Next Article in Journal
Long-Term Activity Recognition from Wristwatch Accelerometer Data
Previous Article in Journal
RESTful M2M Gateway for Remote Wireless Monitoring for District Central Heating Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Face Liveness Detection Using a Light Field Camera

Department of Electrical and Electronic Engineering, Yonsei University, 134 Shinchon-Dong, Seodaemun-Gu, Seoul 120-749, Korea
*
Author to whom correspondence should be addressed.
Sensors 2014, 14(12), 22471-22499; https://doi.org/10.3390/s141222471
Submission received: 2 June 2014 / Revised: 4 November 2014 / Accepted: 14 November 2014 / Published: 27 November 2014
(This article belongs to the Section Physical Sensors)

Abstract

: A light field camera is a sensor that can record the directions as well as the colors of incident rays. This camera is widely utilized from 3D reconstruction to face and iris recognition. In this paper, we suggest a novel approach for defending spoofing face attacks, like printed 2D facial photos (hereinafter 2D photos) and HD tablet images, using the light field camera. By viewing the raw light field photograph from a different standpoint, we extract two special features which cannot be obtained from the conventional camera. To verify the performance, we compose light field photograph databases and conduct experiments. Our proposed method achieves at least 94.78% accuracy or up to 99.36% accuracy under different types of spoofing attacks.

1. Introduction

The face has been replacing personal identification number (PIN) codes and pattern locks due to its prominent features for human identification [1,2]. There is no risk of losing the face and there is no need to memorize passwords. For all those reasons, industries have applied face recognition technologies [3,4] to security systems in order to make those systems more convenient and stronger.

However, trials to invade security systems and duplicate personal information have occurred. Intruders abuse the weakness that machines cannot distinguish whether an input face is real or not. Current face lock technologies, indeed, cannot detect forged faces. This phenomenon shows the fatal error of the face recognition system. For this reason, technological defense against spoofing attacks is necessary to protect personal systems and users’ private data.

A lot of studies have been conducted to develop anti-spoofing technologies using visual cameras [532]. However, tools and skills for disguising identities also have been gradually evolved. To make defense systems stronger, researchers have considered using extra sensors as well as the visual camera. Thermal and near infrared sensors are some representative examples [14,33,34]. They can solve the vulnerability, but they do not have merits in terms of cost and commercialization. In order to satisfy these conditions, a novel method is proposed for detecting spoofing faces with a special sensor, light field camera.

The light field camera, developed by Lippmann in 1908 and evolved by Adelson and Wang [35], is a camera sensor that overcomes the limitations of the conventional camera. While the conventional camera outputs an image by summing all the lights falling into each pixel, the light field camera can record the direction as well as the color with the intensity of incident rays. In order that the light field camera saves the directions of the incident rays, a microlens array is embedded in front of the photosensor. Each microlens separates the light, and the direction and the intensity of the split light are recorded in pixels of the photosensor. Recently, commercial (or hand-held) light field cameras, such as Lytro [36] and Raytrix [37], are available in the market, and a camera array module that takes light field photographs in a mobile phone has been developed [38]. As a result, the light field camera is being applied in various research fields. Levoy [39] suggested a new method for generating 3D views from a light field. Kim [40] applied 3D light fields to reconstruct complex scenes in detail. With enough information of light fields, it is possible to reconstruct 3D scenes and produce super-resolution images [41,42]. Meanwhile, the light field camera is used for biometrics. Raghavendra et al. [4346] showed the strength of the light field camera for face and iris recogntion. For multiple face recognition [44], they used depth images extracted from the light field. Also, in [46], they employed multiple focus images for iris recognition. Likewise, refocusing technology, the main characteristic of the light field photograph, is fully utilized to recognize biometric traits. However, in this paper, we will analyze the raw light field photograph microscopically and apply it to detect spoofing faces.

Raw light field photograph is composed of a lot of small images called as microlens images. Depending on the location of the focal plane, microlens images represent different light distributions. This helps to estimate the existence of depth in the input image. In this paper, by analyzing the properties of the raw light field photograph, we introduce new feature descriptors extracted from the raw light field photograph. In addition, an anti-spoofing face method is proposed applying new feature descriptors. To evaluate our method, we create databases using the light field camera and measure error rates in experimentation section.

The remainder of this paper is organized as follows. In Section 2, we introduce research about face liveness detection. Moreover, the light field photograph and its characteristics are mentioned. Our proposed method and the new features are stated in Section 3. In Section 4, the composition of databases and measures for evaluation are explained, and experimental results are shown. Finally, concluding remarks are provided in Section 5.

2. Backgrounds

2.1. Face Liveness Detection

Face liveness detection (or face spoofing detection) is a process to determine whether a detected face is real or not before a face recognition system identifies the face, as illustrated in Figure 1. It prevents the face recognition system from making a wrong decision. There are several types of spoofing faces, such as 2D printed photos, videos, high-definition (HD) tablets, 3D masks, and so on. Among them, 2D photos are used widely because they are easy and cheap to obtain. To minimize the vulnerability against 2D attacks, researchers have shown steady progress in developing anti-spoofing technologies based on features of 2D photos [5]. There are some characteristics in recaptured 2D photos. First, detailed components and sharpness are lost. In this case, researchers analyze texture and frequency components in the input data. In order to represent the textural feature, local binary patterns (LBP) are often used [6,7]. On the other hand, some methods detect high frequency components and look into power spectrum [6,812]. Although feature domains are different, those studies approach to the solution in terms of texture. Second, there is a difference in light distributions on a face. This approach focuses on skin reflectance of real and fake faces. Tan et al. [13] and Zhang et al. [14] utilize a Lambertian model to pull out the information for finding fake faces. Bai et al. [15] calculate specularity components from the input data. Huang et al. [16] perceive the change of artificial shadows on a face. Third, 2D spoofing faces have little motion, compared to real faces. Signs of liveness are perceived in image sequences of real faces, but not in those of fake faces. This can be a clue to distinguish motionless fake faces. Several research papers [1719] concentrate on eye blink and movement. In addition, facial movements are helpful to analyze the differences between real and fake faces [2024]. Komulainen et al. [29] suggest a countermeasure with the fusion of motion and micro-texture analysis methods. The last approach is based on 3D facial information. The obvious difference between a real face and a 2D photo is the presence or absence of depth information. Researchers have classified spoofing attacks by considering the depth feature. Lagorio et al. [25] and Wang et al. [26] present a solution based on 3D facial shape analysis. Kim et al. [27] propose a method using a difference between degrees of variable focusing.

Even though a lot of studies have been increasingly developed to protect facial security systems against spoofing attacks, tools and skills for disguising identities have been gradually evolved. In particular, masks and camouflages make it difficult to classify faces using above approaches. To tackle these problems, researchers have considered using extra sensors as well as a visual camera. There are typical studies using thermal and near infrared sensors. Zhang et al. [14] propose a method that measures the reflectance of skin using near infrared sensors. Sun et al. [33] show a thermal IR and visible light correlation system with a thermal infrared sensor. Kant et al. [34] present a real-time solution using a thermal image and skin elasticity of a human face. These suggestions can resolve the vulnerability, but they do not have merits in terms of cost and commercialization because of the usage of extra sensors. In order to exceed the limit, in this paper, we propose a novel method using a specific sensor, light field camera.

