SlideShare une entreprise Scribd logo
1  sur  25
FACE SPOOFING DETECTION
USING
COLOUR TEXTURE ANALYSIS
CONTENTS
• INTRODUCTION
• EXISTING METHOD
• PROPOSED METHOD
• ADVANTAGES
• APPLICATIONS
• CONCLUSION AND FUTURE SCOPE
• REFERENCES
INTRODUCTION
• Detection using colour texture analysis
• Information from luminanace and chrominance are collected
• Existing method focussed on analysis of luminanace
information of face images and discarding chroma component
• Observed fake image have lower image quality with lack of
high frequency information
Contd…
• Fake images are identified by analysing chroma component
than luminance
• Preliminary colour texture analysis approach is proposed
• Non intrusive software based detection focus on gray scale
images, discarding colour information
EXISTING METHOD
• Hardware based solution appoach
 Surface reflectance properties are used
 Thermal information are for detecting printed and replayed
video attacks
 But are intrusive, expensive or impractical since
unconventional imaging devices are required
Contd…
• Challenge response approach
 Specific action is choosed as challenge and actually performed
or not, is response
• Non intrusive approach
 No user co-operation is required
 Assessed by commonly used any database
 Categorized into static and dynamic tech
Contd…
 High resolution input image are required to extract fine details
 Generation capabilities are not clear due to lack of training and
testing set
 Colour local binary patterns descriptor is only used
PROPOSED METHOD
• Face spoofing attacks mostly performed by displaying using
prints, video displays or masks
• Detect by analysing texture and quality of captured gray scale
image
• Discriminating genuine faces from fake ones by insight image
into three colour spaces RGB, HSV, YCbCr
Contd…
• Performance of different facial colour texture representation is
compared to their gray scale
Contd…
• Similarity between LBP descriptions extracted from face 1 and
face 2 for printed and video attacks
• Similarity is measured using the chi-square distance
• Hx and Hy are two LBP histograms
• Chi-square distance between gray-scale LBP histograms of the
genuine face and the printed fake face is smaller than the one
between two genuine face images
Contd…
• Mean LBP histograms for both real and fake face images to
compute a Chi-square distance as
• Hx is the LBP histogram of test sample and Hr & Hf are the
reference histograms for real and fake faces
Contd…
• Score distributions of the real faces and spoofs in the gray-
scale and YCbCr colour space.
• Chi-square statistics of the real and fake face descriptions in
the gray-scale space and Y channel are overlapping
• Better separated in the chroma components of the YCbCr
space.
Contd…
Proposed face anti-spoofing approach
Contd…
• Face is detected, cropped and normalised into an M×N pixel
image
• Texture descriptions are extracted from each colour channel
• Resulting feature vectors are concatenated into an enhanced
feature vector to get an overall representation of the facial colour
texture
• Final feature vector is fed to a binary classifier
• Output score value describes whether there is a live person or a
fake one in front of the camera
Contd…
• Facial representations extracted from different colour spaces
using different texture descriptors can also be concatenated
• Colour space
 Two other colour spaces, HSV and YCbCr, to explore the
colour texture information in addition to RGB
 HSV colour space, hue and saturation dimensions define the
chrominance and while the value dimension corresponds to the
luminance
Contd…
 YCbCr space separates the RGB components into Y, Cb and
Cr
• Texture Descriptors
 Designed for gray- scale images can be applied on colour
images by combining the features extracted from different
colour channels
 5 descriptors
Contd…
 Local Binary Patterns (LBP)
• Binary code computed by thresholding
• Binary patterns are collected into histograms
 Co-occurrence of Adjacent Local Binary Patterns (CoALBP)
• LBP discards spatial information
• To exploit the spatial relation between patterns
Contd…
 Local Phase Quantization (LPQ)
• Deal with blurred image
• Phase information extracted by STFT to analyse
neighbourhood
• Quantized and collected into histograms
 Binarized Statistical Image Features (BSIF)
• Convolving the image with linear filter and binarizing filter
response
Contd…
 Scale-Invariant Descriptor (SID)
• Image is first re-sampled densely enough on a log-polar grid,
rotations and scalings in the original image domain
• Fourier transform is applied on the re-sampled image,
invariance to both scale and rotation is achieved
ADVANTAGES
• Do not require any additional sensor
• Focused on both printed and replayed video attacks
• Good generalization ability
• Low computational complexity
• Fast response
• CTA features are more robust
APPLICATIONS
• Authentication system
• Registration purpose
• Mobile payment
• Unlocking system
• Security purpose
CONCLUSION AND FUTURE SCOPE
• Approach the problem of face anti-spoofing from the colour
texture analysis
• Colour image representations can used for describing the intrinsic
disparities in colour texture
• Facial colour texture representations studied by extracting
different local descriptors
• Improving generalization capabilities of colour texture analysis
based face spoofing detection
REFERENCES
[1] Zinelabidine Boulkenafet, Jukka Komulainen, and Abdenour Hadid,”Face
Spoofing Detection Using Colour Texture Analysis”, IEEE Transactions On
Information Forensics And Security, Vol. 11, No. 8, August 2016.
[2] Y. Li, K. Xu, Q. Yan, Y. Li, and R. H. Deng, “Understanding OSN-based
facial disclosure against face authentication systems,” in Proc. 9th ACM Symp.
Inf., Comput. Commun. Secur. (ASIA CCS), 2014, pp. 413–424.
[3] J. Li, Y. Wang, T. Tan, and A. K. Jain, “Live face detection based on
the analysis of Fourier spectra,” Proc. SPIE, vol. 5404, pp. 296–303,
Aug. 2004.
[4] X. Tan, Y. Li, J. Liu, and L. Jiang, “Face liveness detection from a single
image with sparse low rank bilinear discriminative model,” in Proc. 11th Eur.
Conf. Comput. Vis., VI (ECCV), 2010, pp. 504–517.
[5] Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, and S. Z. Li, “A face antispoofing
database with diverse attacks,” in Proc. 5th IAPR Int. Conf. Biometrics (ICB),
Mar./Apr. 2012, pp. 26–31.

