Skip to main content

Liveness and Threat Aware Selfie Face Recognition

  • Chapter
  • First Online:
Selfie Biometrics

Abstract

Biometric-based human authentication can provide acceptable level of security to mobile devices such as a tablets and smartphones. Face is one of the most popular choices for biometrics on mobile device since the user can conveniently capture his face image by taking a selfie. Like any other security system, selfie face recognition is also vulnerable to attacks wherein an imposter can present photograph of a genuine user to gain an access to the mobile device. Liveness detection is an essential counter-measure to spoof attacks. In adverse scenarios, an attacker can physically force the user to provide his facial image to unlock the phone. In such cases, facial expression detection can act as a counter-measure. This chapter investigates face-based human recognition techniques on mobile devices and highlight methods having liveness and threat awareness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akhtar Z, Michelon C, Foresti GL (2014) Liveness detection for biometric authentication in mobile applications. In: 2014 International Carnahan conference on security technology (ICCST), IEEE, pp 1–6

    Google Scholar 

  2. Alotaibi A, Mahmood A (2017) Deep face liveness detection based on nonlinear diffusion using convolution neural network. Signal Image Video Process 11(4):713–720

    Article  Google Scholar 

  3. Bharadwaj S, Dhamecha TI, Vatsa M, Singh R (2013) Computationally efficient face spoofing detection with motion magnification. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 105–110

    Google Scholar 

  4. Boughrara H, Chtourou M, Amar C-B, Chen L (2016) Facial expression recognition based on a mlp neural network using constructive training algorithm. Multimedia Tools Appl 75(2):709–731

    Article  Google Scholar 

  5. Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. IEEE Trans Inf Forensics Secur 11(8):1818–1830

    Article  Google Scholar 

  6. Di Martino JM, Qiu Q, Nagenalli T, Sapiro G (2018) Liveness detection using implicit 3d features. arXiv:1804.06702

  7. Galbally J, Marcel S (2014) Face anti-spoofing based on general image quality assessment. In: 2014 22nd International conference on pattern recognition (ICPR). IEEE, pp 1173–1178

    Google Scholar 

  8. Hassan MA, Mustafa MN, Wahba A (2017) Automatic liveness detection for facial images. In: 2017 12th International conference on computer engineering and systems (ICCES). IEEE, pp 215–220

    Google Scholar 

  9. Huang K-K, Dai D-Q, Ren C-X, Yu-Feng Y, Lai Z-R (2017) Fusing landmark-based features at kernel level for face recognition. Pattern Recogn 63:406–415

    Article  Google Scholar 

  10. Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Technol 14(1):4–20

    Article  Google Scholar 

  11. Jain R, Kant C (2015) Attacks on biometric systems: an overview. Int J Adv Sci Res 1(07):283–288

    Article  Google Scholar 

  12. Killioğlu M, Taşkiran M, Kahraman N (2017) Anti-spoofing in face recognition with liveness detection using pupil tracking. In: 2017 IEEE 15th international symposium on applied machine intelligence and informatics (SAMI). IEEE, pp 000087–000092

    Google Scholar 

  13. Kim KW, Hong HG, Nam GP, Park KR (2017) A study of deep CNN-based classification of open and closed eyes using a visible light camera sensor. Sensors 17(7):1534

    Google Scholar 

  14. Li L, Correia PL, Hadid A (2017) Face recognition under spoofing attacks: countermeasures and research directions. IET Biometrics 7(1):3–14

    Article  Google Scholar 

  15. Li Y, Chang M-C, Farid H, Lyu S (2018) In ictu oculi: Exposing ai generated fake face videos by detecting eye blinking. arXiv:1806.02877

  16. Liao W-H, Young T-J (2010) Texture classification using uniform extended local ternary patterns. In: 2010 IEEE international symposium on multimedia (ISM). IEEE, pp 191–195

    Google Scholar 

  17. Liu M-Y, Breuel T, Kautz J (2017) Unsupervised image-to-image translation networks. Adv Neural Inf Process Syst 700–708

    Google Scholar 

  18. Liu X, Lu R, Liu W (2017) Face liveness detection based on enhanced local binary patterns. In: Chinese automation congress (CAC), 2017. IEEE, pp 6301–6305

    Google Scholar 

  19. Luan X, Wang H, Ou W, Liu L (2017) Face liveness detection with recaptured feature extraction. In: 2017 International conference on security, pattern analysis, and cybernetics (SPAC). IEEE, pp 429–432

    Google Scholar 

  20. Lyons MJ, Budynek J, Akamatsu S (1999) Automatic classification of single facial images. IEEE Trans Pattern Anal Mach Intell 21(12):1357–1362

    Article  Google Scholar 

  21. Määttä J, Hadid A, Pietikäinen M (2011) Face spoofing detection from single images using micro-texture analysis. In: 2011 international joint conference on biometrics (IJCB). IEEE, pp 1–7

    Google Scholar 

  22. Määttä J, Hadid A, Pietikäinen M (2012) Face spoofing detection from single images using texture and local shape analysis. IET Biometrics 1(1):3–10

    Article  Google Scholar 

  23. Manglik PK, Misra U, Maringanti HB et al (2004) Facial expression recognition. In: 2004 IEEE international conference on systems, man and cybernetics, vol 3. IEEE, pp 2220–2224

    Google Scholar 

  24. Marcolin F, Vezzetti E (2017) Novel descriptors for geometrical 3d face analysis. Multimedia Tools Appl 76(12):13805–13834

    Article  Google Scholar 

  25. Meng W, Wong DS, Furnell S, Zhou J (2015) Surveying the development of biometric user authentication on mobile phones. IEEE Commun Surv Tutorials 17(3):1268–1293

