O
Orclever
Back to Journal
Research Article Open AccessOrclever Native

Liveness control in face recognition with deep learning methods

Nader Ebrahimpour1,
Mustafa Arda Ayden2,
Banu Altay3
1Papilon Savunma
2Papilon Savunma
3Papilon Savunma
Published:June 7, 2022

Abstract

Today, automatic identification of individuals from biometric features is widely used in identification and authentication, security, and monitoring applications. Since facial recognition is a more user-friendly and comfortable method than other biometric methods, it has grown rapidly in recent years. However, most facial recognition systems are vulnerable to spoofing attacks. Therefore, face liveness detection (FLD) methods are of great importance. On the other hand, unlike traditional methods, deep learning techniques promise to significantly increase the accuracy of facial liveness detection systems and eliminate the difficulties of the real-world implementation of these systems. Therefore, in this paper, the application of some deep learning models to detect face liveness is reviewed and compared with each other.

Keywords
Liveness DetectionFace RecognitionDeep Learning

References

  1. 1.Adjabi, I., Ouahabi, A., Benzaoui, A., & Taleb-Ahmed, A. (2020). Past, present, and future of face recognition: A review. Electronics, 9(8), 1188.
  2. 2.Adámek, M., Matýsek, M., & Neumann, P. (2015). Security of biometric systems. Procedia Engineering, 100, 169-176.
  3. 3.Anand, B., & Shah, P. K. (2016). Face recognition using SURF features and SVM classifier. International Journal of Electronics Engineering Research, 8(1), 1-8.
  4. 4.[] Boulkenafet, Z., Komulainen, J., & Hadid, A. (2016). Face spoofing detection using colour texture analysis. IEEE Transactions on Information Forensics and Security, 11(8), 1818-1830.
  5. 5.Chollet, F. (2018). Keras: The python deep learning library. Astrophysics source code library, ascl: 1806.1022.
  6. 6.Cristianini, N., & Shawe-Taylor, J. (2000). An introduction to support vector machines and other kernel-based learning methods: Cambridge university press.
  7. 7.Fatemifar, S., Arashloo, S. R., Awais, M., & Kittler, J. (2019). Spoofing attack detection by anomaly detection. Paper presented at the ICASSP 2019-2019 IEEE International Conference on Acoustics, [] Speech and Signal Processing (ICASSP).
  8. 8.Freeman, W. T., & Roth, M. (1995). Orientation histograms for hand gesture recognition. Paper presented at the International workshop on automatic face and gesture recognition.
  9. 9.Galbally, J., Marcel, S., & Fierrez, J. (2014). Biometric antispoofing methods: A survey in face recognition. IEEE Access, 2, 1530-1552.
  10. 10.He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. Paper presented at the Proceedings of the IEEE conference on computer vision and pattern recognition.
  11. 11.Howard, A. G., Zhu, M., Chen, B., Kalenichenko, D., Wang, W., Weyand, T., . . . Adam, H. (2017). Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861.
  12. 12.Huang, G., Liu, Z., Van Der Maaten, L., & Weinberger, K. Q. (2017). Densely connected convolutional networks. Paper presented at the Proceedings of the IEEE conference on computer vision and pattern recognition.
  13. 13.Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2012). Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems, 25.
  14. 14.Ojala, T., Pietikainen, M., & Harwood, D. (1994). Performance evaluation of texture measures with classification based on Kullback discrimination of distributions. Paper presented at the Proceedings of 12th international conference on pattern recognition.
  15. 15.Ojansivu, V., & Heikkilä, J. (2008). Blur insensitive texture classification using local phase quantization. Paper presented at the International conference on image and signal processing.
  16. 16.Olson, D. L., & Delen, D. (2008). Advanced data mining techniques: Springer Science & Business Media.
  17. 17.Sabaghi, A., Oghbaie, M., Hashemifard, K., & Akbari, M. (2021). Deep Learning meets Liveness Detection: Recent Advancements and Challenges. arXiv preprint arXiv:2112.14796.
  18. 18.Silaparasetty, N. (2020). The Tensorflow Machine Learning Library. In Machine Learning Concepts with Python and the Jupyter Notebook Environment (pp. 149-171): Springer.
  19. 19.Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556.
  20. 20.Tan, M., & Le, Q. E. (2020). Rethinking model scaling for convolutional neural networks. arXiv 2019. arXiv preprint arXiv:1905.11946.
  21. 21.Vazquez-Fernandez, E., & Gonzalez-Jimenez, D. (2016). Face recognition for authentication on mobile devices. Image and Vision Computing, 55, 31-33.
  22. 22.Wu, J. (2017). Introduction to convolutional neural networks. National Key Lab for Novel Software Technology. Nanjing University. China, 5(23), 495.
  23. 23.Zhang, K., Zhang, Z., Li, Z., & Qiao, Y. (2016). Joint face detection and alignment using multitask cascaded convolutional networks. IEEE signal processing letters, 23(10), 1499-1503.
Download PDF
Cite This Article
Ebrahimpour, N., Ayden, M. A., Altay, B. (2022). Liveness control in face recognition with deep learning methods. *The European Journal of Research and Development*, 2(2), 92 - 101. https://doi.org/10.56038/ejrnd.v2i2.36

Bibliographic Info

JournalThe European Journal of Research and Development
Volume2
Issue2
Pages92–101
PublishedJune 7, 2022
eISSN2822-2296