Contenu connexe

Tendances

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
Chiranjeevi Adi
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 

Tendances (20)

Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Neural Networks for Pattern Recognition
Neural Networks for Pattern RecognitionNeural Networks for Pattern Recognition
Neural Networks for Pattern Recognition
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Text Detection and Recognition
Text Detection and RecognitionText Detection and Recognition
Text Detection and Recognition
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 
Hand Gesture Recognition using Neural Network
Hand Gesture Recognition using Neural NetworkHand Gesture Recognition using Neural Network
Hand Gesture Recognition using Neural Network
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Brain Tumour Detection.pptx
Brain Tumour Detection.pptxBrain Tumour Detection.pptx
Brain Tumour Detection.pptx
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
 
Vector quantization
Vector quantizationVector quantization
Vector quantization
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 

En vedette

Face Recognition
Face RecognitionFace Recognition
Face Recognition
laknatha
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
Fingerprint Anti-Spoofing  [ Talk in Stanford Nov. 2013]Fingerprint Anti-Spoofing  [ Talk in Stanford Nov. 2013]
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
Emanuela Marasco
 
Image texture analysis techniques survey-1
Image texture analysis techniques  survey-1Image texture analysis techniques  survey-1
Image texture analysis techniques survey-1
anitadixitjoshi
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
Kunal Thakur
 

En vedette (20)

Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detection
 
Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin Drahanský
 
Sec16 paper xu
Sec16 paper xuSec16 paper xu
Sec16 paper xu
 
Detection of face spoofing using visual dynamics
Detection of face spoofing using visual dynamicsDetection of face spoofing using visual dynamics
Detection of face spoofing using visual dynamics
 
Face spoof detection with image distortion analysis
Face spoof detection with image distortion analysisFace spoof detection with image distortion analysis
Face spoof detection with image distortion analysis
 
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
 
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
Fingerprint Anti-Spoofing  [ Talk in Stanford Nov. 2013]Fingerprint Anti-Spoofing  [ Talk in Stanford Nov. 2013]
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
 
Image texture analysis techniques survey-1
Image texture analysis techniques  survey-1Image texture analysis techniques  survey-1
Image texture analysis techniques survey-1
 
Color schemes
Color schemesColor schemes
Color schemes
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market Applications
 
Lecture 10 ming yang - face recognition systems
Lecture 10   ming yang - face recognition systemsLecture 10   ming yang - face recognition systems
Lecture 10 ming yang - face recognition systems
 
How to use packet sniffers
How to   use packet sniffersHow to   use packet sniffers
How to use packet sniffers
 
Real Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor FilterReal Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor Filter
 
Slide share, materials design for virtual environments.
Slide share, materials design for virtual environments.Slide share, materials design for virtual environments.
Slide share, materials design for virtual environments.
 
Leap Motion DJ - Final Presentation
Leap Motion DJ - Final PresentationLeap Motion DJ - Final Presentation
Leap Motion DJ - Final Presentation
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Ceh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffersCeh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffers
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
 

Similaire à Face spoofing detection using texture analysis

DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
ijma
 
Skin Detection Based on Color Model and Low Level Features Combined with Expl...
Skin Detection Based on Color Model and Low Level Features Combined with Expl...Skin Detection Based on Color Model and Low Level Features Combined with Expl...
Skin Detection Based on Color Model and Low Level Features Combined with Expl...
IJERA Editor
 
Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...
Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...
Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...
ijsrd.com
 
1 [Autosaved].pptx
1 [Autosaved].pptx1 [Autosaved].pptx
1 [Autosaved].pptx
SsdSsd5
 