2.2. Light Field Photograph

As mentioned in Section 1, the light field camera is a sensor that can record information from incident light rays. The information of the light contains not only the intensity and color, but also the directions of the light rays. In this paper, we use a Lytro camera to capture the light field. A Lytro camera is the first consumer light field camera developed by R.Ng [36]. This camera makes it possible that users capture the light field at anytime and anywhere. In addition, users can import the light field from the camera into a computer and export light field photographs from the imported light field, using a software provided by Lytro Inc. [36]. The imported data is a LFP (Light Field Picture) file. LFP is a picture format that contains the captured light field. Each LFP file records 11 Megarays, but it is impossible to view and access to the file directly because it is 4D data. In order to visualize the 4D light field, we project the light field onto a 2D image. Lytro software makes it possible to view the light field image, but it has a limitation to access into the internal information of the light field data. Therefore, we use the open source (LFP reader program [47]) and the tool box (Light Field Toolbox for MATLAB [48]). By running the LFP reader program, we can obtain raw images (.RAW) and their associated metadata (.JSON). In order to analyze those data in MATLAB, we decode them using Light Field Toolbox. This tool box is introduced for the Lytro camera. With the Light Field Toolbox, the light field (LF) can be extracted. LF is a 5D array and its size is 9 × 9 × 380 × 380 × 4. The angular resolution of the Lytro camera is 9, and the spatial resolution is 380. Four is both the size of values of R, G, B color channels and the weight which represents the confidence associated with each pixel. Figure 2 is the result of decoding the original light field data. This image is called as raw light field photograph. Figure 3a shows the expansion of the raw light field photograph. As described in Figure 3, the raw light field photograph is composed of a lot of small circle images. These small images are called microlens images [49]. Figure 3b is one of the microlens images. Each microlens image shows the incident light ray that leaves from different positions and arrives at the photosensor through the microlens array. We will mention this image in detail in the following subsection.

2.2.1. Two Views of Raw Light Field Photograph

Raw light field photographs have enough information about incident rays. In the following, we analyze two visualized images and their characteristics.

Microlens Image

Photosensor pixels are assigned to each microlens and form a small image. This image is referred to as the microlens image [49]. In the raw light field photograph, there are as many microlens images as the number of microlenses. For example, if the microlens array consists of 100 microlenses, there are 100 microlens images in the light field photograph. Each microlens image shows the incident light ray that leaves from different positions and arrives at the photosensor through the microlens array. There is a notable property in the microlens image. According to [50], microlenses at the focal plane have constant values in color because every incident ray originates from the same point on the focused subject. However, if the subject is not in focus, microlens images do not have constant values. When the microlenses are further than the focal plane, the light distributions inside the microlens images are inverted. The reason why this phenomenon happens is that the incident rays are inverted as they pass through the focal plane. More details are explained in [50].

Figure 4 is our own sample of magnified views of Figure 2. The focal plane of the original light field photograph lies on the nose tip. Figure 4a is a region of the left ear and chin, and Figure 4b is the macroscopic image of Figure 4a. Figure 4e is the microlens image that lies on the edge of the ear, and Figure 4d illustrates adjacent microlenses of the microlens Figure 4e. Microlenses on the edge of the ear are farther than the focal plane. Therefore, the inversion of the incident rays occurs. The light distribution inside Figure 4e is opposite to the light distribution of the macroscopic image in Figure 4b. Depending on the location of the focal plane, microlenses can have different features. In this paper, we extract a feature descriptor based on this characteristic of the microlens image. We will mention it minutely in Section 3.1.1.

Sub-Aperture Image

Sub-aperture images [49] are made by reordering incident rays in the raw light field photograph. Figure 5 illustrates the process of making a sub-aperture image. Each sub-aperture image is composed of the pixels of same position selected from each microlens image. According to the location of the pixel, multiview sub-aperture images can be obtained and have different information of incident rays respectively. The conventional photograph is equal to the integration of all sub-aperture images, summing all the incident light.

3. Proposed Methodology

In this section, we propose a method for face liveness detection by analyzing characteristics of the raw light field photograph. We suggest two feature descriptors extracted only from the light field photograph. In the following subsections, we will explain the processes of extracting features and classifying spoofing faces.

3.1. Feature Extraction

To detect fake faces, we propose two types of feature descriptors, edge and ray difference features. Edge feature is extracted from microlens images located on the edge of the lower jaw, and ray difference feature is from the difference between sub-aperture images. Details are explained in the following subsections.

3.1.1. Edge Feature

Edge feature is based on the characteristic of the microlens image. As mentioned in the previous section, microlens images have different distributions of lights, according to whether the corresponding area is on the focal plane or not. We focus on this property to classify real and fake faces. Real faces have a depth gap between the nose and ear areas. However, fake faces, such as 2D flat photos and warped photos, have relatively little difference between the depths of the nose and the ear. This feature is checked in the microlens images of the raw light field photographs. Figure 6a,d are raw light field photographs of real and fake faces. The focal planes of those pictures are on the nose. Figure 6b,e are microlens images near the chin, and Figure 6c,f are the examples of microlens images corresponding to the chin of the real and fake faces respectively. The microlens image of the real face (Figure 6c) is not full of lighting rays and has a gradational variation of pixel values as if there is a short edge. However, the microlens image of the fake face (Figure 6f) has randomly uniform distribution. Likewise, we can make it clear to distinguish real and fake faces by inspecting microlens images.

The light field photograph is composed of many microlens images. Through the procedure of decoding the light field [36,47,48], 144,400 (= 380 × 380) microlens images are obtained. The quantities of microlens images are so large that we cannot analyze all of them. Therefore, we pick out microlens images on the edge of the lower jaw and extract an edge feature from the selected microlens images.

In order to detect edges, we make a sub-aperture image using a center pixel in microlens images. Figure 7a,c are sub-aperture images of real and fake faces respectively. For vertical edge detection, a sobel filter is applied to the green and blue channel images whose noises are smaller than the noises in the red channel image. In Figure 7b,d are vertical edges of real and fake faces. Among extracted edges, there are irrelevant edges which may cause confusion in distinguishing fake faces. In order to filter unnecessary edges out, a semicircular mask is adopted to detected edges. Figure 8 shows results of masked edges of real and fake faces. Afterwards, we arrange microlens images corresponding to the selected edges. Through this process, we can choose microlens images which must be analyzed.

As mentioned in the previous section, there is a change in light distributions of the microlens image located at the defocused edge. In order to inspect the lighting variation, we may calculate variances of microlens images. However, the variance of the entire microlens image is not a distinguishable feature. Figure 9 shows an example. There are two microlens images. Both Figure 9a,b have the same pixel values. However, Figure 9a is clearly divided into two regions, while Figure 9b has a random distribution of pixel values. Both variances of those images are same, but the appearances of them are different. Therefore, the variance of the entire area cannot become a criterion to discriminate various light distributions in microlens images. To solve this problem, we analyze the microlens image locally adopting a local binary pattern (LBP) [51,52].

We compute two types of binary patterns, inner binary pattern (BPin) and outer binary pattern (BPout). Inner binary pattern is extracted from the inside of the microlens image, and outer binary pattern is from the surrounding microlens images.

