Abstract
In the last few decades, deep-learning-based face verification and recognition systems have had enormous success in solving complex security problems. However, it has been recently shown that such efficient frameworks are vulnerable to face-spoofing attacks, which has led researchers to build proficient anti-facial-spoofing (or liveness detection) models as an additional security layer. In response, increasingly challenging and tricky attacks have been launched to fool these anti-spoofing mechanisms. In this context, this paper presents the results of an analytical study on transfer-learning-based convolutional neural networks (CNNs) for face liveness detection and differential evolution-based adversarial attacks to evaluate the efficiency of face anti-spoofing classifiers against adversarial attacks. Specifically, experiments were conducted under different use-case scenarios on four face anti-spoofing databases to highlight practical criteria that can be used in the development of countermeasures to address face-spoofing issues.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Atoum Y, Liu Y, Jourabloo A, Liu X (2017) Face anti-spoofing using patch and depth-based CNNs. In: IEEE International Joint Conference on Biometrics (IJCB), pp 319–328
Bose AJ, Aarabi P (2018) Adversarial attacks on face detectors using neural net based constrained optimization. arXiv:180512302
Botelho de Souza G, Papa JP, Marana AN (2018) On the learning of deep local features for robust face spoofing detection. arXiv:180607492
Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: A mobile face presentation attack database with real-world variations. In: 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), pp 612–618
Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. arXiv:160804644v2
Chen X, Liu C, Li B, Lu K, Song D (2017) Targeted backdoor attacks on deep learning systems using data poisoning. arXiv:171205526
Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: International Conference of Biometrics Special Interest Group (BIOSIG), pp 1–7
Chingovska I, Yang J, Le i Z, Yi D, Li S, Kahm O, Glaser C, Damer N, Kuijper A, Nouak A, Komulainen J, Pereira T, Gupta S, Khandelwal S, Bansal S, Rai A, Krishna T, Goyal D, Waris MA, Zhang H, Ahmad I, Kiranyaz S, Gabbouj M, Tronci R, Pili M, Sirena N, Roli F, Galbally J, Ficrrcz J, Pinto A, Pedrini H, Schwartz W, Rocha A, Anjos A, Marcel S (2013) The 2nd competition on counter measures to 2d face spoofing attacks. In: IAPR Int. Conference on Biometrics (ICB), pp 1–6
Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J (2018) Boosting adversarial attacks with momentum. arXiv:171006081
Erdogmus N, Marcel S (2013) Spoofing in 2D face recognition with 3d masks and anti-spoofing with kinect. In: IEEE Sixth international conference on biometrics: Theory, Applications and Systems (BTAS), pp 1–6
Feng L, Po L M, Li Y, Xu X, Yuan F, Chun-HoCheung T, Cheung K W (2016) Integration of image quality and motion cues for face anti-spoofing: a neural network approach. J Vis Commun Image Represent 38:451–460
Fourati E, Elloumi W, Chetouani A (2020) Anti-spoofing in face recognition-based biometric authentication using image quality assessment. Multimed Tools Appl 79:865–889
Gan J, Li S, Zhai Y, Liu C (2017) 3D convolutional neural network based on face anti-spoofing. In: 2nd International Conference on Multimedia and Image Processing (ICMIP), pp 1–5
Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. arXiv:14126572
Goswami G, Agarwal A, Ratha N, Singh R, Vatsa M (2019) Detecting and mitigating adversarial perturbations for robust face recognition. Int J Comput Vis (IJCV) 127:719–742
Hadid A (2014) Face biometrics under spoofing attacks: Vulnerabilities, countermeasures, open issues, and research directions. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp 113–118
Hu W, Te G, He J, Chen D, Guo Z (2018) Exploring hypergraph representation on face anti-spoofing beyond 2D attacks. arXiv:181111594
IJCB 2017 competition on generalized face presentation attack detection in mobile authentication scenarios. https://sites.google.com/site/faceantispoofing/, accessed 26 August 2019 (2017)
ISO/IEC 30107-1:2016 information technology biometric presentation attack detection part 1: Framework. https://www.iso.org/standard/53227.html, accessed 26 August 2019 (2016)
Jiawei SVDV, Sakurai K (2019) Attacking convolutional neural network using differential evolution. IPSJ Trans Comput Vis Appl 11:1–12
Jourabloo A, Liu Y, Liu X (2018) Face de-spoofing: Anti-spoofing via noise modeling. arXiv:180709968
Komulainen J (2015) Software-based countermeasures to 2D facial spoofing attacks. PhD thesis, University of Oulu
Kose N, Dugelay JL (2013) On the vulnerability of face recognition systems to spoofing mask attacks. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 2357–2361
Krizhevsky A, Sutskever I, Hinton G E (2017) Imagenet classification with deep convolutionalneural networks. Adv Neural Inf Process Syst (NIPS,) 60:1097–1105
Kurakin A, Goodfellow I, Bengio S (2017a) Adversarial examples in the physical world. arXiv:160702533v4
Kurakin A, Goodfellow I, Bengio S (2017b) Adversarial machine learning at scale. arXiv:161101236v2
Li L, Feng X, Boulkenafet Z, Xia Z, Li M, Hadid A (2016) An original face anti-spoofing approach using partial convolutional neural network. In: Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA), pp 1–6