Surface Normal Prediction using Hypercolumn Skip-Net & Normal-Depth
Surface Normal Prediction using Hypercolumn Skip-Net & Normal-DepthSurface Normal Prediction using Hypercolumn Skip-Net & Normal-Depth
Surface Normal Prediction using Hypercolumn Skip-Net & Normal-Depth
Chinghang chen
 

Similaire à Face spoofing detection using texture analysis (20)

Content Based Image Retrieval
Content Based Image Retrieval Content Based Image Retrieval
Content Based Image Retrieval
 
F044045052
F044045052F044045052
F044045052
 
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
 
A New Algorithm for Human Face Detection Using Skin Color Tone
A New Algorithm for Human Face Detection Using Skin Color ToneA New Algorithm for Human Face Detection Using Skin Color Tone
A New Algorithm for Human Face Detection Using Skin Color Tone
 
Evaluating the Perceptual Impact of Rendering Techniques on Thematic Color Ma...
Evaluating the Perceptual Impact of Rendering Techniques on Thematic Color Ma...Evaluating the Perceptual Impact of Rendering Techniques on Thematic Color Ma...
Evaluating the Perceptual Impact of Rendering Techniques on Thematic Color Ma...
 
Intro+Imaging.ppt
Intro+Imaging.pptIntro+Imaging.ppt
Intro+Imaging.ppt
 
Skin Detection Based on Color Model and Low Level Features Combined with Expl...
Skin Detection Based on Color Model and Low Level Features Combined with Expl...Skin Detection Based on Color Model and Low Level Features Combined with Expl...
Skin Detection Based on Color Model and Low Level Features Combined with Expl...
 
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
 
B017310612
B017310612B017310612
B017310612
 
Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...
Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...
Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...
 
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
 
ppt icitisee 2022_without_recording.pptx
ppt icitisee 2022_without_recording.pptxppt icitisee 2022_without_recording.pptx
ppt icitisee 2022_without_recording.pptx
 
Tehzeeb Seminar presentation ppt0000.pptx
Tehzeeb Seminar presentation ppt0000.pptxTehzeeb Seminar presentation ppt0000.pptx
Tehzeeb Seminar presentation ppt0000.pptx
 
riview paper on content based image indexing rerival
riview paper on content based image indexing rerivalriview paper on content based image indexing rerival
riview paper on content based image indexing rerival
 
1 [Autosaved].pptx
1 [Autosaved].pptx1 [Autosaved].pptx
1 [Autosaved].pptx
 
Depth Fusion from RGB and Depth Sensors II
Depth Fusion from RGB and Depth Sensors IIDepth Fusion from RGB and Depth Sensors II
Depth Fusion from RGB and Depth Sensors II
 
The Importance of Terminology and sRGB Uncertainty - Notes - 0.5
The Importance of Terminology and sRGB Uncertainty - Notes - 0.5The Importance of Terminology and sRGB Uncertainty - Notes - 0.5
The Importance of Terminology and sRGB Uncertainty - Notes - 0.5
 
An Introduction to digital image processing
An Introduction to digital image processingAn Introduction to digital image processing
An Introduction to digital image processing
 
Enhanced characterness for text detection in the wild
Enhanced characterness for text detection in the wildEnhanced characterness for text detection in the wild
Enhanced characterness for text detection in the wild
 
Surface Normal Prediction using Hypercolumn Skip-Net & Normal-Depth
Surface Normal Prediction using Hypercolumn Skip-Net & Normal-DepthSurface Normal Prediction using Hypercolumn Skip-Net & Normal-Depth
Surface Normal Prediction using Hypercolumn Skip-Net & Normal-Depth
 

Dernier

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Dernier (20)