Inner binary pattern

Figure 10a describes the process of computing the inner binary pattern (BPin). The microlens image is split into 9 subregions, allowing the overlap between subregions. Although the size of the microlens image is 9 × 9, we use 7 × 7 region which is less sensitive to the lighting variation. Bc is a center subregion and Bi(i = 1, …, 8) are adjacent subregions. Each subregion is a 3 × 3 block, and we compute the average value of the subregion. minc is the average value of the center subregion, and mini(i = 1, …, 8) are those of the adjacent subregions. By the comparison of averages, a bit stream is yielded. If mini is larger than minc, the bit of the corresponding subregion, bini, is 1. Otherwise, the bit is 0. Each microlens image has one bit stream, and each bit stream is composed of 8 bits. Equation (1) explains how to make the inner binary pattern. px means an intensity of each pixel. Figure 10b is an example of the inner binary pattern of the microlens image.

b i n i = { 1 if m i n i > m i n c 0 if m i n i m i n c m i n i = 1 3 × 3 p x B i p x B P i n = [ b i n 8 b i n 7 b i n 1 ]

According to light distributions, the microlens image has one of the 256 inner binary patterns. We categorize those patterns as either edge or non-edge based on the appearance of the pattern. Microlens images of concern are extracted from the edge of the chin. Therefore, we have an interest in the microlens images that have edge patterns. As described in Figure 11, 36 edge patterns are considered. Horizontal edge patterns are not applicable because we detect vertical edges in the previous step.

Figure 12 shows the histograms of inner binary patterns of the real and fake faces. Inner binary patterns of high frequency and these decimal numbers are also shown at the corner of those plots respectively. The real face has edge-shaped inner binary patterns, such as 56, 60, 129, much more than the fake face has. On the other hand, the fake face has more non-edge patterns than edge patterns. Based on this property, we focus on inner binary patterns corresponding to edge patterns.

Outer binary pattern

Outer binary pattern (BPout) is made by comparing the microlens image with surrounding microlens images. The left image in Figure 13a represents microlens images. 8-neighbor microlens images are used. The middle image in Figure 13a is a set of averages of microlens images. moutc is the average of the center microlens image, and mouti(i = 1, …, 8) are averages of surrounding microlens images. When the average is computed, the 7 × 7 region in the microlens image is used. Like the inner binary pattern, the outer binary pattern is obtained through the comparison with averages of adjacent microlens images. Equation (2) represents how to make the outer binary pattern. px is an intensity of each pixel, and MIi is the ith microlens image. Figure 13b shows the outer binary pattern.

b out i = { 1 if m out i > m out c 0 if m out i m out c m out i = 1 7 × 7 p x M I i p x B P out = [ b out 8 b out 7 b out 1 ]

Variance of the averages of subregions in the microlens image

Depending on the light distribution, binary patterns have different aspects. However, binary patterns are insufficient to conduct quantitative analysis of the lighting variation. Therefore, we calculate the variance of the averages of subregions (mini) using inner and outer binary patterns. In Equation (3), vj is the variance of mini in the jth microlens image, and μj is the mean of mini in the jth microlens image. ci is 1 or 0, and this is determined by inner and outer binary patterns. As mentioned in Section 2, due to the depth gap between the focal plane and another position further from the focal plane, the microlens image (Figure 4e) has the inverted light distribution, compared with the macroscopic image (Figure 4b). That is, the inner binary pattern is the reversal of the corresponding outer binary pattern. However, if there is little depth gap or the region of interest is closer than the focal plane, this feature is not valid. Therefore, in order to highlight the characteristic of the microlens image, ci is 1 as the bit of the inner binary pattern is the opposite of that of the outer binary pattern. Otherwise, ci is 0.

v j = 1 7 i = 1 8 ( m i n i μ j ) 2 c i μ j = mean ( c i m i n i , i = 1 , 8 ) c i = { 1 b i n i b out i 0 b i n i = b out i

We assign weight to variances in accordance with how many microlens images with edge patterns exist. The weight w is the ratio between the number of microlens images with edge patterns (NE) and the number of total microlens images (NM). If microlens images of edge patterns comprise a large proportion of the total microlens images, extracted features can be regarded as reliable data to determine the input face.

V = w × [ v 1 v 2 v 3 v N M ] w = N E N M

The number of the microlens images, chosen in the edge detection step, is different in every input data. Therefore, it is difficult to compare arrays of variances directly in case the lengths of arrays are not the same. To make a comparison among arrays of variances, we build histograms of variances and calculate cumulative distributions of those histograms. The histograms are normalized to 1. Figure 14 shows cumulative distributions of histograms. Blue solid lines present the results of real faces, and red dotted lines show those of fake faces. Variances of fake faces are massed in the lower region, but those of real faces are not. In the final step, principal component analysis (PCA) is applied to the cumulative distributions and their representative eigenvectors are found. By projecting the cumulative distributions onto those eigenvectors, we can obtain new features and utilize them as edge features. Distributions of the edge features are presented in the Figure 15.

Algorithm 1 shows the whole process of extracting the edge feature.


Algorithm 1 Feature Extraction: Edge Feature

1:Make a sub-aperture image (Figure 7)
2:Find vertical edges of faces in the sub-aperture images (Figure 7)
3:Select corresponding microlens images using a semicircular mask (Figure 8)
4:for Each microlens image MIn do
5: Compute an inner binary pattern (BPin) and an outer binary pattern (BPout) (Figures 10 and 13, Equations (1) and (2))
6: Determine whether BPin of MIn belongs to the set of edge patterns (Figure 11)
7:if BPin belongs to the set of edge patterns then
8:  With BPin and BPout, calculate a variance (vn) of the averages of subregions in MIn (Equation (3))
9:else
10:  Move to the next microlens image MIn+1
11:Multiply a variance set V and a weight w (Equation (4))
12:Make a histogram of V
13:Make a cumulative distribution of the histogram (Figure 14)
14:Apply PCA to the cumulative distribution (Figure 15)

3.1.2. Ray Difference Feature

If there are few edges in the sub-aperture image, it is difficult to extract the edge feature for spoofing detection. In order to distinguish fake images without edge features, we propose the other feature called as ray difference feature. This feature is extracted from sub-aperture images. As mentioned in Section 2.2.1, the sub-aperture image is made by reordering pixels from microlens images. In the process of extracting the ray difference feature, we analyze sub-aperture images that have different information of incident rays and the difference between sub-aperture images of real and fake faces. Algorithm 2 shows the process of extracting the ray difference feature.


