SlideShare a Scribd company logo
1 of 30
Confidential
Corporate Systems & Technology
Rishabh shah
Review on Antispoofing techniques in Face recognition
1
Confidential
Corporate Systems & Technology
Biometric Antispoofing Methods : A survey in face
recognition
2
Static includes 2D photo attacks while dynamic includes 3D mask and
Video attacks.
Confidential
Corporate Systems & Technology
› This paper works upon two parts 1) face detection 2) Motion and estimation tracking.
› Step 1:For face detection it uses a method called “QUANGLES”. It is faster than the other
methods.
› step 2: we resort to a simple algorithm that exploits motion to refine its effective
neighborhood.
› When a face is detected in the current frame f(t), we would like to know its most likely
counterpart in frame f(t−1).Then we select it’s center coordinates at a particular scale.
Verifying Liveness by Multiple Experts in Face
Biometrics
3
Confidential
Corporate Systems & Technology
› Suppose that we have a detected face x(t) at time t and we have δ(t) = (δx t , δy t )T ,
representing the motion vector between the center of two faces detected in the frames
f(t−1) and f(t), at our disposal. This helps us define the conditional probability density
p(X(t-1)|X(t)) for random vector :
4
Confidential
Corporate Systems & Technology
› Algorithm for the tracking of face and checking it liveness:
17.07.2016
5Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology
› The last step is to collect evidence on liveness : It is done by working upon the 3D
properties of the face . But before that we need to crop the images to cover the face itself
and then start working upon it.
› We have two measures to take into consideration for to work upon 3D properties:
• Rasterflow: 3D motion of the face. This is checked by rasterflow method in which , we will
simply extract the means and standard deviations of |δt| within five equi-dimensioned
vertical stripe
› These five measurement pairs at the frame t are termed rasterflow_t, representing a five-
tuple (2x5 vector). They encode the spatiality and are expected to converge to a wedge-
pattern.
6
Confidential
Corporate Systems & Technology
› Eye flow : The eye regions can be sufficiently well located within the face patch because
they are likely to be at constant positions/scale (ex, ey, es) known from training of the
object detector.
›
› By taking the mean of |δt| within these areas, and dividing it by the mean of |δt| in the
remaining light-gray area, we define our eyeflow(t) measurement.
› As the final step both raster flow and eye flow should be greater than zero or the face is
fake/spoofed.
7
Confidential
Corporate Systems & Technology
› The illumination and brightness plays a very important role in detection of the face. In order to
detect this kind of spoofs.
› So up until now DoG of the image in undertaken at different values of sigma to determine
different scales.
› DoG is taken so that the edges can be maintained but the noise from the image is removed and
it gets smoothened
› This model does not work under bad illumination because it used vanilla histogram equalization
method .
› In both the methods we are going to use sparse logistic regression with DoG as the frequency
descriptor.
Face liveness detection under bad illumination condition
8
Confidential
Corporate Systems & Technology
› Proposed method is called CLAHE(Contrast limited adaptive histogram equalization).
› Every tile within the image has it’s contrast enhanced w.r.t to the type of output histogram
expected like a uniform(flat) one , Rayleigh(Bell-shaped) or an exponential(Curve shaped)
one.
› It depends on three things which are : 1) No. of tiles 2)Contrast enhancement limit
3) alpha value.
9
Confidential
Corporate Systems & Technology
› This paper is based on the movement within the facial components. So the movement in
the eyes in the sequential images will be checked.
› Algorithm :
Liveness detection for embedded face recognition
system
10
Confidential
Corporate Systems & Technology
› Eye Detection : When the face image is considered as a 3D curve, the intensity of the eye
region is lower than the rest of face region. So to get eye region we perform two steps:
 First, we perform Gaussian filtering to the face image, so that the smoothened 3D curve is
obtained.
 In the curve, we extract all the local minimums using the method of the gradient descent .
› To reduce the invalid eye candidates, we used the eye classifier, which is trained by Viloa’s
