Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes

Despite important recent advances, the vulnerability of biometric systems to spoofing attacks is still an open problem. Spoof attacks occur when impostor users present synthetic biometric samples of a valid user to the biometric system seeking to deceive it. Considering the case of face biometrics,...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society. - 1992. - 24(2015), 12 vom: 15. Dez., Seite 4726-40
1. Verfasser: Pinto, Allan (VerfasserIn)
Weitere Verfasser: Pedrini, Helio, Schwartz, William Robson, Rocha, Anderson
Format: Online-Aufsatz
Sprache:English
Veröffentlicht: 2015
Zugriff auf das übergeordnete Werk:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Schlagworte:Journal Article Research Support, Non-U.S. Gov't
LEADER 01000naa a22002652 4500
001 NLM25186801X
003 DE-627
005 20231224162923.0
007 cr uuu---uuuuu
008 231224s2015 xx |||||o 00| ||eng c
024 7 |a 10.1109/TIP.2015.2466088  |2 doi 
028 5 2 |a pubmed24n0839.xml 
035 |a (DE-627)NLM25186801X 
035 |a (NLM)26276988 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Pinto, Allan  |e verfasserin  |4 aut 
245 1 0 |a Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes 
264 1 |c 2015 
336 |a Text  |b txt  |2 rdacontent 
337 |a ƒaComputermedien  |b c  |2 rdamedia 
338 |a ƒa Online-Ressource  |b cr  |2 rdacarrier 
500 |a Date Completed 18.08.2016 
500 |a Date Revised 23.09.2015 
500 |a published: Print-Electronic 
500 |a Citation Status MEDLINE 
520 |a Despite important recent advances, the vulnerability of biometric systems to spoofing attacks is still an open problem. Spoof attacks occur when impostor users present synthetic biometric samples of a valid user to the biometric system seeking to deceive it. Considering the case of face biometrics, a spoofing attack consists in presenting a fake sample (e.g., photograph, digital video, or even a 3D mask) to the acquisition sensor with the facial information of a valid user. In this paper, we introduce a low cost and software-based method for detecting spoofing attempts in face recognition systems. Our hypothesis is that during acquisition, there will be inevitable artifacts left behind in the recaptured biometric samples allowing us to create a discriminative signature of the video generated by the biometric sensor. To characterize these artifacts, we extract time-spectral feature descriptors from the video, which can be understood as a low-level feature descriptor that gathers temporal and spectral information across the biometric sample and use the visual codebook concept to find mid-level feature descriptors computed from the low-level ones. Such descriptors are more robust for detecting several kinds of attacks than the low-level ones. The experimental results show the effectiveness of the proposed method for detecting different types of attacks in a variety of scenarios and data sets, including photos, videos, and 3D masks 
650 4 |a Journal Article 
650 4 |a Research Support, Non-U.S. Gov't 
700 1 |a Pedrini, Helio  |e verfasserin  |4 aut 
700 1 |a Schwartz, William Robson  |e verfasserin  |4 aut 
700 1 |a Rocha, Anderson  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t IEEE transactions on image processing : a publication of the IEEE Signal Processing Society  |d 1992  |g 24(2015), 12 vom: 15. Dez., Seite 4726-40  |w (DE-627)NLM09821456X  |x 1941-0042  |7 nnns 
773 1 8 |g volume:24  |g year:2015  |g number:12  |g day:15  |g month:12  |g pages:4726-40 
856 4 0 |u http://dx.doi.org/10.1109/TIP.2015.2466088  |3 Volltext 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_NLM 
912 |a GBV_ILN_350 
951 |a AR 
952 |d 24  |j 2015  |e 12  |b 15  |c 12  |h 4726-40