Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks

Information Forensics and Security, IEEE Transactions  (2015)

引用 146|浏览55
暂无评分
摘要
Spoofing attacks or impersonation can be easily accomplished in a facial biometric system wherein users without access privileges attempt to authenticate themselves as valid users, in which an impostor needs only a photograph or a video with facial information of a legitimate user. Even with recent advances in biometrics, information forensics and security, vulnerability of facial biometric systems against spoofing attacks is still an open problem. Even though several methods have been proposed for photo-based spoofing attack detection, attacks performed with videos have been vastly overlooked, which hinders the use of the facial biometric systems in modern applications. In this paper, we present an algorithm for video-based spoofing attack detection through the analysis of global information which is invariant to content, since we discard video contents and analyze content-independent noise signatures present in the video related to the unique acquisition processes. Our approach takes advantage of noise signatures generated by the recaptured video to distinguish between fake and valid access videos. For that, we use the Fourier spectrum followed by the computation of video visual rhythms and the extraction of different characterization methods. For evaluation, we consider the novel unicamp video-attack database, which comprises 17 076 videos composed of real access and spoofing attack videos. In addition, we evaluate the proposed method using the replay-attack database, which contains photo-based and video-based face spoofing attacks.
更多
查看译文
关键词
fourier transforms,video signal processing,fourier spectrum,content-independent noise signatures,facial biometric system,noise signatures,novel unicamp video-attack database,photo-based spoofing attack detection,video contents,video-based facial spoof attack detection,unicamp video-attack database,video-based face spoofing,visual rhythm,video-based attacks,impersonation detection in facial biometric systems
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要