Algorithm 2 Feature Extraction: Ray Difference Feature

1:Make 5 sub-aperture images, SIi (Figure 16)
2:Normalize sub-aperture images, nSIi (Figure 17)
3:Subtract nSIi from the center sub-aperture image nSIc
4:Extract LBP histograms from the difference images (Figure 18)
5:Concatenate LBP histograms (Figure 17)
6:Apply PCA to the concatenated LBP histograms

At first, five sub-aperture images are made from the light field photograph. Figure 16 shows five sub-aperture images. Figure 16a is a sub-aperture image composed of center pixels of microlens images, and Figure 16b represents four sub-aperture images composed of adjacent pixels of microlens images. Five sub-aperture images have different viewpoints and information of light rays because different pixels are chosen in microlens images. In order to check the changes in lighting, we subtract the center sub-aperture image from adjacent sub-aperture images. In Figure 17, four difference images are depicted. Images in the first and second columns are normalized sub-aperture images. Face normalization [53] is the geometric normalization based on eye coordinates. Images in the third column are difference images between the center sub-aperture image and adjacent sub-aperture images. Depending on the directions of the incident rays, each difference image has diverse distributions. In order to analyze the ray difference, we extract local binary patterns (LBP) [51] from the difference image. Figure 18 illustrates the procedure of extracting LBPs from the difference image. The difference image is divided into several subregions with allowing the overlap between subregions. Each subregion yields one histogram. This histogram represents the distribution of uniform and rotation-invariant patterns at the local subregion. The dimensionality of the histogram is 59. In the final stage, we concatenate histograms extracted from four difference images as described in Figure 17. The dimensionality of the concatenated LBP histogram is 4 (= the number of the difference images) × NP (= the number of subregions per a difference image) × 59 (= the dimensionality of a LBP histogram). To reduce the dimensionality, PCA is applied.

3.2. Classification

We classify fake faces using edge and ray difference features. When both features are applied, the process of classification is a parallel structure as illustrated in Figure 19. According to the length of detected edges, which feature is extracted is determined. If the length of the edge is too short, it is difficult to decide whether the input face is real or not, because of the lack of the information. Therefore, if the quantity of the edge is not enough, we extract ray difference features and utilize them to distinguish fake faces. Support vector machine (SVM) is used for a classifier. Even though edge feature can be classified with a linear classifier, ray difference feature cannot. Radial basis function (RBF) is used as a kernel, and sigma values are adjusted depending on the distribution of features [54].

4. Experimentation and Discussion

4.1. Data Acquisition and Measures for Evaluation

There is no facial database which is taken by a light field camera. Thus, we collected light field photographs of real and fake faces with a Lytro camera [36]. The illuminating condition is indoor lighting. Types of spoofing attacks are listed in Table 1. There are three types of attacks with two different backgrounds. Attacks include the following:

  • Normal print attacks (NP): 2D photos printed on A4 papers with a Fuji Zerox ApeosPort-II C5400 printer.

  • Warped print attacks (WP): 2D photos, but they are bent over the face.

  • HD tablet attacks (HD): high resolution screen attacks with an iPad 2. The resolution of an iPad 2 is 1024 by 768 pixels.

The background conditions include the following:

  • Homogeneous background (HB): white and simple background.

  • Complex background (CB): ordinary and indoor background.

The number of light field photographs is listed in Table 2. The total number of subjects is 50. Light field photographs are decoded with Light Field Toolbox for Matlab [48]. Figure 20 shows samples of databases.

We evaluate the performance of our proposed method with our own databases. Databases are randomly categorized as 3 groups: training, development, and testing sets.

  • Training set (30%): to be used for training the classifier.

  • Development set (30%): to be used for estimating the threshold of the classifier.

  • Testing set (40%): to be used for evaluating the performance.

Thirty percent of the subjects are used for training and development, and forty percent of the subjects are used for testing. Three groups are disjointed. That is, if images of subject A are used for training, they cannot be utilized for development or testing.

For numeric results, the following measures are used. Measures are expressed with terms in Table 3.

  • False acceptance rate (FAR): the proportion of fake images misclassified as real. FAR = F P F P + T N

  • False rejection rate (FRR): the proportion of real images misclassified as fake. FRR = F N T P + F N

  • Total error rate (TER): the sum of FAR and FRR. TER = FAR + FRR

  • Half total error rate (HTER): half of the TER. HTER = TER/2

  • Accuracy: the ratio of the number of test images classified correctly and the total number of test images. Accuracy = T P + T N T P + T N + F P + F N

4.2. Experiments and Results

We examine the performance in accordance with types of feature descriptors and spoofing attacks. Table 4 shows half total error rates (HTERs) of six types of fake faces. These numerical results are the averages of HTERs by carrying out experiments 10 times. Figure 21 presents false acceptance rates (FARs) and false rejection rates (FRRs) of each case.

Overall, edge feature has better performance than ray difference feature. Unlike ray difference feature, edge feature is extracted from the salient region (microlens images at defocused edge). Therefore, unnecessary information and noise in edge feature are relatively smaller than those in ray difference feature. Figure 22 illustrates light field photographs of a real face, normal print and HD tablet. In case of the real face, the light distribution inside the microlens (Figure 22c) is represented as the inverse of the macroscopic light distribution, as mentioned in Section 2.2.1. However, in the normal print and HD tablet light field photographs, the property of the microlens image is imperceptible. Moreover, the light distribution in the HD tablet light field photograph is more irregular than that in the normal print. HD tablet emits light autonomously, unlike normal prints and warped prints. Thus, not only reflected lights but also emitted lights are recorded by the light field camera. This widens the gap between edge features of the real face and fake face in the HD tablet. As a result, error rates under HD tablet attacks are smaller than other error rates. HTERs of edge feature under normal print attacks are 3.39% (homogeneous background) and 4.10% (complex background). Meanwhile, HTERs of edge feature under HD tablet attacks are 0.89% (homogeneous background) and 1.09% (complex background). Edge feature shows the strength against HD tablet attacks.

The existence of the background also affects the performance. Figures 23 and 24 show microlens images of real faces with a homogeneous background and a complex background. When the background is homogeneous, the variation of the pixel values in a microlens image (Figure 23d) is large. However, the variation of the pixel values in a microlens image with the complex background (Figure 24d,f) is small. In Figure 24c,d, there is a locker whose color is similar to the skin color in the background. Also, when the intensities of the background and the skin are similar (Figure 24e,f), the pixel values in the microlens image are not discriminative. Due to the less variation of the pixel values in the microlens image with the complex background, it is more difficult to find the boundary between the face and the background in the microlens images, and variances of the microlens images are not so distinctive either. Figure 25 illustrates the cumulative distributions of variances under normal print, warped print, and HD tablet attacks. When the background is homogeneous, cumulative distributions of real and fake faces are discriminative (solid lines). Whereas, cumulative distributions of faces with the complex background are less distinguishable relatively (dotted lines). The low variances of microlens images with the complex background affect to the distributions of edge features, and this phenomenon results in the deterioration of the performance. In the case of the ray difference feature, complex background also deteriorates the performance under the warped print and HD tablet attacks, as illustrated in Figure 21. Figure 26 shows local binary pattern histograms of real faces and warped prints. These histograms are yielded during the procedure of extracting ray difference features in Figure 17. The background of faces in Figure 26a is homogeneous, and that of faces in Figure 26b is complex. Blue solid lines are LBP histograms of real faces, and red dotted lines are those of warped print attacks. When the background is homogeneous, the gap between LBP histograms of real face and warped print is large. However, the gap in the complex background is smaller than that in the homogeneous background. Because of the small gap, it is more difficult to discriminate real faces and warped prints. We can also check the influence of the background through an additional experiment. As described in Figure 27, we exclude the subregions that correspond to the background (Figure 27e,f). From subregions including the background (Figure 27a,b) and those excluding the background (Figure 27c,d), we extract ray difference features and classify the warped print attacks. When the subregions of the background are included in the process of extracting ray difference features (Figure 27a,b), the accuracy under the warped attack with the complex background (97.75%) is lower than the accuracy under the warped attack with the homogeneous background (99.22%). However, if the subregions of the background are excluded like Figure 27c,d, the performance is similar regardless of the type of the background (Table 5). Therefore, the performance under warped print attacks with the complex background is more deteriorated than that under warped print attacks with homogeneous background.

