Advanced search
Start date
Betweenand
(Reference retrieved automatically from Web of Science through information on FAPESP grant and its corresponding number as mentioned in the publication by the authors.)

Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks

Full text
Author(s):
Pinto, Allan [1] ; Schwartz, William Robson [2] ; Pedrini, Helio [1] ; Rocha, Anderson de Rezende [1]
Total Authors: 4
Affiliation:
[1] Univ Estadual Campinas, Inst Comp, BR-13083970 Campinas - Brazil
[2] Univ Fed Minas Gerais, Dept Comp Sci, BR-31270901 Belo Horizonte, MG - Brazil
Total Affiliations: 2
Document type: Journal article
Source: IEEE Transactions on Information Forensics and Security; v. 10, n. 5, p. 1025-1038, MAY 2015.
Web of Science Citations: 27
Abstract

Spoofing attacks or impersonation can be easily accomplished in a facial biometric system wherein users without access privileges attempt to authenticate themselves as valid users, in which an impostor needs only a photograph or a video with facial information of a legitimate user. Even with recent advances in biometrics, information forensics and security, vulnerability of facial biometric systems against spoofing attacks is still an open problem. Even though several methods have been proposed for photo-based spoofing attack detection, attacks performed with videos have been vastly overlooked, which hinders the use of the facial biometric systems in modern applications. In this paper, we present an algorithm for video-based spoofing attack detection through the analysis of global information which is invariant to content, since we discard video contents and analyze content-independent noise signatures present in the video related to the unique acquisition processes. Our approach takes advantage of noise signatures generated by the recaptured video to distinguish between fake and valid access videos. For that, we use the Fourier spectrum followed by the computation of video visual rhythms and the extraction of different characterization methods. For evaluation, we consider the novel unicamp video-attack database, which comprises 17 076 videos composed of real access and spoofing attack videos. In addition, we evaluate the proposed method using the replay-attack database, which contains photo-based and video-based face spoofing attacks. (AU)

FAPESP's process: 11/22749-8 - Challenges in exploratory visualization of multidimensional data: paradigms, scalability and applications
Grantee:Luis Gustavo Nonato
Support Opportunities: Research Projects - Thematic Grants
FAPESP's process: 10/05647-4 - Digital forensics: collection, organization, classification and analysis of digital evidences
Grantee:Anderson de Rezende Rocha
Support Opportunities: Research Grants - Young Investigators Grants