    Article  Google Scholar 

  26. Ming Z, Chazalon J, Luoman MM, Visani M, Burie JC Facelivenet: end-to-end networks combining face verification with interactive facial expression-based liveness detection

    Google Scholar 

  27. Pan G, Sun L, Wu Z, Lao S (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera

    Google Scholar 

  28. Patel K, Han H, Jain AK (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268–2283

    Article  Google Scholar 

  29. Pinto A, Pedrini H, Schwartz WR, Rocha A (2015) Face spoofing detection through visual codebooks of spectral temporal cubes. IEEE Trans Image Process 24(12):4726–4740

    Article  MathSciNet  Google Scholar 

  30. Poh N, Blanco-Gonzalo R, Wong R, Sanchez-Reillo R (2016) Blind subjects faces database. IET Biometrics 5(1):20–27

    Article  Google Scholar 

  31. Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634

    Article  Google Scholar 

  32. Rattani A, Derakhshani R (2018) A survey of mobile face biometrics. Comput Electr Eng 72:39–52

    Article  Google Scholar 

  33. Rivera AR, Castillo JR, Chae OO (2013) Local directional number pattern for face analysis: face and expression recognition. IEEE Trans Image Process 22(5):1740–1752

    Google Scholar 

  34. Sarode N, Bhatia S (2010) Facial expression recognition. Int J Comput Sci Eng 2(5):1552–1557

    Google Scholar 

  35. Siddiqui TA, Bharadwaj S, Dhamecha TI, Agarwal A, Vatsa M, Singh R, Ratha N (2016) Face anti-spoofing with multifeature videolet aggregation. In: 2016 23rd International conference on pattern recognition (ICPR). IEEE, pp 1035–1040

    Google Scholar 

  36. Singh M, Arora AS (2018) A novel face liveness detection algorithm with multiple liveness indicators. Wirel Pers Commun 100(4):1677–1687

    Article  Google Scholar 

  37. Szegedy C, Ioffe S, Vanhoucke V, Alemi AA (2017) Inception-v4, inception-resnet and the impact of residual connections on learning. In: AAAI, vol 4, p 12

    Google Scholar 

  38. Tirunagari S, Poh N, Windridge D, Iorliam A, Suki N, Ho ATS (2015) Detection of face spoofing using visual dynamics. IEEE Trans Inf Forensics Secur 10(4):762–777

    Article  Google Scholar 

  39. Tiwari K, Choudhary SK, Gupta P (2016) An efficient face recognition system with liveness and threat detection for smartphones. In: International conference on intelligent computing. Springer, pp 397–406

    Google Scholar 

  40. Tiwari K, Gupta P (2014) No-reference fingerprint image quality assessment. In: International conference on intelligent computing. Springer, pp 846–854

    Google Scholar 

  41. Tiwari K, Gupta P (2017) Certain challenges in biometrics system development. In: International conference on computational intelligence, cyber security, and computational models. Springer, pp 113–123

    Google Scholar 

  42. Trewin S, Swart C, Koved L, Martino J, Singh K, Ben-David S (2012) Biometric authentication on a mobile device: a study of user effort, error and task disruption. In: Proceedings of the 28th annual computer security applications conference. ACM, pp 159–168

    Google Scholar 

  43. Uludag U, Jain AK (2004) Attacks on biometric systems: a case study in fingerprints. In: Security, steganography, and watermarking of multimedia contents VI, vol 5306. International Society for Optics and Photonics, pp 622–634

    Google Scholar 

  44. Vezzetti E, Marcolin F, Tornincasa S, Ulrich L, Dagnes N (2017) 3d geometry-based automatic landmark localization in presence of facial occlusions. Multimedia Tools Appl 77:1–29

    Article  Google Scholar 

  45. Wang S-Y, Yang S-H, Chen Y-P, Huang J-W (2017) Face liveness detection based on skin blood flow analysis. Symmetry 9(12):305

    Article  Google Scholar 

  46. Wayman J, Jain A, Maltoni D, Maio D (2005) An introduction to biometric authentication systems. In: Biometric systems. Springer, pp 1–20

    Google Scholar 

  47. Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Geetika Arora .

Editor information

Editors and Affiliations

Appendix

Appendix

There are certain parameters that are used for evaluating the performance of a face recognition system. Some of the commonly used measures are listed below.

  • One-eye detection rate: It refers to the rate of correctly detected blinks to the total number of blinks in test data. In this, right and left eyes are calculated separately.

  • Two-eye detection rate: It is same as one-eye detection rate, but it accounts for the simultaneous blinks of both the eyes for one blink activity.

  • False Acceptance Rate (FAR) and False Rejection Rate (FRR): FAR is the likelihood of the system to accept an unauthorized user as an authorized one. FRR, on the other hand, indicates the possibility of the system rejecting an authorized person by considering it as an imposter.

  • Equal Error Rate: It refers to the value where FAR and FRR are equal and is used to determine their threshold values. The lower the value of EER, higher would be accuracy of a biometric system.

  • Half Total Error Rate (HTER): It is computed by averaging the false acceptance rate and false rejection rate.

  • Area Under the Curve (AUC): A receiver operating characteristic curve (ROC curve) represents a graphical plot of true positive rate (TPR) against the false positive rate (FPR) at different threshold settings. The area under the ROC curve (AUC) refers to the probability of a randomly chosen positive example being classified as positive with greater suspicion than a randomly selected negative example.

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Arora, G., Tiwari, K., Gupta, P. (2019). Liveness and Threat Aware Selfie Face Recognition. In: Rattani, A., Derakhshani, R., Ross, A. (eds) Selfie Biometrics. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-030-26972-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26972-2_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-26971-5

  • Online ISBN: 978-3-030-26972-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics