Table of Contents Author Guidelines Submit a Manuscript
Advances in Multimedia
Volume 2018 (2018), Article ID 9025458, 10 pages
https://doi.org/10.1155/2018/9025458
Research Article

Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication

School of Control and Computer Engineering, North China Electric Power University, Beijing, China

Correspondence should be addressed to Yuancheng Li; nc.ude.upecn@ilcy

Received 2 September 2017; Revised 4 January 2018; Accepted 16 January 2018; Published 8 March 2018

Academic Editor: Jianping Fan

Copyright © 2018 Haiqing Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. X. Zhao, Y. Lin, and J. Heikkila, “Dynamic Texture Recognition Using Volume Local Binary Count Patterns With an Application to 2D Face Spoofing Detection,” IEEE Transactions on Multimedia, vol. 20, no. 3, pp. 552–566, 2018. View at Publisher · View at Google Scholar
  2. M. De Marsico, M. Nappi, D. Riccio, and J.-L. Dugelay, “Moving face spoofing detection via 3D projective invariants,” in Proceedings of the 2012 5th IAPR International Conference on Biometrics, ICB 2012, pp. 73–78, India, April 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. E. Thabet, F. Khalid, P. Suhaiza Sulaiman, and R. Yaakob, “Low Cost Skin Segmentation Scheme in Videos Using Two Alternative Methods for Dynamic Hand Gesture Detection Method,” Advances in Multimedia, vol. 2017, Article ID 7645189, 9 pages, 2017. View at Publisher · View at Google Scholar · View at Scopus
  4. Y. Tang and L. Chen, “Shape analysis based anti-spoofing 3D face recognition with mask attacks,” Communications in Computer and Information Science, vol. 684, pp. 41–55, 2017. View at Publisher · View at Google Scholar · View at Scopus
  5. Z. Boulkenafet, J. Komulainen, and A. Hadid, “Face Spoofing Detection Using Colour Texture Analysis,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 8, pp. 1818–1830, 2016. View at Publisher · View at Google Scholar · View at Scopus
  6. D. C. Garcia and R. L. De Queiroz, “Face-Spoofing 2D-Detection Based on Moiré-Pattern Analysis,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 4, pp. 778–786, 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Määttä, A. Hadid, and M. Pietikäinen, “Face spoofing detection from single images using micro-texture analysis,” in Proceedings of the 2011 International Joint Conference on Biometrics, IJCB 2011, USA, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. K. Kollreider, H. Fronthaler, M. I. Faraj, and J. Bigun, “Real-time face detection and motion analysis with application in “liveness” assessment,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 548–558, 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. S. R. Arashloo, J. Kittler, and W. Christmas, “Face Spoofing Detection Based on Multiple Descriptor Fusion Using Multiscale Dynamic Binarized Statistical Image Features,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 11, pp. 2396–2407, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. W. Kim, S. Suh, and J.-J. Han, “Face liveness detection from a single image via diffusion speed model,” IEEE Transactions on Image Processing, vol. 24, no. 8, pp. 2456–2465, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. J. Komulainen, A. Hadid, M. Pietikäinen, A. Anjos, and S. Marcel, “Complementary countermeasures for detecting scenic face spoofing attacks,” in Proceedings of the International Conference on Biometrics (ICB '13), pp. 1–7, Madrid, Spain, June 2013. View at Publisher · View at Google Scholar
  12. D. F. Smith, A. Wiliem, and B. C. Lovell, “Face recognition on consumer devices: Reflections on replay attacks,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 4, pp. 736–745, 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Yang, Z. Lei, and S. Z. Li, “Learn convolutional neural network for face anti-spoofing,” Computer Science, vol. 9218, pp. 373–384, 2014. View at Google Scholar
  14. J. Galbally and S. Marcel, “Face anti-spoofing based on general image quality assessment,” in Proceedings of the 22nd International Conference on Pattern Recognition (ICPR '14), pp. 1173–1178, Stockholm, Sweden, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, and S. Z. Li, “A face antispoofing database with diverse attacks,” in Proceedings of the 5th IAPR International Conference on Biometrics (ICB '12), pp. 26–31, IEEE, New Delhi, India, April 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. H. Li, S. Xiong, P. Duan, and X. Kong, “Multitarget tracking of pedestrians in video sequences based on particle filters,” Advances in Multimedia, vol. 2012, Article ID 343724, 14 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. C. Riess, “Illumination analysis in physics-based image forensics: A joint discussion of illumination direction and color,” Communications in Computer and Information Science, vol. 766, pp. 95–108, 2017. View at Publisher · View at Google Scholar · View at Scopus
  18. R. Sutoyo, J. Harefa, Alexander, and A. Chowanda, “Unlock screen application design using face expression on android smartphone,” in Proceedings of the 2016 7th International Conference on Mechanical, Industrial, and Manufacturing Technologies, MIMT 2016, South Africa, February 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. A. Anjos, M. M. Chakka, and S. Marcel, “Motion-based counter-measures to photo attacks in face recognition,” IET Biometrics, vol. 3, no. 3, pp. 147–158, 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. R. Raghavendra, K. B. Raja, and C. Busch, “Presentation attack detection for face recognition using light field camera,” IEEE Transactions on Image Processing, vol. 24, no. 3, pp. 1060–1075, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  21. P. Motlicek, S. Duffner, D. Korchagin et al., “Real-time audio-visual analysis for multiperson videoconferencing,” Advances in Multimedia, vol. 2013, Article ID 175745, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. J. Galbally, S. Marcel, and J. Fierrez, “Biometric antispoofing methods: A survey in face recognition,” IEEE Access, vol. 2, pp. 1530–1552, 2014. View at Publisher · View at Google Scholar · View at Scopus