4.3. Discussion

In this paper, we propose a novel method for face liveness detection using characteristics of light field photograph. Then, our method cannot be applied to general face attack databases, such as Replay-Attack Database [55] and CASIA Face Anti-Spoofing Database [56]. Therefore, we choose the comparative method which can be applied to the light field database and which can utilize the representative characteristic of the light field photograph, refocusing technology.

Kim [27] proposed a countermeasure to spoofing attacks using variable focusing. Depending on the degree of defocussing, the depth between the nose and ears is estimated, and the defocus is used as a criterion to discriminate real and fake faces. Therefore, it is important to make the effect of defocussing great. This method requires two images whose focal planes are different. The focal plane of the first image lies on the nose tip, and that of the second image lies on the ears. In [27], those images are taken using a mirrorless camera. However, in this comparison, images are yielded from the light field photograph through the refocusing process. Refocusing means that users adjust the focal plane after taking pictures. This enables users to generate several refocused images from the only one light field photograph. Figure 28 illustrates refocused images made from the light field photographs. Figure 28a,b are real face images, and Figure 28c,d are fake face images. The focal plane of Figure 28a,c lies on the nose tip, and that of Figure 28b,d lies on the ears. With these refocused images, we conducted experiments for comparison with [27].

Figure 29 and Table 6 present the results of two methods under normal print, warped print and HD tablet attacks. We computed the accuracies using both features. Like the process of classification explained in Section 3.2, we applied edge and ray difference features as the parallel structure, depending on the quantity of the edge. Our method acquires at least 94.78% accuracy or up to 99.36% accuracy. On the other hand, the best accuracy of [27] is 87.26%. The performance of our proposed method is superior to that of [27]. The reason why the performance of [27] is relatively low is that the effect of defocussing in refocused images is insignificant. In order that the remarkable degree of defocussing is obtained, depth of field (DoF), the range between the nearest and farthest objects in a given focal plane, must be sufficiently shallow, or the focal plane of the first refocused image must be far from the focal plane of the second refocused image. However, neither of the two conditions are satisfied. The light field camera can extend the DoF without decreasing the numerical aperture of the camera [50], but it is difficult to reduce the DoF. In addition, as the focal plane of the first image lies on the nose tip and that of the second image lies on the ears, the gap between the focal planes is not large, and DoFs are overlapped. Therefore, there is little difference between the two refocused images. This influences the performance of [27] to be deteriorated, and this is the reason why we avoid using refocused images for face liveness detection. Moreover, the performance of [27] under warped print attacks is the worst. This shows that [27], originally targeted at detecting 2D flat photo, is prone to warped print attacks. As a result, those accuracies are relatively low compared with other accuracies. Whereas, the performance of our proposed method is stable, regardless of types of spoofing attacks.

5. Conclusions and Future Work

We attempted to be the first to utilize raw light field photographs microscopically for detecting spoofing faces in this paper. Without taking image sequences, we can capture the change of the light distribution from only one light field data. Based on the characteristics of microlens image and sub-aperture image, new features, edge and ray difference features are developed. For evaluating our proposed method, we create a light field database with normal print, warped print and HD tablet attacks. The performance of the edge feature is superior to that of the ray difference feature. In particular, the usage of edge feature yields the best performance under HD tablet attacks (0.89% HTER in the homogeneous background and 1.09% HTER in the complex background). Moreover, comparing our method with another method [27], we show that our proposed method has good performance (96.51% accuracy under normal print attacks and 99.36% accuracy under HD tablet attacks in the homogeneous background).

Nowadays, the light field camera attracts engineers’ attentions. Although, in Section 4.3, we mentioned the limitation of using refocused images in order to discriminate the spoofing images with the comparative method [27], refocusing technology will be applicable to detect spoofing images by taking another approaches. Moreover, epipolar images [49], made from the raw light field photograph, can become a factor to estimate the depth of face. Likewise, there are many factors to apply the light field photograph to face liveness detection. In addition, light field camera modules, which can be embedded on cellular phones, have even been developed [38]. In future work, we will advance our method using that light field camera module and contribute to defending forged faces. In addition, by making up for the weakness at the complex background, we will make our system more robust to the practical environment. Furthermore, we will consider other countermeasures against evolved attacks such as videos and 3D masks by analyzing characteristics of the light field photograph.

Acknowledgments

This research was supported by the MSIP (Ministry of Science, ICT & Future Planning), Korea, under the “ITRC (Information Technology Research Center)” support program (NIPA-2014-H0301-14-1012) supervised by the NIPA (National IT Industry Promotion Agency).