AdaBoost training methods .
› Face Region Normalization :Input face can vary in size and orientation, we normalize
face region about a size and rotation by using center points of both eyes. we normalize this
face region to the size of 72x72.
› Then we apply SQI to the face region to decrease the effect of illumination. Self Quotient
Image (SQI).
› Î is the low frequency image of the original image, F is the Gaussian kernel
11
Confidential
Corporate Systems & Technology
› In the below given images the first row ones are original images under various lighting
condition while the later ones are it’s SQI.
› Eye Region Binarization : After Normalizing face region, eye regions are extracted as
10x20 size based on the center of eyes. Then eye regions are binarized in order to have
the pixel value of 0 and 1 by using a threshold.
12
Confidential
Corporate Systems & Technology
› Figure shows the example of binarized eye regions extracted from 5 sequential face
images. As shown in Fig. (a) Eye regions of fake face change very little, but eye regions
(b) of real face have a much larger variation in shape because of blink or movement of
pupil.
13
Confidential
Corporate Systems & Technology
› Liveness score calculation
› Steps:
› 1) Hamming distance(the Hamming distance is the number of pixels that do not have same
value) method is used to calculate liveness score of each eye region
› 2) We compare 5 left eyes each other using hamming distance and 5 right eyes in the
same way
› 3) The number of pixels which differs between two eye regions becomes liveness score.
› 4) After adding 10 liveness scores of left eyes and 10 liveness scores of right eyes, we
take an average of scores.
› 5) If the average liveness score is bigger than threshold, we recognize the input image as
live face and in the case of opposite it is discriminated to the photograph.
17.07.2016
14Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology
› So this paper takes into consideration three different kinds of scenarios:
› 1) Non- rigid motion clues i.e. Eye blink
› 2) Face background consistency clue
› 3) Image banding effect – Quality changes in the image due introduction of fake face.
Non- rigid motion clues
› We adopt the batch image alignment method to separate the non-rigid motion from the
rigid ones
› Batch image alignment utilizes a series of rigid transformation to align several images to a
fixed image, with the residual being the non-rigid motion.
› Image in the next slide shows how this alignment procedure works :
Face Liveness Detection by Exploring Multiple scenic
clues
17.07.2016
15Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology 17.07.2016
16Stefan Voget © Continental AG
For genuine face sequence,
there are some frames that have
large sparse residual in eye
regions which corresponds to
eye-blinking or in mouth regions
which corresponds to mouth
movement.
There may be some residual in
fake face video, such as the 1st
and 6th frame in Fig. (b),
however they are uniformly
distributed noises in the whole
face region.
Confidential
Corporate Systems & Technology
› Facial Non-rigid motion features :
If a face sequences have a big Si like Fig. 1, the corresponding face is considered genuine;
otherwise fake.
› Face Background Consistency:
› It is based on the observation that if the target face is genuine, its motion should be totally
independent from that of the background; otherwise the motion relationship between face
and background cannot be totally independent because of the exhibition medium’s
constraint.
› We do not use optical flow estimation method.
17.07.2016
17Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology
› GMM(Gaussian Mixture Model) is used since it is more efficient and it is robust to
illumination and noise.
› After some initialization, GMM outputs the foreground, background binary image
Bi , i = 1 · · · , n of a given frame I :
› This Bi is further used to check motion trend, which is the first step of checking the
consistency;
› It will be further used to calculate the CMD(Consistency Motion Descriptors).It is the first
dimension of face-background consistency feature.
17.07.2016
18Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology
› Motion entropy : Second dimension of face-background consistency
› The motion of hand hold photo attack videos are global while the motion of genuine videos
are local. This inspires us to use the total motion as another measure. The motion entropy
