You are on page 1of 4

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)

ISSN-2455-099X,
Volume 4, Issue 8 August, 2018

Research Paper -Novel Approach for Face Spoof Detection


Using Classification Technique
1
Rupinder Kaur Gurm, 2Neha Dhariwal
1
Asst. Professor, 2Mtech Scholar
1,2
Department of Computer Science
1,2
RIMT University, Mandi Gobindgarh
Abstract: In order to classify the spoofed as well as non-spoofed faces from images, the face spoof detection technique has been proposed.
In order to analyze the textual features present within a test image, the DWT algorithm is applied. Due to the effectiveness, non-
parametric as well as ease of implementation, there are numerous applications that have been utilizing this method. However, the time
that is utilized for classification is longer and the optimal value of k is difficult to be calculated. On the basis of data, the value of k is
generated here. The effect of noise present on classification is minimized by larger values of k. However, there is less distinct boundary
generated amongst the classes. The traditional KNN mechanism is enhanced by using several K-values of various classes in order to
overcome such drawbacks. The WKNN mechanism is utilized in order to enhance the performance of KNN. In order to analyze the

RG
proposed approach, comparisons are made amongst the proposed and existing mechanisms in terms of accuracy and execution time.
Keywords: Face spoof, KNN, SVM

I. INTRODUCTION chromaticity, and shading diversity are considered in order


Within several mobile technologies, the major issue that to identify the image distortion within the face spoof images.
arises while accessing information is the security of private On the basis of distance or similarity function for pairs of
data. In order to provide authentication to users, passwords observations the case-based learning algorithm generated is
have been used since many years so that no external user can known as KNN classifier [5]. Due to the effectiveness, non-
access the data. However, the effectiveness of the passwords parametric as well as ease of implementation, there are
.O
can be compromised due to several usability and security numerous applications that have been utilizing this method.
concerns [1]. The passwords generated by users are used However, the time that is utilized for classification is longer
sometimes on other accounts and services as well. Due to this and the optimal value of k is difficult to be calculated. On the
reason it is easy to crack or get access to the passwords. The basis of data, the value of k is generated here. The effect of
proper utilization and maintenance of systems becomes noise present on classification is minimized by larger values
difficult due to the higher numbers of accounts and of k. A module classified generated within the priori
passwords involved. Thus, the stolen accounts and probability as well as the class conditional probability is
TC

passwords are often found in news and reports. As the mobile known as Naïve bias classier. The probability that a
devices are easy to be lost or stolen, this problem mainly document D belongs to class C is calculated in this method.
arises within them. However, there are many new The multivariate Bernoulli as well as multinomial model is
authentication options provided within these mobile devices the two event models present for Naïve bias. When the
which are now helping in increasing the levels of security for database is huge, one of these multinomial models is more
users [2].There is a need to make choice related to limited suitable. In order to perform text classification, a decision
number of frames when the real-time response of face spoof tree is used in which the terms are labeled through the
detection is to be applied within the mobile applications. In internal nodes of the tree, the test on weight is labeled
order to differentiate amongst genuine and spoof faces on the through the branches that are being generated from the tree
and the relevant class labels are denoted by the leaf node [6].
IJ

basis of solitary casing, discriminative features that are


appropriate are to be designed here [3]. For instance, a By running through the query structure from the root until it
scenario is presented in which a genuine or a spoof face is reaches to specific leaf, a document is classified through a
presented to a camera in order to generate scenario for tree. In order to perform text classification, another approach
comparing images. The shape as well as the properties of proposed is known as Support vector machine (SVM)
facial surface present before the camera are the two major method. Both positive as well as negative training sets that
differences found amongst genuine and spoof face images. are uncommon for other classification techniques are
Within both genuine as well as spoof faces, the distortion required within SVM.
identification mechanism can be applied. In order to conceal II. LITERATURE REVIEW
the intermittence of spoof medium casing, the closer
difference is identified and captured due to which the spoofed Alireza Sepas-Moghaddam, et.al (2018) presented in this
faces are highly vulnerable to such distortion [4]. Within both paper that there is a huge increase in demand of the face
printed image and replayed video attacks for example, the recognition systems. However, there are several spoofing
commonly observed factor is the defocused blurriness. attacks also identified within these applications [7]. A novel
Amongst several problems arising within image processing, approach is proposed here which is known as the IST Lenslet
image distortion is a major issue. As per the illumination and Light Field Face Spoofing Database (IST LLFFSD) in order
quality of camera, there is difference in distortion. The four to detect face spoofing attacks. On the basis of compact
features which are specular reflection, blurriness, however effective descriptor that exploits the color and