Author Contributions

Sangyoun Lee and Sooyeon Kim developed the methodology and drafted the manuscript. Moreover, Sooyeon Kim and Yuseok Ban collected databases for evaluation and implemented software simulations. The authors approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Li, S.Z.; Jain, A.K. Handbook of Face Recognition; Springer: London, UK, 2011. [Google Scholar]
  2. Yang, J.C.; Lai, C.L.; Sheu, H.T.; Chen, J.J. An Intelligent Automated Door Control System Based on a Smart Camera. Sensors 2013, 13, 5923–5936. [Google Scholar]
  3. Kim, J.; Yu, S.; Lee, S. Random-Profiles-Based 3D Face Recognition System. Sensors 2014, 14, 6279–6301. [Google Scholar]
  4. Qin, H.; Qin, L.; Xue, L.; Li, Y. A kernel Gabor-based weighted region covariance matrix for face recognition. Sensors 2012, 12, 7410–7422. [Google Scholar]
  5. Kähm, O.; Damer, N. 2D face liveness detection: An overview. Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 6–7 September 2012; pp. 1–12.
  6. Kim, G.; Eum, S.; Suhr, J.K.; Kim, D.I.; Park, K.R.; Kim, J. Face Liveness Detection Based on Texture and Frequency Analyses. Proceedings of the 5th IAPR International Conference on Biometrics (ICB), New Delhi, India, 29 March–1 April 2012; pp. 67–72.
  7. Määttä, J.; Hadid, A.; Pietikäinen, M. Face Spoofing Detection From Single Images Using Micro-Texture Analysis. Proceedings of the 2011 International Joint Conference on Biometrics, Washington, DC, USA, 11–13 October 2011.
  8. Peixoto, B.; Michelassi, C.; Rocha, A. Face liveness detection under bad illumination conditions. Proceedings of the IEEE 2011 International Conference on Image Processing, Brussels, Belgium, 11–14 September 2011; pp. 3557–3560.
  9. Singh, A.; Singh, S.K. Effect of Face Tampering on Face Recognition. Signal Image Process. Int. J. 2013, 4, 83–99. [Google Scholar]
  10. Lee, T.W.; Ju, G.H.; Liu, H.S.; Wu, Y.S. Liveness Detection using Frequency Entropy of Image Sequences. Proceedings of the 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, BC, Canada, 26–31 May 2013.
  11. Schwartz, W.R.; Rocha, A.; Edrini, H.P. Face Spoofing Detection through Partial Least Squares and Low-Level Descriptors. Proceedings of the 2011 International Joint Conference on Biometrics (IJCB ’11), Washington, DC, USA, 11–13 October 2011.
  12. Li, J.; Wang, Y.; Tan, T.; Jain, A.K. Live face detection based on the analysis of fourier spectra. Proceedings of SPIE Biometric Technology for Human Identification, Orlando, FL, USA, 12 April 2004; pp. 296–303.
  13. Tan, X.; Li, Y.; Liu, J.; Jiang, L. Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model. In ECCV 2010 Lecture Notes in Computer Science; Springer: Berlin, Germany, 2010; Volume 6316, pp. 504–517. [Google Scholar]
  14. Zhang, Z.; Yi, D.; Lei, Z.; Li, S.Z. Face liveness detection by learning multispectral reflectance distributions. Proceedings of the 2011 IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011), Santa Barbara, CA, USA, 21–25 March 2011.
  15. Bai, J.; Ng, T.T.; Gao, X.; Shi, Y.Q. Is Physics-based Liveness Detection Truly Possible with a Single Image? Proceedings of the 2010 IEEE International Symposium on Circuits and Systems (ISCAS), Paris, France, 30 May–2 June 2010; pp. 3425–3428.
  16. Huang, C.H.; Wang, J.F. SVM-based One-Against-Many Algorithm for Liveness Face Authentication. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC 2008), Singapore, 12–15 October 2008; pp. 744–748.
  17. Pan, G.; Sun, L.; Wu, Z.; Wang, Y. Monocular camera-based face liveness detection by combining eyeblink and scene context. Telecommun. Syst. 2011, 47, 215–225. [Google Scholar]
  18. Jee, H.; Jung, S.; Yoo, J. Liveness Detection for Embedded Face Recognition System. Int. J. Biol. Life Sci. 2006, 1, 235–238. [Google Scholar]
  19. Komogortsev, O.V.; Karpov, A. Liveness Detection via Oculomotor Plant Characteristics: Attack of Mechanical Replicas. Proceedings of the 6th International Conference on Biometrics (ICB), Madrid, Spain, 4–7 June 2013.
  20. Anjos, A.; Marcel, S. Counter-Measures to Photo Attacks in Face Recognition: A public database and a baseline. Proceedings of the 2011 International Joint Conference on Biometrics, Washington, DC, USA, 11–13 October 2011.
  21. Kollreider, K.; Fronthaler, H.; Bigun, J. Non-intrusive liveness detection by face images. Image Vis. Comput. 2009, 27, 233–244. [Google Scholar]
  22. Bao, W.; Li, H.; Li, N.; Jiang, W. A liveness detection method for face recognition based on optical flow field. Proceedings of the International Conference on Image Analysis and Signal Processing, Taizhou, China, 11–12 April 2009; pp. 233–236.
  23. Bharadwaj, S.; Dhamecha, T.I.; Vatsa, M.; Singh, R. Computationally Efficient Face Spoofing Detection with Motion Magnification. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Portland, OR, USA, 23–28 June 2013.
  24. Kollreider, K.; Fronthaler, H.; Faraj, M.I.; Bigun, J. Real-Time Face Detection and Motion Analysis With Application in “Liveness” Assessment. IEEE Trans. Inf. Forensics Secur. 2007, 2, 548–558. [Google Scholar]
  25. Lagorio, A.; Tistarelli, M.; Cadoni, M.; Fookes, C.; Sridharan, S. Liveness Detection based on 3D Face Shape Analysis. Proceedings of the 2013 International Workshop on Biometrics and Forensics (IWBF), Lisbon, Portugal, 4–5 April 2013.
  26. Wang, T.; Yang, J.; Lei, Z.; Liao, S.; Li, S.Z. Face Liveness Detection Using 3D Structure Recovered from a Single Camera. Proceedings of the 2013 International Conference on Biometrics (ICB), Madrid, Spain, 4–7 June 2013.
  27. Kim, S.; Yu, S.; Kim, K.; Ban, Y.; Lee, S. Face liveness detection using variable focusing. Proceedings of the 2013 International Conference on Biometrics (ICB), Madrid, Spain, 4–7 June 2013; pp. 1–6.
  28. Yang, J.; Lei, Z.; Liao, S.; Li, S. Face liveness detection with component dependent descriptor. Proceedings of the 2013 International Conference on Biometrics (ICB), Madrid, Spain, 4–7 June 2013; pp. 1–6.
  29. Komulainen, J.; Hadid, A.; Pietikainen, M.; Anjos, A.; Marcel, S. Complementary countermeasures for detecting scenic face spoofing attacks. Proceedings of the 2013 International Conference on Biometrics (ICB), Madrid, Spain, 4–7 June 2013; pp. 1–7.
  30. Chingovska, I.; Yang, J.; Lei, Z.; Yi, D.; Li, S.; Kahm, O.; Glaser, C.; Damer, N.; Kuijper, A.; Nouak, A.; et al. The 2nd competition on counter measures to 2D face spoofing attacks. Proceedings of the 2013 International Conference on Biometrics (ICB), Madrid, Spain, 4–7 June 2013; pp. 1–6.
  31. De Freitas Pereira, T.; Anjos, A.; de Martino, J.; Marcel, S. Can face anti-spoofing countermeasures work in a real world scenario. Proceedings of the 2013 International Conference on Biometrics (ICB), Madrid, Spain, 4–7 June 2013; pp. 1–8.
  32. De Freitas Pereira, T.; Komulainen, J.; Anjos, A.; de Martino, J.M.; Hadid, A.; Pietikainen, M.; Marcel, S. Face liveness detection using dynamic texture. EURASIP J. Image Video Process. 2014. [Google Scholar] [CrossRef]
  33. Sun, L.; Huang, W.; Wu, M. TIR/VIS Correlation for Liveness Detection in Face Recognition. Comput. Anal. Images Patterns Lect. Notes Comput. Sci. 2011, 6855, 114–121. [Google Scholar]
  34. Kant, C.; Sharma, N. Fake Face Recognition Using Fusion of Thermal Imaging and Skin Elasticity. IJCSC 2013, 4, 65–72. [Google Scholar]
  35. Adelson, E.; Wang, J. Single lens stereo with a plenoptic camera. IEEE Trans. Pattern Anal. Mach. Intell. 1992, 14, 99–106. [Google Scholar]
  36. Lytro Inc. Available online: https://www.lytro.com/ (accessed on 2 June 2014).
  37. Perwass, C.; Wietzke, L. Single lens 3D-camera with extended depth-of-field. Proceedings of the Human Vision and Electronic Imaging, Burlingame, CA, USA, 22 January 2012; 8291.
  38. Venkataraman, K.; Lelescu, D.; Duparré, J.; McMahon, A.; Molina, G.; Chatterjee, P.; Mullis, R.; Nayar, S. PiCam: An Ultra-thin High Performance Monolithic Camera Array. ACM Trans. Graph. 2013, 32, 166:1–166:13. [Google Scholar]
  39. Levoy, M.; Hanrahan, P. Light Field Rendering. Proceedings of the 23rd Annual Conference on Computer Graphics and Interactive Techniques (SIGGRAPH ’96), New Orleans, LA, USA, 4–9 August 1996.
  40. Kim, C.; Zimmer, H.; Pritch, Y.; Sorkine-Hornung, A.; Gross, M. Scene Reconstruction from High Spatio-Angular Resolution Light Fields. ACM Trans. Graph. (Proc. ACM SIGGRAPH) 2013, 32, 73:1–73:12. [Google Scholar]
  41. Georgiev, T.; Chunev, G.; Lumsdaine, A. Superresolution with the focused plenoptic camera. Proceedings of the IS&T/SPIE Electronic Imaging, San Francisco, CA, USA, 23–27 January 2011.
  42. Bishop, T.E.; Favaro, P. The light field camera: Extended depth of field, aliasing, and superresolution. IEEE Trans. Pattern Anal. Mach. Intell. 2012, 34, 972–986. [Google Scholar]
  43. Raghavendra, R.; Yang, B.; Raja, K.B.; Busch, C. A new perspective–face recognition with light-field camera. Proceedings of the 2013 International Conference on Biometrics (ICB), Madrid, Spain, 4–7 June 2013; pp. 1–8.
  44. Raghavendra, R.; Raja, K.B.; Yang, B.; Busch, C. Multi-face Recognition at a Distance Using Light-Field Camera. Proceedings of the 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Beijing, China, 16–18 October 2013; pp. 346–349.
  45. Raghavendra, R.; Raja, K.B.; Yang, B.; Busch, C. Improved face recognition at a distance using light field camera & super resolution schemes. Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, 26–28 November 2013.
  46. Raghavendra, R.; Raja, K.; Yang, B.; Busch, C. Combining Iris and Periocular Recognition Using Light Field Camera. Proceedings of the 2013 2nd IAPR Asian Conference on Pattern Recognition (ACPR), Naha, Japan, 5–8 November 2013; pp. 155–159.
  47. LFP (Light Field Photography) File Reader. Available online: http://code.behnam.es/python-lfp-reader/ (accessed on 2 June 2014).