me(i), i = 1, 2 · · ·,n is defined as:
› Pi = Foreground ratio
› The motion entropy of handed fake face is very large compared with genuine face, while
the motion entropy of fixed fake face is close to 0.
17.07.2016
19Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology
› Image Banding : Since fake faces are usually exhibited by certain medium, inevitably
some quality degradation will be introduced during the imaging process.
› Face liveness detection by wavelet decomposition.
› Image noise can be estimated by a robust median estimator as follows:
› HH1 means the first order wavelet decomposition of the image
› We find that the median estimator values of fake face images are all near 0.74 while most
genuine faces are near 0 with only two exceptions.
17.07.2016
20Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology
› Contrast and texture analysis of recaptured and captured images.
› Earlier, DoG (Difference of Gaussian) filter is used to obtain a special frequency band
which gives considerable information to discriminate between real and photo images.In this
approach it used for preprocessing.
› LBPV: It is a combination of spatial structure and the contrast.
› In LBPV global spatial information is not lost.
› In this approach, initially rotation variant LBPV histograms are obtained.
› Process of this approach :
Classification of Captured and recaptured Images to
detect photograph spoofing
17.07.2016
21Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology
› Variance is computed for the P sampling points around a circle of radius R, after the
calculation of LBP at the same radius R.
› &
› The final equation to calculate LBPV:
17.07.2016
22Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology
› Global matching is implemented using exhaustive search scheme to find the minimal
distance in all candidate orientations, which is a simple method.
› The LBPV histogram is reorganized and represented by a rotation variant histogram Hrv,
and a rotation invariant histogram Hri. Then for two texture images, the matching distance
is calculated.
› Finally, each test image is classified in the nearest class by comparing the two quadratic
mean values, which are obtained for client and impostor sets.
17.07.2016
23Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology
› This paper functions for enhanced videos for spoofing detection with the help of two
techniques.
› Spoofing based on text features extracted using LBP.
› Spoofing based on motion features extracted using MOOF.
Eulerian Motion Magnification
› First, each frame is decomposed into spatial Laplacian bands. Next, an ideal temporal
bandpass filter is applied to each Laplacian band to isolate the desired temporal motion in
each band
› The isolated band passed signal is then multiplied by an amplification factor α and added
to the original signal, as shown in eqn.
Computationally Efficient Face Spoofing Detection with
Motion Magnification
17.07.2016
24Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology
› LBP method:
› HOOF method: Histogram of oriented flows
17.07.2016
25Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology
› This paper focuses on the usage of many low level feature descriptors for detection of the
spoofed image.
› CF: color frequency, it used to store the color information regarding the image.
› HSC: Histogram of Shearlet coefficients, these are used to estimate edge response.
› HOG: To capture the edge’s gradient structure.
› GLCM: Gray level co-occurrence matrix. It is used to show texture or the gray level
pattern.
› This four help in extracting 12 feature descriptors.
Face spoofing Detection through partial least squares
and low level descriptors
17.07.2016
26Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology 17.07.2016
27Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology
› So the feature extraction technique used over here are EUC-LBP (Extended Uniform
Circular LBP) and SIFT.
Recognizing surgically altered face using multiobjective
evolutionary algorithm
17.07.2016
28Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology
› We have to use EUC-LBP and SIFT on all the 40 granules:
› SIFT works better and for some the EUC-LBP works better so they propose to use
evolutionary algorithm like Genetic Algorithm to decide the fitness function.
17.07.2016
29Stefan Voget © Continental AG
Confidential
Corporate Systems & Technology 17.07.2016
30Stefan Voget © Continental AG