IJTC201808001 www. ijtc.org 115


INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)
ISSN-2455-099X,
Volume 4, Issue 8 August, 2018
texture variations that are related to several directions of light that in comparison to other existing approaches, the proposed
that is capture within light field images, a novel spoofing technique performed better. In comparison to other
attack detection solution is proposed by this study. In order approaches that integrate huge amount of handcrafter
to evaluate the performance of proposed mechanism, several information for identifying the attacks, the proposed
experimental simulations have been performed and it is seen approaches have provided efficient results. Thus, the deep
that the face spoofing attack types can be identified texture features are concluded to be rich sources of
successfully through this proposed mechanism. information in order to perform face spoof detection as per
these outcomes. A suitable and robust alternative is thus
Shervin Rahimzadeh Arashloo, et.al (2017) presented in
introduced as an alternative for preventing spoofing attacks
this paper that along with the small sample size within the
by integrating the LPB descriptor with the deep learning
face spoofing issue, the issues of imaging sensor inter-
architecture.
operability and other environment factors might arise due to
the presence of spoofing attackers within the systems [8]. Yaman AKBULUT, et.al (2017) proposed a deep learning-
Thus, several propositions have been proposed in order to based face spoof detection mechanism on the basis of (LRF)-
solve these issues. On the basis of anomaly detection ELM and CNN which are two different deep learning models
concept, a novel and more realistic spoof detection [12]. Before the completely connected layer, a convolution
mechanism is formulated here in this paper. In order to and pooling layer is generated within the LRF-ELM model.
handle the unseen attack types, a new evaluation protocol has Due to this enhancement, the speed of processing within the

RG
also been proposed here. Towards the end, using common model becomes faster. The proposed approach is evaluated
spatio-temporal and image quality features, a detailed by several simulations performed on two face spoof detection
evaluation as well as comparison of 20 several types of one- databases which are NUAA and CASIA. Several results
class and two-class systems was performed. The anomaly- achieved were compared with the already existing
based formulation performed better in comparison to the approaches.
conventional two-class approach as per the results achieved
III. RESEARCH METHODOLOGY
through simulations.
The face spoof detection has been widely utilized nowadays
Muhammad Asim, et.al (2017) proposed in this paper a
for the detection of face spoofing information due to which
novel anti-spoofing technique on the basis of spatio-temporal
unauthorized access is prevented in the bio-matrix system.
information [9]. Here, the legitimate access and the impostor
.O
Earlier, the detection of face spoofing was done using SVM
videos also known as video sequences for the image attacks
classification technique. The DWT algorithm was utilized for
were differentiate through this method. In order to perform
the analysis of textual features of the test image for the
feature extraction and train the classifier, the convolutional
detection of face spoofing in the existing systems. In the
neural network (CNN) was used along with the handcrafter
classification, textural features act like the training set. The
technique such as LBP-TOP. The preprocessing steps like
obtained result from the SVM classification distinguishes the
face detection and refining face regions or enlargement of the
test image whether it is a spoofed or non-spoofed face. In the
original images using specific rescaling ratios is not required
detection process, the accuracy of SVM classification is
TC

within this proposed approach. Upon two very challenging


reduced in some cases as there is similarity between the
datasets that are CASIA and REPLAY-ATTACK, extensive
textual features of the spoofed image and to the original
experiments are performed. As per the simulation results,
image. For the classification of face spoofing, KNN classifier
very high competitive results have been achieved and it is
has been utilized in this work. The training samples are
seen that the proposed scheme outperforms existing
represented by n dimensional numeric attributes in the KNN
approaches.
classifier. A point in an n-dimensional space is represented
Xudong Sun, et.al (2016) proposed near-infrared by every sample. In the n-dimensional pattern space, the
differential (NIRD) images using the controllable active greater part of the training samples is stored. In case an
near-infrared (NIR) lights [10]. In order to perform spoofing unknown sample is given, the k-nearest neighbor classifier
IJ

detection, there are two major characteristics presented match with the k training samples and choose that pattern
depending on the NIRD images. Initially, it is obvious that space which is closest to the unknown sample. Euclidean
there is spoofing media present around the faces due to which distance defined the term “closeness”. Nearest neighbor
the incident lights are reflected in the similar manner as the classifiers assigned break even with weight to every attribute
areas of face reflect. The pixel consistency amongst the face unlike the decision tree. But this condition leads to confusion
as well as non-face regions is analyzed and in order to when large amount of irrelevant attributes are present within
identify the spoofing images, the context clues are employed. the data. For the prediction purpose, nearest neighbor
A face spoofing detection mechanism is proposed here in classifiers has been utilized in order to present a genuine
order to merge the two features mentioned. As per the valued prediction for a given unknown sample. In this case,
experiments conducted and simulation results achieved it is the average value of the genuine valued associated with the
seen that the proposed mechanism provides accurate and k nearest neighbors of the unknown sample is given back by
robust results. the classifier. In the machine learning algorithm, the k-
nearest neighbors' algorithm is considered as the simplest
Gustavo Botelho de Souza, et.al (2017) proposed two LBP-
method among all. The DWT algorithm will be utilized for
based Convolutional Neural Networks which are namely
the analysis of features associated with a test image. KNN
LBPnet and n-LBPnet within the face recognition systems in
classifier will be applied on the detected features in order to
order to detect spoofing [11]. Upon the NUAA spoofing
classify whether the face is spoofed or non-spoofed.
dataset, efficient results have been presented which showed

IJTC201808001 www. ijtc.org 116


INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)
ISSN-2455-099X,
Volume 4, Issue 8 August, 2018

