z-logo
open-access-imgOpen Access
3D face mask presentation attack detection based on intrinsic image analysis
Author(s) -
Li Lei,
Xia Zhaoqiang,
Jiang Xiaoyue,
Ma Yupeng,
Roli Fabio,
Feng Xiaoyi
Publication year - 2020
Publication title -
iet biometrics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.434
H-Index - 28
ISSN - 2047-4946
DOI - 10.1049/iet-bmt.2019.0155
Subject(s) - computer science , artificial intelligence , face (sociological concept) , computer vision , convolutional neural network , image (mathematics) , histogram , facial recognition system , reflectivity , pattern recognition (psychology) , presentation (obstetrics) , optics , social science , physics , sociology , radiology , medicine
Face presentation attacks have become a major threat against face recognition systems and many countermeasures have been proposed over the past decade. However, most of them are devoted to 2D face presentation attack detection, rather than 3D face masks. Unlike the real face, the 3D face mask is usually made of resin materials and has a smooth surface, resulting in reflectance differences. Therefore, in this study, the authors propose a novel 3D face mask presentation attack detection method based on analysis of image reflectance. In the proposed method, the face image is first processed with intrinsic image decomposition algorithm to compute its reflectance image. Then, the intensity distribution histograms are extracted from three orthogonal planes to represent the intensity differences of reflectance images between the real face and 3D face mask. After that, given that the reflectance image of a smooth surface is more sensitive to illumination changes, 1D convolutional neural network is used to characterise how different materials or surfaces react differently to illumination changes. Extensive experiments with the public available 3DMAD database demonstrate the effectiveness of the proposed method for distinguishing a face mask from the real one and show that the detection performance outperforms other state‐of‐the‐art methods.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here