Texture and Depth Feature Enhancement Based Two-Stream Face Presentation Attack Detection Method
SUN Rui1,2, FENG Huidong1,2, SUN Qijing1,2, SHAN Xiaoquan1,2, ZHANG Xudong1
1. School of Computer Science and Information Engineering, Hefei University of Technology, Hefei 230601; 2. Anhui Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei 230601
Abstract:Face presentation attack is a technology using photos, videos and other media to present faces in front of cameras to spoof face recognition systems. Most of the existing face presentation attack detection methods apply depth feature for supervised classification, while ignoring the effective fine-grained information and the correlation between depth information and texture information. Therefore, a texture and depth feature enhancement based two-stream face presentation attack detection method is proposed. One end of the network extracts the facial texture features with a more robust deception texture pattern than the original convolution network through the central differential convolution network. The other end of the network generates the depth information of the depth map through generative adversarial network to improve the robustness to the appearance changes and image quality differences. In the feature enhancement module, a central edge loss is designed to fuse and enhance two types of complementary features. The experimental results on 4 datasets show that the proposed method achieves superior performance in both intra-data set and cross-data set tests.
[1] HADID A. Face Biometrics Under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions // Proc of the IEEE Conference on Computer Vision and Pattern Re-cognition Workshops. Washington, USA: IEEE, 2014: 113-118. [2] KOSE N, DUGELAY J L. On the Vulnerability of Face Recognition Systems to Spoofing Mask Attacks // Proc of the IEEE International Conference on Acoustics, Speech and Signal Processing. Washington, USA: IEEE, 2013: 2357-2361. [3] CHINGOVSKA I, ANJOS A, MARCEL S. On the Effectiveness of Local Binary Patterns in Face Anti-Spoofing // Proc of the International Conference of Biometrics Special Interest Group. Washington, USA: IEEE, 2012: 1-7. [4] BOULKENAFET Z, KOMULAINEN J, HADID A. Face Antispoo-fing Using Speeded-Up Robust Features and Fisher Vector Encoding. IEEE Signal Processing Letters, 2017, 24(2): 141-145. [5] GALBALLY J, MARCEL S, FIERREZ J. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition. IEEE Transactions on Image Processing, 2014, 23(2): 710-724. [6] PATEL K, HAN H, JAIN A K, et al. Secure Face Unlock: Spoof Detection on Smartphones. IEEE Transactions on Information Forensics and Security, 2016, 11(10): 2268-2283. [7] WEN D, HAN H, JAIN A K, et al. Face Spoof Detection with Image Distortion Analysis. IEEE Transactions on Information Forensics and Security, 2015, 10(4): 746-761. [8] MÄÄTTÄ J, HADID A, PIETIKÄINEN M. Face Spoofing Detection from Single Images Using Micro-Texture Analysis // Proc of the IEEE International Joint Conference on Biometrics. Washington, USA: IEEE, 2011. DOI: 10.109/IJCB.2011.6117510. [9] 甘俊英,翟懿奎,项俐,等.面向活体人脸检测的时空纹理特征级联方法.模式识别与人工智能, 2019, 32(2): 117-123. (GAN J Y, ZHAI Y K, XIANG L, et al. Spatial-Temporal Texture Cascaded Feature Method for Face Liveness Detection. Pattern Re-cognition and Artificial Intelligence, 2019, 32(2): 117-123.) [10] YANG J W, LEI Z, LI S Z. Learn Convolutional Neural Network for Face Anti-Spoofing[C/OL]. [2022-10-26]. https://arxiv.org/pdf/1408.5601.pdf. [11] PATEL K, HAN H, JAIN A K. Cross-Database Face Antispoofing with Robust Feature Representation // Proc of the Chinese Confe-rence on Biometric Recognition. Berlin, Germany: Springer, 2016: 611-619. [12] LI L, FENG X Y. Face Anti-Spoofing via Deep Local Binary Pa-tterns // Proc of the IEEE International Conference on Image Processing. Washington, USA: IEEE, 2017: 101-105. [13] ASIM M, MING Z, JAVED M Y. CNN Based Spatio-Temporal Feature Extraction for Face Anti-Spoofing // Proc of the 2nd International Conference on Image, Vision and Computing. Washington, USA: IEEE, 2017: 234-238. [14] ATOUM Y, LIU Y J, JOURABLOO A, et al. Face Anti-Spoofing Using Patch and Depth-Based CNNs // Proc of the IEEE International Joint Conference on Biometrics. Washington, USA: IEEE, 2017. DOI: 10.1109/BTAS.2017.8272713. [15] LIU Y J, JOURABLOO A, LIU X M. Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision // Proc of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. Washington, USA: IEEE, 2018: 389-398. [16] YU Z T, ZHAO C X, WANG Z Z, et al. Searching Central Diffe-rence Convolutional Networks for Face Anti-Spoofing // Proc of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. Washington, USA: IEEE, 2020: 5295-5305. [17] ZHENG W, YUE M Y, ZHAO S H, et al. Attention-Based Spatial-Temporal Multi-scale Network for Face Anti-Spoofing. IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021, 3(3): 296-307. [18] WANG Z Z, YU Z T, ZHAO C X, et al. Deep Spatial Gradient and Temporal Depth Learning for Face Anti-Spoofing // Proc of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. Washington, USA: IEEE, 2020: 5041-5050. [19] YU Z T, LI X B, NIU X S, et al. Face Anti-Spoofing with Human Material Perception // Prco of the 16th European Conference on Computer Vision. Berlin, Germany: Springer, 2020: 557-575. [20] GUO J Z, LEI Z, WAN J, et al. Dominant and Complementary Emotion Recognition from Still Images of Faces. IEEE Access, 2018, 6: 26391-26403. [21] GOODFELLOW I J, POUGET-ABADIE J, MIRZA M, et al.Ge-nerative Adversarial Nets // Proc of the 27th International Confe-rence on Neural Information Processing Systems. Cambridge, USA: MIT Press, 2014: 2672-2680. [22] RADFORD A, METZ L, CHINTALA S.Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks[C/OL]. [2022-10-26].https://arxiv.org/pdf/1511.06434.pdf. [23] MAO X D, LI Q, XIE H R, et al. Least Squares Generative Adversarial Networks // Proc of the IEEE International Conference on Computer Vision. Washington, USA: IEEE, 2017: 2813-2821. [24] SCHROFF F, KALENICHENKO D, PHILBIN J. FaceNet: A Unified Embedding for Face Recognition and Clustering // Proc of the IEEE Conference on Computer Vision and Pattern Recognition. Washington, USA: IEEE, 2015: 815-823. [25] WEN Y D, ZHANG K P, LI Z F, et al. A Discriminative Feature Learning Approach for Deep Face Recognition // Proc of the European Conference on Computer Vision. Berlin, Germany: Springer, 2016: 499-515. [26] ZHANG Z W, YAN J J, LIU S F, et al. A Face Antispoofing Database with Diverse Attacks // Proc of the 5th IAPR International Conference on Biometrics. Washington, USA: IEEE, 2012: 26-31. [27] BOULKENAFET Z, KOMULAINEN J, LI L, et al. OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations // Proc of the 12th IEEE International Conference on Automatic Face and Gesture Recognition. Washington, USA: IEEE, 2017: 612-618. [28] FENG Y, WU F, SHAO X H, et al. Joint 3D Face Reconstruction and Dense Alignment with Position Map Regression Network // Proc of the European Conference on Computer Vision. Berlin, Germany: Springer, 2018: 557-574. [29] KINGMA D P, B J L. Adam: A Method for Stochastic Optimization[C/OL]. [2022-10-26]. https://arxiv.org/pdf/1412.6980.pdf. [30] CHEN H N, CHEN Y W, TIAN X, et al. A Cascade Face Spoofing Detector Based on Face Anti-Spoofing R-CNN and Improved Retinex LBP. IEEE Access, 2019, 7: 170116-170133. [31] ZHOU F S, GAO C Q, CHEN F, et al. Face Anti-Spoofing Based on Multi-layer Domain Adaptation // Proc of the IEEE Internatio-nal Conference on Multimedia and Expo Workshops. Washington, USA: IEEE, 2019: 192-197. [32] LI H L, HE P S, WANG S Q, et al. Learning Generalized Deep Feature Representation for Face Anti-Spoofing. IEEE Transactions on Information Forensics and Security, 2018, 13(10): 2639-2652. [33] CHEN H N, HU G S, LEI Z, et al. Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection. IEEE Tran-sactions on Information Forensics and Security, 2020, 15: 578-593. [34] WANG Y H, SONG X N, XU T Y, et al. From RGB to Depth: Domain Transfer Network for Face Anti-Spoofing. IEEE Transactions on Information Forensics and Security, 2021, 16: 4280-4290. [35] DE FREITAS PEREIRA T, KOMULAINEN J, ANJOS A, et al. Face Liveness Detection Using Dynamic Texture. EURASIP Journal on Image and Video Processing, 2014. DOI: https://doi.org/10.1186/1687-5281-2014-2. [36] YANG X, LUO W H, BAO L C, et al. Face Anti-Spoofing: Mo-del Matters, So Does Data // Proc of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. Washington, USA: IEEE, 2019: 3502-3511. [37] BOULKENAFET Z, KOMULAINEN J, AKHTAR Z, et al. A Com-petition on Generalized Software-Based Face Presentation Attack Detection in Mobile Scenarios // Proc of the IEEE International Joint Conference on Biometrics. Washington, USA: IEEE, 2017. DOI: 10.1109/BTAS/2017.8272758. [38] JOURABLOO A, LIU Y J, LIU X M. Face De-spoofing: Anti-Spoofing via Noise Modeling // Proc of the European Conference on Computer Vision. Berlin, Germany: Springer, 2018: 297-315. [39] LIU Y J, STEHOUWER J, LIU X M.On Disentangling Spoof Trace for Generic Face Anti-Spoofing[C/OL]. [2022-10-26].https://arxiv.org/pdf/2007.09273.pdf. [40] SHAO R, LAN X Y, LI J W, et al. Multi-adversarial Discriminative Deep Domain Generalization for Face Presentation Attack Detection // Proc of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. Washington, USA: IEEE, 2019: 10015-10023. [41] VAN DER MAATEN L, HINTON G. Visualizing Data Using t-SNE. Journal of Machine Learning Research, 2008, 9(86): 2579-2605.