Accuracy Comparision
120

percentage of accuracy ->


100
80
60
SVM
40
20 KNN
0
1 2 3 4 5 6 7 8 9 10
Image Number ->

Figure 3: Accuracy Comparison


As shown in figure 3, comparisons are made amongst the

RG
proposed KNN approach and SVM based face spoof
detection approach in terms of accuracy. As per the analysis,
it is seen that the accuracy if proposed KNN approach has
accuracy for face spoof detection than previous approach.
V. CONCLUSION AND FUTURE SCOPE
In order to identify the spoofed faces that are added due to
unauthorized access to the data, the face spoof technique is
proposed. In order to identify the textual features from input
image, the DWT technique is utilized. For the classification
.O
of spoofed as well as non-spoofed faces, the already existing
SVM classified is applied. As per the results achieved it is
seen that the approximate equal classifiers can be classified
Figure 1: Proposed Flowchart by applying KNN classifier for performing classification in
this proposed work. With respect to accuracy as well as
execution time, the analysis of results has been done. As per
IV. EXPERIMENTAL RESULTS the results achieved it is seen that there is increase in
TC

As shown in figure 2, comparisons are made amongst the accuracy as well as decrease in execution time through the
proposed KNN classification approach as well as the already application of novel approach in the proposed work.
existing SVM classification approach in terms of the A. Future Scope
execution time. As per the results achieved it is seen that in
comparison to SVM classification approach, there is Following are the various future prospective of this research
minimization of execution time within the KNN work:
classification approach. 1. The proposed algorithm can be further compared with the
other various face spoof detection algorithms.
Execution Time
IJ

2. The proposed algorithm can be further improved for the


video spoof detection.
2
REFERENCES
time in seconds->

1.5
[1]. A. Bashashati, M. Fatourechi, R. K. Ward, and G. E.
1
SVM Birch, “A survey of signal processing algorithms in
0.5 brainccomputer interfaces based on electrical brain
0 KNN signals,” 2007, Journal of Neural Engineering, vol. 4,
11 12 13 14 15 16 17 18 19 20 no. 2, pp. R32–R57
[2]. C. Hou, F. Nie, C. Zhang, D. Yi, and Y. Wu, “Multiple
Number of Images ->
rank multi-linear SVM for matrix data classification,”
2014, Pattern Recognition, vol. 47, no. 1, pp. 454 –
Figure 2: Execution Time 469
[3]. Y. Lin, F. Lv, S. Zhu, M. Yang, T. Cour, K. Yu, L.
Cao, and T. Huang,“ Large-scale image classification:
Fast feature extraction and svm training,” 2011, IEEE
CVPR, June pp. 1689–1696

IJTC201808001 www. ijtc.org 117


INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)
ISSN-2455-099X,
Volume 4, Issue 8 August, 2018
[4]. C.-C. Chang and C.-J. Lin, “LIBSVM: A library for
support vector machines,” 2011, ACM Trans. Intell.
Syst. Technol., vol. 2, no. 3, pp. 27:1–27
[5]. S. Bharadwaj, T. I. Dhamecha, M. Vatsa, and R.
Singh, “Computationally efficient face spoofing
detection with motion magnification,” in Proc. CVPR
Workshops, 2013, pp. 105–110.
[6]. J. Komulainen, A. Hadid, and M. Pietik¨ainen,
“Context based Face Anti- Spoofing,” in Proc. BTAS,
2013, pp. 1–8
[7]. Alireza Sepas-Moghaddam, Luis Malhadas, Paulo
Lobato Correia, Fernando Pereira, “Face spoofing
detection using a light field imaging framework”,
2018, IET Biometrics, 2018, Vol. 7 Iss. 1, pp. 39-48
[8]. Shervin Rahimzadeh Arashloo, Josef Kittler, “An
Anomaly Detection Approach to Face Spoofing
Detection: A New Formulation and Evaluation
Protocol”, 2017, IEEE

RG
[9]. Muhammad Asim, Zhu Ming, Muhammad Yaqoob
Javed, “CNN Based Spatio-temporal Feature
Extraction for Face Anti-spoofing”, 2017 2nd
International Conference on Image, Vision and
Computing
[10]. Xudong Sun, Lei Huang and Changping Liu, “Context
Based Face Spoofing Detection Using Active Near-
Infrared Images”, 2016 23rd International Conference
on Pattern Recognition (ICPR)
[11]. Gustavo Botelho de Souza, Daniel Felipe da Silva
.O
Santos, Rafael Gonçalves Pires, Aparecido Nilceu
Marana, and João Paulo Papa, “Deep Texture Features
for Robust Face Spoofing Detection”, 2017, IEEE
TRANSACTIONS ON CIRCUITS AND
SYSTEMS—II: EXPRESS BRIEFS, VOL. 64, NO.
12
[12]. Yaman AKBULUT, Abdulkadir SENGÜR, Ümit
TC

BUDAK, Sami EKICI, “Deep Learning based Face


Liveness Detection in Videos”, 2017, IEEE.
IJ

IJTC201808001 www. ijtc.org 118

You might also like