  48. Dansereau, D.G.; Pizarro, O.; Williams, S.B. Decoding, calibration and rectification for lenselet-based plenoptic cameras. Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Portland, OR, USA, 23–;28 June 2013; pp. 1027–1034.
  49. Ng, R. Digital Light Field Photography. PhD Thesis, Stanford University, Stanford, CA, USA, 2006. [Google Scholar]
  50. Ng, R.; Levoy, M.; Brédif, M.; Duval, G.; Horowitz, M.; Hanrahan, P. Light Field Photography with a Hand-Held Plenoptic Camera; Technical report; Stanford University: Stanford, CA, USA; April; 2005. [Google Scholar]
  51. Ojala, T.; Pietikainen, M.; Maenpaa, T. Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 2002, 24, 971–987. [Google Scholar]
  52. Liao, S.; Zhu, X.; Lei, Z.; Zhang, L.; Li, S. Learning Multi-scale Block Local Binary Patterns for Face Recognition. In Advances in Biometrics; Lee, S.W., Li, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2007; Volume 4642, pp. 828–837. [Google Scholar]
  53. Brunelli, R.; Poggio, T. Face recognition: Features versus templates. IEEE Trans. Pattern Anal. Mach. Intell. 1993, 15, 1042–1052. [Google Scholar]
  54. Burges, C. A Tutorial on Support Vector Machines for Pattern Recognition. Data Min. Knowl. Discov. 1998, 2, 121–167. [Google Scholar]
  55. Chingovska, I.; Anjos, A.; Marcel, S. On the Effectiveness of Local Binary Patterns in Face Anti-spoofing. Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 6–7 September 2012.
  56. Zhang, Z.; Yan, J.; Liu, S.; Lei, Z.; Yi, D.; Li, S. A face antispoofing database with diverse attacks. Proceedings of the 2012 5th IAPR International Conference on Biometrics (ICB), New Delhi, India, 29 March –1 April 2012; pp. 26–31.
Figure 1. Face recognition system including face liveness detection.
Figure 1. Face recognition system including face liveness detection.
Sensors 14 22471f1 1024
Figure 2. Raw light field photograph.
Figure 2. Raw light field photograph.
Sensors 14 22471f2 1024
Figure 3. Analysis of raw light field photograph: (a) parts (red box) of Figure 2; and (b) one (yellow box) of microlens images.
Figure 3. Analysis of raw light field photograph: (a) parts (red box) of Figure 2; and (b) one (yellow box) of microlens images.
Sensors 14 22471f3 1024
Figure 4. Raw light field photograph.
Figure 4. Raw light field photograph.
Sensors 14 22471f4 1024
Figure 5. Process of making a sub-aperture image.
Figure 5. Process of making a sub-aperture image.
Sensors 14 22471f5 1024
Figure 6. Light field photographs: (a) raw data of a real face; (b) magnification of real LF photo; (c) microlens image which lies on the edge in real LF photo; (d) raw data of a fake face; (e) magnification of fake LF photo; and (f) microlens image which lies on the edge in fake LF photo.
Figure 6. Light field photographs: (a) raw data of a real face; (b) magnification of real LF photo; (c) microlens image which lies on the edge in real LF photo; (d) raw data of a fake face; (e) magnification of fake LF photo; and (f) microlens image which lies on the edge in fake LF photo.
Sensors 14 22471f6 1024
Figure 7. Edge detection from a sub-aperture image: (a) a sub-aperture image of the real face; (b) vertical edges of the real face; (c) a sub-aperture image of the fake face; and (d) vertical edges of the fake face.
Figure 7. Edge detection from a sub-aperture image: (a) a sub-aperture image of the real face; (b) vertical edges of the real face; (c) a sub-aperture image of the fake face; and (d) vertical edges of the fake face.
Sensors 14 22471f7 1024
Figure 8. Masked edges of (a) the real face; and (b) the fake face.
Figure 8. Masked edges of (a) the real face; and (b) the fake face.
Sensors 14 22471f8 1024
Figure 9. Examples of microlens images: (a) “0” and “128” clusters; and (b)“0” and “128” (randomly distributed).
Figure 9. Examples of microlens images: (a) “0” and “128” clusters; and (b)“0” and “128” (randomly distributed).
Sensors 14 22471f9 1024
Figure 10. Inner binary pattern of a microlens image: (a) process; and (b) example.
Figure 10. Inner binary pattern of a microlens image: (a) process; and (b) example.
Sensors 14 22471f10 1024
Figure 11. Edge patterns
Figure 11. Edge patterns
Sensors 14 22471f11 1024
Figure 12. Histograms of inner binary patterns of (a) the real face; and (b) the fake face.
Figure 12. Histograms of inner binary patterns of (a) the real face; and (b) the fake face.
Sensors 14 22471f12 1024
Figure 13. Outer binary pattern of a microlens image: (a) process; and (b) example.
Figure 13. Outer binary pattern of a microlens image: (a) process; and (b) example.
Sensors 14 22471f13 1024
Figure 14. Cumulative distributions of variances.
Figure 14. Cumulative distributions of variances.
Sensors 14 22471f14 1024
Figure 15. Principal component analysis (PCA)—Transformed features.
Figure 15. Principal component analysis (PCA)—Transformed features.
Sensors 14 22471f15 1024
Figure 16. Sub-aperture images (a) from center pixel (5, 5); and (b) from neighbor pixels.
Figure 16. Sub-aperture images (a) from center pixel (5, 5); and (b) from neighbor pixels.
Sensors 14 22471f16 1024
Figure 17. Process of extracting ray difference feature descriptor.
Figure 17. Process of extracting ray difference feature descriptor.
Sensors 14 22471f17 1024
Figure 18. Process of extracting LBP histograms.
Figure 18. Process of extracting LBP histograms.
Sensors 14 22471f18 1024
Figure 19. Process of classifying LF photographs with both edge and ray difference features.
Figure 19. Process of classifying LF photographs with both edge and ray difference features.
Sensors 14 22471f19 1024
Figure 20. Samples of databases.
Figure 20. Samples of databases.
Sensors 14 22471f20 1024
Figure 21. Error rates of (a) (Edge feature, Homogeneous background); (b) (Edge feature, Complex background); (c) (Ray difference feature, Homogeneous background); and (d) (Ray difference feature, Complex background).
Figure 21. Error rates of (a) (Edge feature, Homogeneous background); (b) (Edge feature, Complex background); (c) (Ray difference feature, Homogeneous background); and (d) (Ray difference feature, Complex background).
Sensors 14 22471f21 1024
Figure 22. Comparison of light field photographs of a real face, a normal print and a HD tablet: (a) real face; (b) magnified view of (a); (c) magnified view of (b); (d) normal print; (e) magnified view of (d); (f) magnified view of (e); (g) HD tablet; (h) magnified view of (g); and (i) magnified view of (h).
Figure 22. Comparison of light field photographs of a real face, a normal print and a HD tablet: (a) real face; (b) magnified view of (a); (c) magnified view of (b); (d) normal print; (e) magnified view of (d); (f) magnified view of (e); (g) HD tablet; (h) magnified view of (g); and (i) magnified view of (h).
Sensors 14 22471f22 1024
Figure 23. A light field photograph of a real face with a homogeneous background (a) a sub-aperture image; (b) a light field photograph; (c) a part of the light field photograph; and (d) enlarged microlens images.
Figure 23. A light field photograph of a real face with a homogeneous background (a) a sub-aperture image; (b) a light field photograph; (c) a part of the light field photograph; and (d) enlarged microlens images.
Sensors 14 22471f23 1024
Figure 24. A light field photograph of a real face with a complex background (a) a sub-aperture image; (b) a light field photograph; (c) a part of the light field photograph (background: a skin-color locker); (d) enlarged microlens images of (c); (e) a part of the light field photograph (background: a gray partition); and (f) enlarged microlens images of (e).
Figure 24. A light field photograph of a real face with a complex background (a) a sub-aperture image; (b) a light field photograph; (c) a part of the light field photograph (background: a skin-color locker); (d) enlarged microlens images of (c); (e) a part of the light field photograph (background: a gray partition); and (f) enlarged microlens images of (e).
Sensors 14 22471f24 1024
Figure 25. Cumulative distributions of variances (a) normal print; (b) warped print; and (c) HD tablet.
Figure 25. Cumulative distributions of variances (a) normal print; (b) warped print; and (c) HD tablet.
Sensors 14 22471f25 1024
Figure 26. Local binary pattern histograms under warped print attacks (a) with Homogeneous background; and (b) with Complex background.
Figure 26. Local binary pattern histograms under warped print attacks (a) with Homogeneous background; and (b) with Complex background.
Sensors 14 22471f26 1024
Figure 27. Subregions in the process of extracting a ray difference feature (a) a real face; and (b) a warped print attack including the complex background; (c) the real face; and (d) the warped print attack excluding the complex background; (e) removed subregions in the real face; and (f) removed subregions in the warped print attack.
Figure 27. Subregions in the process of extracting a ray difference feature (a) a real face; and (b) a warped print attack including the complex background; (c) the real face; and (d) the warped print attack excluding the complex background; (e) removed subregions in the real face; and (f) removed subregions in the warped print attack.
Sensors 14 22471f27 1024
Figure 28. Refocused images (a) real face focused on the nose; (b) real face focused on the ear; (c) fake face focused on the nose; and (d) fake face focused on the ear.
Figure 28. Refocused images (a) real face focused on the nose; (b) real face focused on the ear; (c) fake face focused on the nose; and (d) fake face focused on the ear.
Sensors 14 22471f28 1024
Figure 29. Face liveness detection accuracy (%).
Figure 29. Face liveness detection accuracy (%).
Sensors 14 22471f29 1024
Table 1. Types of attacks (abbreviations).
Table 1. Types of attacks (abbreviations).
Normal PrintWarped PrintHD Tablet
Homogeneous BackgroundNPHBWPHBHDHB
Complex BackgroundNPCBWPCBHDCB
Table 2. Light field databases.
Table 2. Light field databases.
BackgroundReal FacesFake Faces