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 

Face spoofing detection using texture analysis

  • 2. CONTENTS • INTRODUCTION • EXISTING METHOD • PROPOSED METHOD • ADVANTAGES • APPLICATIONS • CONCLUSION AND FUTURE SCOPE • REFERENCES
  • 3. INTRODUCTION • Detection using colour texture analysis • Information from luminanace and chrominance are collected • Existing method focussed on analysis of luminanace information of face images and discarding chroma component • Observed fake image have lower image quality with lack of high frequency information
  • 4. Contd… • Fake images are identified by analysing chroma component than luminance • Preliminary colour texture analysis approach is proposed • Non intrusive software based detection focus on gray scale images, discarding colour information
  • 5. EXISTING METHOD • Hardware based solution appoach  Surface reflectance properties are used  Thermal information are for detecting printed and replayed video attacks  But are intrusive, expensive or impractical since unconventional imaging devices are required
  • 6. Contd… • Challenge response approach  Specific action is choosed as challenge and actually performed or not, is response • Non intrusive approach  No user co-operation is required  Assessed by commonly used any database  Categorized into static and dynamic tech
  • 7. Contd…  High resolution input image are required to extract fine details  Generation capabilities are not clear due to lack of training and testing set  Colour local binary patterns descriptor is only used
  • 8. PROPOSED METHOD • Face spoofing attacks mostly performed by displaying using prints, video displays or masks • Detect by analysing texture and quality of captured gray scale image • Discriminating genuine faces from fake ones by insight image into three colour spaces RGB, HSV, YCbCr
  • 9. Contd… • Performance of different facial colour texture representation is compared to their gray scale
  • 10. Contd… • Similarity between LBP descriptions extracted from face 1 and face 2 for printed and video attacks • Similarity is measured using the chi-square distance • Hx and Hy are two LBP histograms
  • 11. • Chi-square distance between gray-scale LBP histograms of the genuine face and the printed fake face is smaller than the one between two genuine face images
  • 12. Contd… • Mean LBP histograms for both real and fake face images to compute a Chi-square distance as • Hx is the LBP histogram of test sample and Hr & Hf are the reference histograms for real and fake faces
  • 14. • Score distributions of the real faces and spoofs in the gray- scale and YCbCr colour space. • Chi-square statistics of the real and fake face descriptions in the gray-scale space and Y channel are overlapping • Better separated in the chroma components of the YCbCr space. Contd…
  • 16. Contd… • Face is detected, cropped and normalised into an M×N pixel image • Texture descriptions are extracted from each colour channel • Resulting feature vectors are concatenated into an enhanced feature vector to get an overall representation of the facial colour texture • Final feature vector is fed to a binary classifier • Output score value describes whether there is a live person or a fake one in front of the camera
  • 17. Contd… • Facial representations extracted from different colour spaces using different texture descriptors can also be concatenated • Colour space  Two other colour spaces, HSV and YCbCr, to explore the colour texture information in addition to RGB  HSV colour space, hue and saturation dimensions define the chrominance and while the value dimension corresponds to the luminance
  • 18. Contd…  YCbCr space separates the RGB components into Y, Cb and Cr • Texture Descriptors  Designed for gray- scale images can be applied on colour images by combining the features extracted from different colour channels  5 descriptors
  • 19. Contd…  Local Binary Patterns (LBP) • Binary code computed by thresholding • Binary patterns are collected into histograms  Co-occurrence of Adjacent Local Binary Patterns (CoALBP) • LBP discards spatial information • To exploit the spatial relation between patterns
  • 20. Contd…  Local Phase Quantization (LPQ) • Deal with blurred image • Phase information extracted by STFT to analyse neighbourhood • Quantized and collected into histograms  Binarized Statistical Image Features (BSIF) • Convolving the image with linear filter and binarizing filter response
  • 21. Contd…  Scale-Invariant Descriptor (SID) • Image is first re-sampled densely enough on a log-polar grid, rotations and scalings in the original image domain • Fourier transform is applied on the re-sampled image, invariance to both scale and rotation is achieved
  • 22. ADVANTAGES • Do not require any additional sensor • Focused on both printed and replayed video attacks • Good generalization ability • Low computational complexity • Fast response • CTA features are more robust
  • 23. APPLICATIONS • Authentication system • Registration purpose • Mobile payment • Unlocking system • Security purpose
  • 24. CONCLUSION AND FUTURE SCOPE • Approach the problem of face anti-spoofing from the colour texture analysis • Colour image representations can used for describing the intrinsic disparities in colour texture • Facial colour texture representations studied by extracting different local descriptors • Improving generalization capabilities of colour texture analysis based face spoofing detection
  • 25. REFERENCES [1] Zinelabidine Boulkenafet, Jukka Komulainen, and Abdenour Hadid,”Face Spoofing Detection Using Colour Texture Analysis”, IEEE Transactions On Information Forensics And Security, Vol. 11, No. 8, August 2016. [2] Y. Li, K. Xu, Q. Yan, Y. Li, and R. H. Deng, “Understanding OSN-based facial disclosure against face authentication systems,” in Proc. 9th ACM Symp. Inf., Comput. Commun. Secur. (ASIA CCS), 2014, pp. 413–424. [3] J. Li, Y. Wang, T. Tan, and A. K. Jain, “Live face detection based on the analysis of Fourier spectra,” Proc. SPIE, vol. 5404, pp. 296–303, Aug. 2004. [4] X. Tan, Y. Li, J. Liu, and L. Jiang, “Face liveness detection from a single image with sparse low rank bilinear discriminative model,” in Proc. 11th Eur. Conf. Comput. Vis., VI (ECCV), 2010, pp. 504–517. [5] Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, and S. Z. Li, “A face antispoofing database with diverse attacks,” in Proc. 5th IAPR Int. Conf. Biometrics (ICB), Mar./Apr. 2012, pp. 26–31.