2. Confidential
Corporate Systems & Technology
Biometric Antispoofing Methods : A survey in face
recognition
2
Static includes 2D photo attacks while dynamic includes 3D mask and
Video attacks.
3. Confidential
Corporate Systems & Technology
› This paper works upon two parts 1) face detection 2) Motion and estimation tracking.
› Step 1:For face detection it uses a method called “QUANGLES”. It is faster than the other
methods.
› step 2: we resort to a simple algorithm that exploits motion to refine its effective
neighborhood.
› When a face is detected in the current frame f(t), we would like to know its most likely
counterpart in frame f(t−1).Then we select it’s center coordinates at a particular scale.
Verifying Liveness by Multiple Experts in Face
Biometrics
3
4. Confidential
Corporate Systems & Technology
› Suppose that we have a detected face x(t) at time t and we have δ(t) = (δx t , δy t )T ,
representing the motion vector between the center of two faces detected in the frames
f(t−1) and f(t), at our disposal. This helps us define the conditional probability density
p(X(t-1)|X(t)) for random vector :
4
6. Confidential
Corporate Systems & Technology
› The last step is to collect evidence on liveness : It is done by working upon the 3D
properties of the face . But before that we need to crop the images to cover the face itself
and then start working upon it.
› We have two measures to take into consideration for to work upon 3D properties:
• Rasterflow: 3D motion of the face. This is checked by rasterflow method in which , we will
simply extract the means and standard deviations of |δt| within five equi-dimensioned
vertical stripe
› These five measurement pairs at the frame t are termed rasterflow_t, representing a five-
tuple (2x5 vector). They encode the spatiality and are expected to converge to a wedge-
pattern.
6
7. Confidential
Corporate Systems & Technology
› Eye flow : The eye regions can be sufficiently well located within the face patch because
they are likely to be at constant positions/scale (ex, ey, es) known from training of the
object detector.
›
› By taking the mean of |δt| within these areas, and dividing it by the mean of |δt| in the
remaining light-gray area, we define our eyeflow(t) measurement.
› As the final step both raster flow and eye flow should be greater than zero or the face is
fake/spoofed.
7
8. Confidential
Corporate Systems & Technology
› The illumination and brightness plays a very important role in detection of the face. In order to
detect this kind of spoofs.
› So up until now DoG of the image in undertaken at different values of sigma to determine
different scales.
› DoG is taken so that the edges can be maintained but the noise from the image is removed and
it gets smoothened
› This model does not work under bad illumination because it used vanilla histogram equalization
method .
› In both the methods we are going to use sparse logistic regression with DoG as the frequency
descriptor.
Face liveness detection under bad illumination condition
8
9. Confidential
Corporate Systems & Technology
› Proposed method is called CLAHE(Contrast limited adaptive histogram equalization).
› Every tile within the image has it’s contrast enhanced w.r.t to the type of output histogram
expected like a uniform(flat) one , Rayleigh(Bell-shaped) or an exponential(Curve shaped)
one.
› It depends on three things which are : 1) No. of tiles 2)Contrast enhancement limit
3) alpha value.
9
10. Confidential
Corporate Systems & Technology
› This paper is based on the movement within the facial components. So the movement in
the eyes in the sequential images will be checked.
› Algorithm :
Liveness detection for embedded face recognition
system
10
11. Confidential
Corporate Systems & Technology
› Eye Detection : When the face image is considered as a 3D curve, the intensity of the eye
region is lower than the rest of face region. So to get eye region we perform two steps:
First, we perform Gaussian filtering to the face image, so that the smoothened 3D curve is
obtained.
In the curve, we extract all the local minimums using the method of the gradient descent .
› To reduce the invalid eye candidates, we used the eye classifier, which is trained by Viloa’s
AdaBoost training methods .
› Face Region Normalization :Input face can vary in size and orientation, we normalize
face region about a size and rotation by using center points of both eyes. we normalize this
face region to the size of 72x72.
› Then we apply SQI to the face region to decrease the effect of illumination. Self Quotient
Image (SQI).
› Î is the low frequency image of the original image, F is the Gaussian kernel
11
12. Confidential
Corporate Systems & Technology
› In the below given images the first row ones are original images under various lighting
condition while the later ones are it’s SQI.
› Eye Region Binarization : After Normalizing face region, eye regions are extracted as
10x20 size based on the center of eyes. Then eye regions are binarized in order to have
the pixel value of 0 and 1 by using a threshold.
12
13. Confidential
Corporate Systems & Technology
› Figure shows the example of binarized eye regions extracted from 5 sequential face
images. As shown in Fig. (a) Eye regions of fake face change very little, but eye regions
(b) of real face have a much larger variation in shape because of blink or movement of
pupil.
13