Real Time Face Liveliness Detection Using Eye Blinking and Illumination Techniques
DOI:
https://doi.org/10.61841/grb62x75Keywords:
Face Liveness Detection, Spoofing Attack, Luminance, Mean RGB, Entropy, S.V.M.Abstract
One of the most widely used systems to recognize the authorized person based on behavioral or physical characteristics is the biometric system. One of the current issues with this system is that it can be easily spoofed. A spoofing attack is nothing but a situation in which a person or a program successfully identifies themselves as another person in order to use the system without the permission of an authorized user, thus harming or attacking the biometric recognition system. The biometric system can be easily spoofed by methods such as using face images of the authorized person, masks, or videos, which are easily available on social media these days. This paper proposes a real-time spoof detection method based on illumination and eye-blinking techniques. The framework is tested on 100 distinctive user appearances. As indicated by the trial results, the proposed framework achieves 99% accuracy in liveness detection.
Downloads
References
[1] J.A. Unar, W.C. Seng, A. Abbasi. "A review of biometric technology along with trends and prospects," Pattern Recognition, 2014, 47(8):2673-2688.
[2] J. Maatta, A. Hadid, M. Pietikainen, Face Spoofing Detection From Single images Using Micro Texture Analysis, Proc. International Joint Conference on Biometrics (UCB 2011), Washington, D.C., USA
[3] S. Chakrabroty, D. Das. "An Overview of Face liveness Detection," International Journal on Information Theory, 2014, 3(2):11-25
[4] P. P. K. Chan, W. Liu, D. Chen, D. S. Weung, F. Zhang, X. Wang, et al. "Face liveness Detection Using a Flash Against 2D Spoofing Attack," IEEE Transactions on Information Forensics and Security, 2018, 2018,13(2):521-534.
[5] Y. Li, K. Xu, Q. Yan, Y. Li, R. H. Deng, "Understanding OSN-based facial disclosure against face
authentication systems," Proc. ACM Asia Symp. Inf. Comput. Commun. Security (ASIACCS), pp. 413-424,
2014.
[6] K. Kollreider, H. Fronthaler, J. Bigun, "Evaluating liveness by face images and the structure tensor," Proc.
IEEE Workshop Autom. Identificat. Adv. Technol. (AutoID), pp. 75-80, Oct. 2005
[7] Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, and S. Z. Li, “A face antispoofing database with diverse attacks,” in
Proc. ICB, 2012, pp. 26–31. [8] I. Chingovska, A. Anjos, S. Marcel, "On the effectiveness of local binary
patterns in face anti-spoofing," Proc. IEEE Int. Conf. Biometrics Special Interest Group (BIOSIG), pp. 1-7,
Sept. 2012
[8] N. Erdogmus, S. Marcel, "Spoofing face recognition with 3D masks," IEEE Trans. Inf. Forensics Security,
vol. 9, no. 7, pp. 1084-1097, Jul. 2014.
[9] N. Erdogmus, S. Marcel, "Spoofing 2D face recognition systems with 3D masks," Proc. Int. Conf.
Biometrics Special Interest Group (BIOSIG), pp. 1-8, Sep. 2013.
[10] G. Kim, Eum, J. K. Suhr, D. I. Kim, K. R. Park, and J, Kim, Face liveness detection based on texture and
frequency analyses, 5th IAPR International Conference on Biometrics (ICB), New Delhi, India. pp. 67-72,
March 2012
[11] Sooyeon Kim, Sunjin Yu, Kwangtaek Kim, Yuseok Ban, Sangyoun Lee, Face liveness detection using
Variable Focusing, Biometrics (ICB), 2013 International Conference on, on page(s): 1–6, 2013.
[12] Lin Sun, Gang Pan, Zhaohui Wu, Shihong Lao, Blinking-Based Live Face Detection Using Conditional
Random Fields, ICB 2007, Seoul, Korea, International Conference, on pages 252-260, August 27-29, 2013.
[13] H. K. Jee, S. U. Jung, and J. H. Yoo, Liveness detection for embedded face recognition system,
International Journal of Biological and Medical Sciences, vol. 1(4), pp. 235-238, 2006
[14] X. Tan, Y. Li, J. Liu, and L. Jiang, “Face liveness detection from a single image with sparse low rank
bilinear discriminative model,” in Proc. ECCV, 2010, pp. 504–517.
[15] Wei Bao, Hong Li, Nan Li, and Wei Jiang, A liveness detection method for face recognition based on
optical flow field, In Image Analysis and Signal Processing, 2009, IASP 2009, International Conference on,
pages 233–236, April 2009.
[16] K. Kollreider, H. Fronthaler, J. Bigun, "Evaluating liveness by face images and the structure tensor," Proc. IEEE Workshop Autom. Identificat. Adv. Technol. (AutoID), pp. 75-80, Oct. 2005.
[17] Jianwei Yang, Zhen Lei, Shengcai Liao, Li, S.Z, Face Liveness Detection with Component Dependent Descriptor, Biometrics (ICB), 2013 International Conference on Page(s): 1–6, 2013
[18] X. Tan, Y. Li, J. Liu, and L. Jiang, “Face liveness detection from a single image with sparse low-rank bilinear discriminative model,” in Proc. ECCV, 2010, pp. 504–517.
[19] B. Peixoto, C. Michelassi, and A. Rocha, Face liveness detection under bad illumination conditions, in ICIP, pages 3557-3560, 2011.
[20] P. Viola and M. J. Jones, "Robust real-time face detection," International journal of computer vision 57.2 (2004): 137-154.
[21] Reese, K., Zheng, Y., Elmaghraby, A.: A comparison of face detection algorithms in visible and thermal spectrums. In: International Conference on Advances in Computer Science and Application (2012)
[22] D. Wen, H. Han, and Anil K. Jain, "Face spoof detection with image distortion analysis," IEEE Transactions on Information Forensics and Security 10.4, 746-761, 2015.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.