan and HOU Rui-huan. Medium and Long-term Population Prediction Based on GM(1,1)-SVM Combination Model [J]. Computer Science, 2020, 47(6A): 485-487.
[12] SONG Yan, HU Rong-hua, GUO Fu-min, YUAN Xin-liang and XIONG Rui-yang. Improved SVM+BP Algorithm for Muscle Force Prediction Based on sEMG [J]. Computer Science, 2020, 47(6A): 75-78.
[13] FANG Meng-lin, TANG Wen-bing, HUANG Hong-yun and DING Zuo-hua. Wall-following Navigation of Mobile Robot Based on Fuzzy-based Information Decomposition and Control Rules [J]. Computer Science, 2020, 47(6A): 79-83.
[14] PAN Heng, LI Jing feng, MA Jun hu. Role Dynamic Adjustment Algorithm for Resisting Insider Threat [J]. Computer Science, 2020, 47(5): 313-318.
[15] YANG Li, LI Xin-yu, SHI Huai-feng, PAN Cheng-sheng. Task Intelligent Identification Method for Spatial Information Network [J]. Computer Science, 2020, 47(4): 262-269.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!