More Related Content

What's hot

Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/TechnologyRahulSingh3034
 
Keras CNN Pre-trained Deep Learning models for Flower Recognition
Keras CNN Pre-trained Deep Learning models for Flower RecognitionKeras CNN Pre-trained Deep Learning models for Flower Recognition
Keras CNN Pre-trained Deep Learning models for Flower RecognitionFatima Qayyum
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Facial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approachFacial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approachAshwinRachha
 
Facial expression recognition projc 2 (3) (1)
Facial expression recognition projc 2 (3) (1)Facial expression recognition projc 2 (3) (1)
Facial expression recognition projc 2 (3) (1)AbhiAchalla
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonAkash Satamkar
 
Report Face Detection
Report Face DetectionReport Face Detection
Report Face DetectionJugal Patel
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face RecognitionNanditaDutta4
 
Attendence management system using face detection
Attendence management system using face detectionAttendence management system using face detection
Attendence management system using face detectionSaurabh Sutone
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognitionIRJET Journal
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxkakimetu
 
Face recognization
Face recognizationFace recognization
Face recognizationleenak770
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 

What's hot (20)

Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Keras CNN Pre-trained Deep Learning models for Flower Recognition
Keras CNN Pre-trained Deep Learning models for Flower RecognitionKeras CNN Pre-trained Deep Learning models for Flower Recognition
Keras CNN Pre-trained Deep Learning models for Flower Recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Facial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approachFacial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approach
 
Facial expression recognition projc 2 (3) (1)
Facial expression recognition projc 2 (3) (1)Facial expression recognition projc 2 (3) (1)
Facial expression recognition projc 2 (3) (1)
 
face recognition
face recognitionface recognition
face recognition
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Report Face Detection
Report Face DetectionReport Face Detection
Report Face Detection
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
Attendence management system using face detection
Attendence management system using face detectionAttendence management system using face detection
Attendence management system using face detection
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
DRIVER DROWSINESS ALERT SYSTEM
DRIVER DROWSINESS ALERT SYSTEMDRIVER DROWSINESS ALERT SYSTEM
DRIVER DROWSINESS ALERT SYSTEM
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

Similar to Face Recognition Antispoofing Methods Survey

IRJET - Emotion Recognising System-Crowd Behavior Analysis
IRJET -  	  Emotion Recognising System-Crowd Behavior AnalysisIRJET -  	  Emotion Recognising System-Crowd Behavior Analysis
IRJET - Emotion Recognising System-Crowd Behavior AnalysisIRJET Journal
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxAravindHari22
 
IRJET - Face Recognition based Attendance System
IRJET -  	  Face Recognition based Attendance SystemIRJET -  	  Face Recognition based Attendance System
IRJET - Face Recognition based Attendance SystemIRJET Journal
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour FeaturesIRJET Journal
 
Gesture Recognition Based Video Game Controller
Gesture Recognition Based Video Game ControllerGesture Recognition Based Video Game Controller
Gesture Recognition Based Video Game ControllerIRJET Journal
 
Project Synopsis
Project SynopsisProject Synopsis
Project SynopsisParas Garg
 
vision correcting display
vision correcting displayvision correcting display
vision correcting displayDisha Tiwari
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Robust 3 d face recognition in presence of
Robust 3 d face recognition in presence ofRobust 3 d face recognition in presence of
Robust 3 d face recognition in presence ofijfcstjournal
 
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...inventionjournals
 
Cozzella presentation ICAPMMOMI 2010
Cozzella presentation ICAPMMOMI 2010Cozzella presentation ICAPMMOMI 2010
Cozzella presentation ICAPMMOMI 2010Lorenzo Cozzella
 
Final_Facial_Emotion_Detection_ppt.pdf
Final_Facial_Emotion_Detection_ppt.pdfFinal_Facial_Emotion_Detection_ppt.pdf
Final_Facial_Emotion_Detection_ppt.pdfankitasenapati2003
 
IRJET- 3-D Face Image Identification from Video Streaming using Map Reduc...
IRJET-  	  3-D Face Image Identification from Video Streaming using Map Reduc...IRJET-  	  3-D Face Image Identification from Video Streaming using Map Reduc...
IRJET- 3-D Face Image Identification from Video Streaming using Map Reduc...IRJET Journal
 
IoT and Computer Vision Based Driver Safety Monitoring System with Risk Predi...
IoT and Computer Vision Based Driver Safety Monitoring System with Risk Predi...IoT and Computer Vision Based Driver Safety Monitoring System with Risk Predi...
IoT and Computer Vision Based Driver Safety Monitoring System with Risk Predi...Sama -E-Shan
 
IRJET- Facial Expression Recognition: Review
IRJET- Facial Expression Recognition: ReviewIRJET- Facial Expression Recognition: Review
IRJET- Facial Expression Recognition: ReviewIRJET Journal
 
Facial Keypoint Detection Using R
Facial Keypoint Detection Using RFacial Keypoint Detection Using R
Facial Keypoint Detection Using RGeneva Porter
 
Major_Project_Group 03_KIIT-1.pptx
Major_Project_Group 03_KIIT-1.pptxMajor_Project_Group 03_KIIT-1.pptx
Major_Project_Group 03_KIIT-1.pptxSubhrajyotiPayra
 
Drowsiness State Detection of Driver using Eyelid Movement- TECHgium 2019
Drowsiness State Detection of Driver using Eyelid Movement- TECHgium 2019Drowsiness State Detection of Driver using Eyelid Movement- TECHgium 2019
Drowsiness State Detection of Driver using Eyelid Movement- TECHgium 2019Vignesh C
 

Similar to Face Recognition Antispoofing Methods Survey (20)

IRJET - Emotion Recognising System-Crowd Behavior Analysis
IRJET -  	  Emotion Recognising System-Crowd Behavior AnalysisIRJET -  	  Emotion Recognising System-Crowd Behavior Analysis
IRJET - Emotion Recognising System-Crowd Behavior Analysis
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
 
IRJET - Face Recognition based Attendance System
IRJET -  	  Face Recognition based Attendance SystemIRJET -  	  Face Recognition based Attendance System
IRJET - Face Recognition based Attendance System
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour Features
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Gesture Recognition Based Video Game Controller
Gesture Recognition Based Video Game ControllerGesture Recognition Based Video Game Controller
Gesture Recognition Based Video Game Controller
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
vision correcting display
vision correcting displayvision correcting display
vision correcting display
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Robust 3 d face recognition in presence of
Robust 3 d face recognition in presence ofRobust 3 d face recognition in presence of
Robust 3 d face recognition in presence of
 
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
 
Cozzella presentation ICAPMMOMI 2010
Cozzella presentation ICAPMMOMI 2010Cozzella presentation ICAPMMOMI 2010
Cozzella presentation ICAPMMOMI 2010
 
Final_Facial_Emotion_Detection_ppt.pdf
Final_Facial_Emotion_Detection_ppt.pdfFinal_Facial_Emotion_Detection_ppt.pdf
Final_Facial_Emotion_Detection_ppt.pdf
 
IRJET- 3-D Face Image Identification from Video Streaming using Map Reduc...
IRJET-  	  3-D Face Image Identification from Video Streaming using Map Reduc...IRJET-  	  3-D Face Image Identification from Video Streaming using Map Reduc...
IRJET- 3-D Face Image Identification from Video Streaming using Map Reduc...
 
IoT and Computer Vision Based Driver Safety Monitoring System with Risk Predi...
IoT and Computer Vision Based Driver Safety Monitoring System with Risk Predi...IoT and Computer Vision Based Driver Safety Monitoring System with Risk Predi...
IoT and Computer Vision Based Driver Safety Monitoring System with Risk Predi...
 
IRJET- Facial Expression Recognition: Review
IRJET- Facial Expression Recognition: ReviewIRJET- Facial Expression Recognition: Review
IRJET- Facial Expression Recognition: Review
 
Facial Keypoint Detection Using R
Facial Keypoint Detection Using RFacial Keypoint Detection Using R
Facial Keypoint Detection Using R
 
Major_Project_Group 03_KIIT-1.pptx
Major_Project_Group 03_KIIT-1.pptxMajor_Project_Group 03_KIIT-1.pptx
Major_Project_Group 03_KIIT-1.pptx
 
Drowsiness State Detection of Driver using Eyelid Movement- TECHgium 2019
Drowsiness State Detection of Driver using Eyelid Movement- TECHgium 2019Drowsiness State Detection of Driver using Eyelid Movement- TECHgium 2019
Drowsiness State Detection of Driver using Eyelid Movement- TECHgium 2019
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

Face Recognition Antispoofing Methods Survey

  • 1. Confidential Corporate Systems & Technology Rishabh shah Review on Antispoofing techniques in Face recognition 1
  • 2. Confidential Corporate Systems & Technology Biometric Antispoofing Methods : A survey in face recognition 2 Static includes 2D photo attacks while dynamic includes 3D mask and Video attacks.
  • 3. Confidential Corporate Systems & Technology › This paper works upon two parts 1) face detection 2) Motion and estimation tracking. › Step 1:For face detection it uses a method called “QUANGLES”. It is faster than the other methods. › step 2: we resort to a simple algorithm that exploits motion to refine its effective neighborhood. › When a face is detected in the current frame f(t), we would like to know its most likely counterpart in frame f(t−1).Then we select it’s center coordinates at a particular scale. Verifying Liveness by Multiple Experts in Face Biometrics 3
  • 4. Confidential Corporate Systems & Technology › Suppose that we have a detected face x(t) at time t and we have δ(t) = (δx t , δy t )T , representing the motion vector between the center of two faces detected in the frames f(t−1) and f(t), at our disposal. This helps us define the conditional probability density p(X(t-1)|X(t)) for random vector : 4
  • 5. Confidential Corporate Systems & Technology › Algorithm for the tracking of face and checking it liveness: 17.07.2016 5Stefan Voget © Continental AG
  • 6. Confidential Corporate Systems & Technology › The last step is to collect evidence on liveness : It is done by working upon the 3D properties of the face . But before that we need to crop the images to cover the face itself and then start working upon it. › We have two measures to take into consideration for to work upon 3D properties: • Rasterflow: 3D motion of the face. This is checked by rasterflow method in which , we will simply extract the means and standard deviations of |δt| within five equi-dimensioned vertical stripe › These five measurement pairs at the frame t are termed rasterflow_t, representing a five- tuple (2x5 vector). They encode the spatiality and are expected to converge to a wedge- pattern. 6
  • 7. Confidential Corporate Systems & Technology › Eye flow : The eye regions can be sufficiently well located within the face patch because they are likely to be at constant positions/scale (ex, ey, es) known from training of the object detector. › › By taking the mean of |δt| within these areas, and dividing it by the mean of |δt| in the remaining light-gray area, we define our eyeflow(t) measurement. › As the final step both raster flow and eye flow should be greater than zero or the face is fake/spoofed. 7
  • 8. Confidential Corporate Systems & Technology › The illumination and brightness plays a very important role in detection of the face. In order to detect this kind of spoofs. › So up until now DoG of the image in undertaken at different values of sigma to determine different scales. › DoG is taken so that the edges can be maintained but the noise from the image is removed and it gets smoothened › This model does not work under bad illumination because it used vanilla histogram equalization method . › In both the methods we are going to use sparse logistic regression with DoG as the frequency descriptor. Face liveness detection under bad illumination condition 8
  • 9. Confidential Corporate Systems & Technology › Proposed method is called CLAHE(Contrast limited adaptive histogram equalization). › Every tile within the image has it’s contrast enhanced w.r.t to the type of output histogram expected like a uniform(flat) one , Rayleigh(Bell-shaped) or an exponential(Curve shaped) one. › It depends on three things which are : 1) No. of tiles 2)Contrast enhancement limit 3) alpha value. 9
  • 10. Confidential Corporate Systems & Technology › This paper is based on the movement within the facial components. So the movement in the eyes in the sequential images will be checked. › Algorithm : Liveness detection for embedded face recognition system 10
  • 11. Confidential Corporate Systems & Technology › Eye Detection : When the face image is considered as a 3D curve, the intensity of the eye region is lower than the rest of face region. So to get eye region we perform two steps:  First, we perform Gaussian filtering to the face image, so that the smoothened 3D curve is obtained.  In the curve, we extract all the local minimums using the method of the gradient descent . › To reduce the invalid eye candidates, we used the eye classifier, which is trained by Viloa’s AdaBoost training methods . › Face Region Normalization :Input face can vary in size and orientation, we normalize face region about a size and rotation by using center points of both eyes. we normalize this face region to the size of 72x72. › Then we apply SQI to the face region to decrease the effect of illumination. Self Quotient Image (SQI). › Î is the low frequency image of the original image, F is the Gaussian kernel 11
  • 12. Confidential Corporate Systems & Technology › In the below given images the first row ones are original images under various lighting condition while the later ones are it’s SQI. › Eye Region Binarization : After Normalizing face region, eye regions are extracted as 10x20 size based on the center of eyes. Then eye regions are binarized in order to have the pixel value of 0 and 1 by using a threshold. 12
  • 13. Confidential Corporate Systems & Technology › Figure shows the example of binarized eye regions extracted from 5 sequential face images. As shown in Fig. (a) Eye regions of fake face change very little, but eye regions (b) of real face have a much larger variation in shape because of blink or movement of pupil. 13
  • 14. Confidential Corporate Systems & Technology › Liveness score calculation › Steps: › 1) Hamming distance(the Hamming distance is the number of pixels that do not have same value) method is used to calculate liveness score of each eye region › 2) We compare 5 left eyes each other using hamming distance and 5 right eyes in the same way › 3) The number of pixels which differs between two eye regions becomes liveness score. › 4) After adding 10 liveness scores of left eyes and 10 liveness scores of right eyes, we take an average of scores. › 5) If the average liveness score is bigger than threshold, we recognize the input image as live face and in the case of opposite it is discriminated to the photograph. 17.07.2016 14Stefan Voget © Continental AG
  • 15. Confidential Corporate Systems & Technology › So this paper takes into consideration three different kinds of scenarios: › 1) Non- rigid motion clues i.e. Eye blink › 2) Face background consistency clue › 3) Image banding effect – Quality changes in the image due introduction of fake face. Non- rigid motion clues › We adopt the batch image alignment method to separate the non-rigid motion from the rigid ones › Batch image alignment utilizes a series of rigid transformation to align several images to a fixed image, with the residual being the non-rigid motion. › Image in the next slide shows how this alignment procedure works : Face Liveness Detection by Exploring Multiple scenic clues 17.07.2016 15Stefan Voget © Continental AG
  • 16. Confidential Corporate Systems & Technology 17.07.2016 16Stefan Voget © Continental AG For genuine face sequence, there are some frames that have large sparse residual in eye regions which corresponds to eye-blinking or in mouth regions which corresponds to mouth movement. There may be some residual in fake face video, such as the 1st and 6th frame in Fig. (b), however they are uniformly distributed noises in the whole face region.
  • 17. Confidential Corporate Systems & Technology › Facial Non-rigid motion features : If a face sequences have a big Si like Fig. 1, the corresponding face is considered genuine; otherwise fake. › Face Background Consistency: › It is based on the observation that if the target face is genuine, its motion should be totally independent from that of the background; otherwise the motion relationship between face and background cannot be totally independent because of the exhibition medium’s constraint. › We do not use optical flow estimation method. 17.07.2016 17Stefan Voget © Continental AG
  • 18. Confidential Corporate Systems & Technology › GMM(Gaussian Mixture Model) is used since it is more efficient and it is robust to illumination and noise. › After some initialization, GMM outputs the foreground, background binary image Bi , i = 1 · · · , n of a given frame I : › This Bi is further used to check motion trend, which is the first step of checking the consistency; › It will be further used to calculate the CMD(Consistency Motion Descriptors).It is the first dimension of face-background consistency feature. 17.07.2016 18Stefan Voget © Continental AG
  • 19. Confidential Corporate Systems & Technology › Motion entropy : Second dimension of face-background consistency › The motion of hand hold photo attack videos are global while the motion of genuine videos are local. This inspires us to use the total motion as another measure. The motion entropy me(i), i = 1, 2 · · ·,n is defined as: › Pi = Foreground ratio › The motion entropy of handed fake face is very large compared with genuine face, while the motion entropy of fixed fake face is close to 0. 17.07.2016 19Stefan Voget © Continental AG
  • 20. Confidential Corporate Systems & Technology › Image Banding : Since fake faces are usually exhibited by certain medium, inevitably some quality degradation will be introduced during the imaging process. › Face liveness detection by wavelet decomposition. › Image noise can be estimated by a robust median estimator as follows: › HH1 means the first order wavelet decomposition of the image › We find that the median estimator values of fake face images are all near 0.74 while most genuine faces are near 0 with only two exceptions. 17.07.2016 20Stefan Voget © Continental AG
  • 21. Confidential Corporate Systems & Technology › Contrast and texture analysis of recaptured and captured images. › Earlier, DoG (Difference of Gaussian) filter is used to obtain a special frequency band which gives considerable information to discriminate between real and photo images.In this approach it used for preprocessing. › LBPV: It is a combination of spatial structure and the contrast. › In LBPV global spatial information is not lost. › In this approach, initially rotation variant LBPV histograms are obtained. › Process of this approach : Classification of Captured and recaptured Images to detect photograph spoofing 17.07.2016 21Stefan Voget © Continental AG
  • 22. Confidential Corporate Systems & Technology › Variance is computed for the P sampling points around a circle of radius R, after the calculation of LBP at the same radius R. › & › The final equation to calculate LBPV: 17.07.2016 22Stefan Voget © Continental AG
  • 23. Confidential Corporate Systems & Technology › Global matching is implemented using exhaustive search scheme to find the minimal distance in all candidate orientations, which is a simple method. › The LBPV histogram is reorganized and represented by a rotation variant histogram Hrv, and a rotation invariant histogram Hri. Then for two texture images, the matching distance is calculated. › Finally, each test image is classified in the nearest class by comparing the two quadratic mean values, which are obtained for client and impostor sets. 17.07.2016 23Stefan Voget © Continental AG
  • 24. Confidential Corporate Systems & Technology › This paper functions for enhanced videos for spoofing detection with the help of two techniques. › Spoofing based on text features extracted using LBP. › Spoofing based on motion features extracted using MOOF. Eulerian Motion Magnification › First, each frame is decomposed into spatial Laplacian bands. Next, an ideal temporal bandpass filter is applied to each Laplacian band to isolate the desired temporal motion in each band › The isolated band passed signal is then multiplied by an amplification factor α and added to the original signal, as shown in eqn. Computationally Efficient Face Spoofing Detection with Motion Magnification 17.07.2016 24Stefan Voget © Continental AG
  • 25. Confidential Corporate Systems & Technology › LBP method: › HOOF method: Histogram of oriented flows 17.07.2016 25Stefan Voget © Continental AG
  • 26. Confidential Corporate Systems & Technology › This paper focuses on the usage of many low level feature descriptors for detection of the spoofed image. › CF: color frequency, it used to store the color information regarding the image. › HSC: Histogram of Shearlet coefficients, these are used to estimate edge response. › HOG: To capture the edge’s gradient structure. › GLCM: Gray level co-occurrence matrix. It is used to show texture or the gray level pattern. › This four help in extracting 12 feature descriptors. Face spoofing Detection through partial least squares and low level descriptors 17.07.2016 26Stefan Voget © Continental AG
  • 27. Confidential Corporate Systems & Technology 17.07.2016 27Stefan Voget © Continental AG
  • 28. Confidential Corporate Systems & Technology › So the feature extraction technique used over here are EUC-LBP (Extended Uniform Circular LBP) and SIFT. Recognizing surgically altered face using multiobjective evolutionary algorithm 17.07.2016 28Stefan Voget © Continental AG
  • 29. Confidential Corporate Systems & Technology › We have to use EUC-LBP and SIFT on all the 40 granules: › SIFT works better and for some the EUC-LBP works better so they propose to use evolutionary algorithm like Genetic Algorithm to decide the fitness function. 17.07.2016 29Stefan Voget © Continental AG
  • 30. Confidential Corporate Systems & Technology 17.07.2016 30Stefan Voget © Continental AG