Cargando…

Face Presentation Attack Detection Using Deep Background Subtraction

Currently, face recognition technology is the most widely used method for verifying an individual’s identity. Nevertheless, it has increased in popularity, raising concerns about face presentation attacks, in which a photo or video of an authorized person’s face is used to obtain access to services....

Descripción completa

Detalles Bibliográficos
Autores principales: Benlamoudi, Azeddine, Bekhouche, Salah Eddine, Korichi, Maarouf, Bensid, Khaled, Ouahabi, Abdeldjalil, Hadid, Abdenour, Taleb-Ahmed, Abdelmalik
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9146538/
https://www.ncbi.nlm.nih.gov/pubmed/35632169
http://dx.doi.org/10.3390/s22103760
_version_ 1784716587862851584
author Benlamoudi, Azeddine
Bekhouche, Salah Eddine
Korichi, Maarouf
Bensid, Khaled
Ouahabi, Abdeldjalil
Hadid, Abdenour
Taleb-Ahmed, Abdelmalik
author_facet Benlamoudi, Azeddine
Bekhouche, Salah Eddine
Korichi, Maarouf
Bensid, Khaled
Ouahabi, Abdeldjalil
Hadid, Abdenour
Taleb-Ahmed, Abdelmalik
author_sort Benlamoudi, Azeddine
collection PubMed
description Currently, face recognition technology is the most widely used method for verifying an individual’s identity. Nevertheless, it has increased in popularity, raising concerns about face presentation attacks, in which a photo or video of an authorized person’s face is used to obtain access to services. Based on a combination of background subtraction (BS) and convolutional neural network(s) (CNN), as well as an ensemble of classifiers, we propose an efficient and more robust face presentation attack detection algorithm. This algorithm includes a fully connected (FC) classifier with a majority vote (MV) algorithm, which uses different face presentation attack instruments (e.g., printed photo and replayed video). By including a majority vote to determine whether the input video is genuine or not, the proposed method significantly enhances the performance of the face anti-spoofing (FAS) system. For evaluation, we considered the MSU MFSD, REPLAY-ATTACK, and CASIA-FASD databases. The obtained results are very interesting and are much better than those obtained by state-of-the-art methods. For instance, on the REPLAY-ATTACK database, we were able to attain a half-total error rate (HTER) of 0.62% and an equal error rate (EER) of 0.58%. We attained an EER of 0% on both the CASIA-FASD and the MSU MFSD databases.
format Online
Article
Text
id pubmed-9146538
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-91465382022-05-29 Face Presentation Attack Detection Using Deep Background Subtraction Benlamoudi, Azeddine Bekhouche, Salah Eddine Korichi, Maarouf Bensid, Khaled Ouahabi, Abdeldjalil Hadid, Abdenour Taleb-Ahmed, Abdelmalik Sensors (Basel) Article Currently, face recognition technology is the most widely used method for verifying an individual’s identity. Nevertheless, it has increased in popularity, raising concerns about face presentation attacks, in which a photo or video of an authorized person’s face is used to obtain access to services. Based on a combination of background subtraction (BS) and convolutional neural network(s) (CNN), as well as an ensemble of classifiers, we propose an efficient and more robust face presentation attack detection algorithm. This algorithm includes a fully connected (FC) classifier with a majority vote (MV) algorithm, which uses different face presentation attack instruments (e.g., printed photo and replayed video). By including a majority vote to determine whether the input video is genuine or not, the proposed method significantly enhances the performance of the face anti-spoofing (FAS) system. For evaluation, we considered the MSU MFSD, REPLAY-ATTACK, and CASIA-FASD databases. The obtained results are very interesting and are much better than those obtained by state-of-the-art methods. For instance, on the REPLAY-ATTACK database, we were able to attain a half-total error rate (HTER) of 0.62% and an equal error rate (EER) of 0.58%. We attained an EER of 0% on both the CASIA-FASD and the MSU MFSD databases. MDPI 2022-05-15 /pmc/articles/PMC9146538/ /pubmed/35632169 http://dx.doi.org/10.3390/s22103760 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Benlamoudi, Azeddine
Bekhouche, Salah Eddine
Korichi, Maarouf
Bensid, Khaled
Ouahabi, Abdeldjalil
Hadid, Abdenour
Taleb-Ahmed, Abdelmalik
Face Presentation Attack Detection Using Deep Background Subtraction
title Face Presentation Attack Detection Using Deep Background Subtraction
title_full Face Presentation Attack Detection Using Deep Background Subtraction
title_fullStr Face Presentation Attack Detection Using Deep Background Subtraction
title_full_unstemmed Face Presentation Attack Detection Using Deep Background Subtraction
title_short Face Presentation Attack Detection Using Deep Background Subtraction
title_sort face presentation attack detection using deep background subtraction
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9146538/
https://www.ncbi.nlm.nih.gov/pubmed/35632169
http://dx.doi.org/10.3390/s22103760
work_keys_str_mv AT benlamoudiazeddine facepresentationattackdetectionusingdeepbackgroundsubtraction
AT bekhouchesalaheddine facepresentationattackdetectionusingdeepbackgroundsubtraction
AT korichimaarouf facepresentationattackdetectionusingdeepbackgroundsubtraction
AT bensidkhaled facepresentationattackdetectionusingdeepbackgroundsubtraction
AT ouahabiabdeldjalil facepresentationattackdetectionusingdeepbackgroundsubtraction
AT hadidabdenour facepresentationattackdetectionusingdeepbackgroundsubtraction
AT talebahmedabdelmalik facepresentationattackdetectionusingdeepbackgroundsubtraction