TY - GEN
T1 - Real-Time Face Antispoofing Using Shearlets
AU - van der Haar, Dustin Terence
N1 - Publisher Copyright:
© 2019, Springer Nature Switzerland AG.
PY - 2019
Y1 - 2019
N2 - Face recognition. A promise made to the modern technologists as the ultimate access control or surveillance technology. However, it is still vulnerable to inexpensive spoofing attacks, which pose a threat to security. Basic face spoofing attacks that use photographs and video are still not addressed appropriately, especially in real-time applications, thereby making security in these environments a difficult task to achieve. Although methods have improved over the last decade, a robust solution that can accommodate changing environments is still out of reach. Face spoofing attacks introduce an object into the scene, which presents curvilinear singularities that are not necessarily portrayed in the same way in different lighting conditions. We present a solution that addresses this problem by using a discrete shearlet transform as an alternative descriptor that can differentiate between a real and a fake face without user-cooperation. We have found the approach can successfully detect blurred edges, texture changes and other noise found in various face spoof attacks. Our benchmarks on the publicly available CASIA-FASD, MSU-MFSD, and OULU-NPU data sets, show that our approach portrays good results and improves on the most popular methods found in the field on modest computer hardware, but requires further improvement to beat the current state of the art. The approach also achieves real-time face spoof discrimination, which makes it a practical solution in real-time applications and a viable augmentation to current face recognition methods.
AB - Face recognition. A promise made to the modern technologists as the ultimate access control or surveillance technology. However, it is still vulnerable to inexpensive spoofing attacks, which pose a threat to security. Basic face spoofing attacks that use photographs and video are still not addressed appropriately, especially in real-time applications, thereby making security in these environments a difficult task to achieve. Although methods have improved over the last decade, a robust solution that can accommodate changing environments is still out of reach. Face spoofing attacks introduce an object into the scene, which presents curvilinear singularities that are not necessarily portrayed in the same way in different lighting conditions. We present a solution that addresses this problem by using a discrete shearlet transform as an alternative descriptor that can differentiate between a real and a fake face without user-cooperation. We have found the approach can successfully detect blurred edges, texture changes and other noise found in various face spoof attacks. Our benchmarks on the publicly available CASIA-FASD, MSU-MFSD, and OULU-NPU data sets, show that our approach portrays good results and improves on the most popular methods found in the field on modest computer hardware, but requires further improvement to beat the current state of the art. The approach also achieves real-time face spoof discrimination, which makes it a practical solution in real-time applications and a viable augmentation to current face recognition methods.
KW - Face antispoofing
KW - Face recognition
KW - Presentation attack detection
UR - http://www.scopus.com/inward/record.url?scp=85066894194&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-11407-7_2
DO - 10.1007/978-3-030-11407-7_2
M3 - Conference contribution
AN - SCOPUS:85066894194
SN - 9783030114060
T3 - Communications in Computer and Information Science
SP - 16
EP - 29
BT - Information Security - 17th International Conference, ISSA 2018, Revised Selected Papers
A2 - Loock, Marianne
A2 - Coetzee, Marijke
A2 - Eloff, Mariki
A2 - Venter, Hein
A2 - Eloff, Jan
PB - Springer Verlag
T2 - 17th International Conference on Information Security, ISSA 2018
Y2 - 15 August 2018 through 16 August 2018
ER -