Li L, Correia P L, Hadid A (2018) Face recognition under spoofing attacks: countermeasures and research directions. IET Biom 7:3–14
Li H, Li W, Cao H, Wang S, Huang F, Kot AC (2018) Unsupervised domain adaptation for face anti-spoofing. IEEE Transactions on Information Forensics and Security 13
Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In: IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 389–398
Liu Y, Stehouwer J, Jourabloo A, Liu X (2019) Deep tree learning for zero-shot face anti-spoofing. arXiv:190402860
Liu Y, Tai Y, Li J, Ding S, Wang C, Huang F, Li D, Qi W, Ji R (2019) Aurora guard: Real-time face anti-spoofing via light reflection. arXiv:190210311
Liu A, Wan J, Escalera S, Escalante HJ, Tan Z, Yuan Q, Wang K, Lin C, Guo G, Guyon I, Li SZ (2019) Multi-modal face anti-spoofing attack detection challenge at CVPR2019. In: IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops
Lucena O, Junior A, Moia V, Souza R, Valle E, Lotufo R (2017) Transfer learning using convolutional neural networks for face anti-spoofing. In: International Conference Image Analysis and Recognition (ICIAR), pp 27–34
Moosavi-Dezfooli SM, Fawzi A, Fawzi O, Frossard P (2017) Universal adversarial perturbations. arXiv:161008401
Moosavi-Dezfooli SM, Fawzi A, Frossard P (2016) Deepfool: a simple and accurate method to fool deep neural networks. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 2574–2582
Nagpal C, Dubey SR (2019) A performance evaluation of convolutional neural networks for face anti spoofing. arXiv:180504176
Nguyen M D, Bui QM (2009) Your face is NOT your password. In: Black hat DC
Papernot N, McDaniel P, Goodfellow IJ, Jha SK, Celik ZB, Swami A (2017) Practical black-box attacks against machine learning. In: ACM on Asia Conference on Computer and Communications Security, pp 506–519
Patel K, Han H, Jain A K (2016) Secure face unlock: Spoof detection on smartphones. IEEE Trans Inf Forens Secur 11:2268–2283
Patel K, Han H, Jain AK (2016) Cross-database face antispoofing with robust feature representation. In: Chinese Conference on Biometric Recognition (CCBR), pp 611–619
Peng F, Qin L, Long M (2018) Face presentation attack detection using guided scale texture. Multimed Tools Appl 77:1–27
Redmon J, Farhadi A (2016) YOLO9000: Better, faster, stronger. arXiv:161208242
Saon G, Kuo HKJ, Rennie S, Picheny M (2015) The IBM 2015 English conversational telephone speech recognition system. arXiv:150505899
Sharif M, Bhagavatula S, Bauer L, Reiter MK (2016) Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In: ACM SIGSAC Conference on Computer and Communications Security, pp 1528–1540
Sharif M, Bhagavatula S, Bauer L, Reiter MK (2019) A general framework for adversarial examples with objectives. arXiv:180100349
Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. arXiv:14091556
Song Q, Wu Y, Yang L (2018) Attacks on state-of-the-art face recognition using attentional adversarial attack generative network. arXiv:181112026
Souza L, Oliveira L, Pamplona M, Papa J P (2018) How far did we get in face spoofing detection?. Eng Appl Artif Intell 72:368–381
Storn R, Price K (1997) Differential evolution a simple and efficient heuristic for global optimization over continuous spaces. J Glob Optim 11:341–359
Su J, Vargas DV, Kouichi S (2018) One pixel attack for fooling deep neural networks. arXiv:171008864
Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Rob F (2014) Intriguing properties of neural networks. ICLR, arXiv:13126199
Trusted biometrics under spoofing attacks (TABULA RASA). http://www.tabularasa-euproject.org/, accessed 26 August 2019 (2010)
Tu X, Zhang H, Xie M, Luo Y, Zhang Y, Ma Z (2019) Deep transfer across domains for face anti-spoofing. arXiv:190105633
Tu X, Zhang H, Xie M, Luo Y, Zhang Y, Ma Z (2019) Enhance the motion cues for face anti-spoofing using CNN-LSTM architecture. arXiv:190105635
Unique identification authority of India (UIDAI). https://uidai.gov.in/, accessed 26 August 2019 (2016)
Ur Rehman Y A, Po L M, Liu M, Zou Z, Ou W, Zhao Y (2019) Face liveness detection using convolutional-features fusion of real and deep network generated face images. J Vis Commun Image Represent 59:574–582
Wang Z, Zhao C, Qin Y, Zhou Q, Qi G, Wan J, Lei Z (2019) Exploiting temporal and depth information for multi-frame face anti-spoofing. arXiv:181105118v3
Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forens Secur 10:746–761
Yang J, Lei Z, Li S Z (2014) Learn convolutional neural network for face anti-spoofing. Computer Science. arXiv:1408.5601, pp 373–384
Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: 5th IAPR International Conference on Biometrics (ICB), pp 26–31
Zhang K, Zhang Z, Li Z, Qiao Y (2016) Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process Lett 23:1499–1503
Zhou Z, Tang D, Wang X, Han W, Liu X, Zhang K (2018) Invisible mask: Practical attacks on face recognition with infrared. arXiv:180304683
Acknowledgments
The authors thank the Deanship of Scientific Research and RSSU at King Saud University for their technical support.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Bousnina, N., Zheng, L., Mikram, M. et al. Unraveling robustness of deep face anti-spoofing models against pixel attacks. Multimed Tools Appl 80, 7229–7246 (2021). https://doi.org/10.1007/s11042-020-10041-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10041-1