Normal PrintWarped PrintHD Tablet
Homogeneous1104766250500
Complex11301066250500
Table 3. Measuring fake detection errors.
Table 3. Measuring fake detection errors.
Object from Target (Real faces)Object from Outlier (Fake faces)
Classified as Target (Real faces)True Positive (TP)False Positive (FP)
Classified as Outlier (Fake faces)False Negative (FN)True Negative (TN)
Table 4. HTERs (%) in accordance with types of feature descriptors and spoofing attacks.
Table 4. HTERs (%) in accordance with types of feature descriptors and spoofing attacks.
Edge FeatureRay Difference Feature

DevTestRBF SigmaDevTestRBF Sigma
NPHB3.483.390.684.944.135.2
NPCB3.614.102.895.583.535.5
WPHB2.872.460.430.622.9325
WPCB3.262.031.863.305.9325.6
HDHB0.050.890.33.632.5025.8
HDCB2.011.090.334.114.2227.9
Table 5. Accuracy (%) of our proposed method with / without considering the background.
Table 5. Accuracy (%) of our proposed method with / without considering the background.
Including BGExcluding BG

WPHBWPCB WPHBWPCB
Accuracy99.2297.7597.4597.25
Table 6. Accuracy (%) and standard deviation of [27] and our proposed method.
Table 6. Accuracy (%) and standard deviation of [27] and our proposed method.
[27]Proposed Method
NPHB80.20 (3.58)96.51 (1.54)
NPCB87.26 (4.25)94.78 (1.65)
WPHB65.27 (2.23)98.70 (0.90)
WPCB72.21 (3.17)97.73 (0.95)
HDHB81.21 (2.35)99.36 (0.63)
HDCB86.35 (2.33)98.10 (0.82)

Share and Cite

MDPI and ACS Style

Kim, S.; Ban, Y.; Lee, S. Face Liveness Detection Using a Light Field Camera. Sensors 2014, 14, 22471-22499. https://doi.org/10.3390/s141222471

AMA Style

Kim S, Ban Y, Lee S. Face Liveness Detection Using a Light Field Camera. Sensors. 2014; 14(12):22471-22499. https://doi.org/10.3390/s141222471

Chicago/Turabian Style

Kim, Sooyeon, Yuseok Ban, and Sangyoun Lee. 2014. "Face Liveness Detection Using a Light Field Camera" Sensors 14, no. 12: 22471-22499. https://doi.org/10.3390/s141222471

Article Metrics

Back to TopTop