Liveness control in face recognition with deep learning methods
Main Article Content
Abstract
Today, automatic identification of individuals from biometric features is widely used in identification and authentication, security, and monitoring applications. Since facial recognition is a more user-friendly and comfortable method than other biometric methods, it has grown rapidly in recent years. However, most facial recognition systems are vulnerable to spoofing attacks. Therefore, face liveness detection (FLD) methods are of great importance. On the other hand, unlike traditional methods, deep learning techniques promise to significantly increase the accuracy of facial liveness detection systems and eliminate the difficulties of the real-world implementation of these systems. Therefore, in this paper, the application of some deep learning models to detect face liveness is reviewed and compared with each other.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
Adjabi, I., Ouahabi, A., Benzaoui, A., & Taleb-Ahmed, A. (2020). Past, present, and future of face recognition: A review. Electronics, 9(8), 1188. DOI: https://doi.org/10.3390/electronics9081188
Adámek, M., Matýsek, M., & Neumann, P. (2015). Security of biometric systems. Procedia Engineering, 100, 169-176. DOI: https://doi.org/10.1016/j.proeng.2015.01.355
Anand, B., & Shah, P. K. (2016). Face recognition using SURF features and SVM classifier. International Journal of Electronics Engineering Research, 8(1), 1-8.
[] Boulkenafet, Z., Komulainen, J., & Hadid, A. (2016). Face spoofing detection using colour texture analysis. IEEE Transactions on Information Forensics and Security, 11(8), 1818-1830. DOI: https://doi.org/10.1109/TIFS.2016.2555286
Chollet, F. (2018). Keras: The python deep learning library. Astrophysics source code library, ascl: 1806.1022.
Cristianini, N., & Shawe-Taylor, J. (2000). An introduction to support vector machines and other kernel-based learning methods: Cambridge university press. DOI: https://doi.org/10.1017/CBO9780511801389
Fatemifar, S., Arashloo, S. R., Awais, M., & Kittler, J. (2019). Spoofing attack detection by anomaly detection. Paper presented at the ICASSP 2019-2019 IEEE International Conference on Acoustics, [] Speech and Signal Processing (ICASSP). DOI: https://doi.org/10.1109/ICASSP.2019.8682253
Freeman, W. T., & Roth, M. (1995). Orientation histograms for hand gesture recognition. Paper presented at the International workshop on automatic face and gesture recognition.
Galbally, J., Marcel, S., & Fierrez, J. (2014). Biometric antispoofing methods: A survey in face recognition. IEEE Access, 2, 1530-1552. DOI: https://doi.org/10.1109/ACCESS.2014.2381273
He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. Paper presented at the Proceedings of the IEEE conference on computer vision and pattern recognition. DOI: https://doi.org/10.1109/CVPR.2016.90
Howard, A. G., Zhu, M., Chen, B., Kalenichenko, D., Wang, W., Weyand, T., . . . Adam, H. (2017). Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861.
Huang, G., Liu, Z., Van Der Maaten, L., & Weinberger, K. Q. (2017). Densely connected convolutional networks. Paper presented at the Proceedings of the IEEE conference on computer vision and pattern recognition. DOI: https://doi.org/10.1109/CVPR.2017.243
Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2012). Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems, 25.
Ojala, T., Pietikainen, M., & Harwood, D. (1994). Performance evaluation of texture measures with classification based on Kullback discrimination of distributions. Paper presented at the Proceedings of 12th international conference on pattern recognition. DOI: https://doi.org/10.1109/ICPR.1994.576366
Ojansivu, V., & Heikkilä, J. (2008). Blur insensitive texture classification using local phase quantization. Paper presented at the International conference on image and signal processing. DOI: https://doi.org/10.1007/978-3-540-69905-7_27
Olson, D. L., & Delen, D. (2008). Advanced data mining techniques: Springer Science & Business Media.
Sabaghi, A., Oghbaie, M., Hashemifard, K., & Akbari, M. (2021). Deep Learning meets Liveness Detection: Recent Advancements and Challenges. arXiv preprint arXiv:2112.14796.
Silaparasetty, N. (2020). The Tensorflow Machine Learning Library. In Machine Learning Concepts with Python and the Jupyter Notebook Environment (pp. 149-171): Springer. DOI: https://doi.org/10.1007/978-1-4842-5967-2_8
Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556.
Tan, M., & Le, Q. E. (2020). Rethinking model scaling for convolutional neural networks. arXiv 2019. arXiv preprint arXiv:1905.11946.
Vazquez-Fernandez, E., & Gonzalez-Jimenez, D. (2016). Face recognition for authentication on mobile devices. Image and Vision Computing, 55, 31-33. DOI: https://doi.org/10.1016/j.imavis.2016.03.018
Wu, J. (2017). Introduction to convolutional neural networks. National Key Lab for Novel Software Technology. Nanjing University. China, 5(23), 495.
Zhang, K., Zhang, Z., Li, Z., & Qiao, Y. (2016). Joint face detection and alignment using multitask cascaded convolutional networks. IEEE signal processing letters, 23(10), 1499-1503. DOI: https://doi.org/10.1109/LSP.2016.2603342