M3FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System (2301.12831v3)
Abstract: Face presentation attacks (FPA), also known as face spoofing, have brought increasing concerns to the public through various malicious applications, such as financial fraud and privacy leakage. Therefore, safeguarding face recognition systems against FPA is of utmost importance. Although existing learning-based face anti-spoofing (FAS) models can achieve outstanding detection performance, they lack generalization capability and suffer significant performance drops in unforeseen environments. Many methodologies seek to use auxiliary modality data (e.g., depth and infrared maps) during the presentation attack detection (PAD) to address this limitation. However, these methods can be limited since (1) they require specific sensors such as depth and infrared cameras for data capture, which are rarely available on commodity mobile devices, and (2) they cannot work properly in practical scenarios when either modality is missing or of poor quality. In this paper, we devise an accurate and robust MultiModal Mobile Face Anti-Spoofing system named M3FAS to overcome the issues above. The primary innovation of this work lies in the following aspects: (1) To achieve robust PAD, our system combines visual and auditory modalities using three commonly available sensors: camera, speaker, and microphone; (2) We design a novel two-branch neural network with three hierarchical feature aggregation modules to perform cross-modal feature fusion; (3). We propose a multi-head training strategy, allowing the model to output predictions from the vision, acoustic, and fusion heads, resulting in a more flexible PAD. Extensive experiments have demonstrated the accuracy, robustness, and flexibility of M3FAS under various challenging experimental settings. The source code and dataset are available at: https://github.com/ChenqiKONG/M3FAS/
- “Afr market,” [EB/OL], 2021, https://bwnews.pr/2OqY0nD.
- K. Patel, H. Han, and A. K. Jain, “Secure face unlock: Spoof detection on smartphones,” IEEE transactions on information forensics and security, vol. 11, no. 10, pp. 2268–2283, 2016.
- J. Määttä, A. Hadid, and M. Pietikäinen, “Face spoofing detection from single images using micro-texture analysis,” in 2011 international joint conference on Biometrics (IJCB). IEEE, 2011, pp. 1–7.
- T. de Freitas Pereira, A. Anjos, J. M. De Martino, and S. Marcel, “Lbp- top based countermeasure against face spoofing attacks,” in Asian Conference on Computer Vision. Springer, 2012, pp. 121–132.
- J. Komulainen, A. Hadid, and M. Pietikäinen, “Context based face anti-spoofing,” in 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 2013, pp. 1–8.
- D. Wen, H. Han, and A. K. Jain, “Face spoof detection with image distortion analysis,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 4, pp. 746–761, 2015.
- Z. Boulkenafet, J. Komulainen, and A. Hadid, “Face antispoofing using speeded-up robust features and fisher vector encoding,” IEEE Signal Processing Letters, vol. 24, no. 2, pp. 141–145, 2016.
- A. Liu, Z. Tan, J. Wan, Y. Liang, Z. Lei, G. Guo, and S. Z. Li, “Face anti-spoofing via adversarial cross-modality translation,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2759–2772, 2021.
- W. Sun, Y. Song, C. Chen, J. Huang, and A. C. Kot, “Face spoofing detection based on local ternary label supervision in fully convolutional networks,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3181–3196, 2020.
- Z. Wang, Z. Yu, C. Zhao, X. Zhu, Y. Qin, Q. Zhou, F. Zhou, and Z. Lei, “Deep spatial gradient and temporal depth learning for face anti-spoofing,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 5042–5051.
- A. Pinto, S. Goldenstein, A. Ferreira, T. Carvalho, H. Pedrini, and A. Rocha, “Leveraging shape, reflectance and albedo from shading for face presentation attack detection,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3347–3358, 2020.
- W. Liu, X. Wei, T. Lei, X. Wang, H. Meng, and A. K. Nandi, “Data fusion based two-stage cascade framework for multi-modality face anti-spoofing,” IEEE Transactions on Cognitive and Developmental Systems, 2021.
- O. Nikisins, A. George, and S. Marcel, “Domain adaptation in multi-channel autoencoder based features for robust face anti-spoofing,” in 2019 International Conference on Biometrics (ICB). IEEE, 2019, pp. 1–8.
- R. Nandakumar, V. Iyer, D. Tan, and S. Gollakota, “Fingerio: Using active sonar for fine-grained finger tracking,” in Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 2016, pp. 1515––1525.
- K. Ling, H. Dai, Y. Liu, and A. X. Liu, “Ultragesture: Fine-grained gesture sensing and recognition,” in 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, 2018, pp. 1––9.
- Z. Liao, Z. Luo, Q. Huang, L. Zhang, F. Wu, Q. Zhang, and Y. Wang, “Smart: screen-based gesture recognition on commodity mobile devices,” in Proceedings of the 27th Annual International Conference on Mobile Computing and Networking, 2021, pp. 283–295.
- Y. Yu, D. Wang, R. Zhao, and Q. Zhang, “Rfid based real-time recognition of ongoing gesture with adversarial learning,” in Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019, pp. 298–310.
- W. Xu, J. Liu, S. Zhang, Y. Zheng, F. Lin, J. Han, F. Xiao, and K. Ren, “Rface: Anti-spoofing facial authentication using cots rfid,” in IEEE INFOCOM 2021-IEEE Conference on Computer Communications. IEEE, 2021, pp. 1–10.
- B. Zhou, J. Lohokare, R. Gao, and F. Ye, “Echoprint: Two-factor authentication using acoustics and vision on smartphones,” in Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018, pp. 321–336.
- C. Kong, K. Zheng, S. Wang, A. Rocha, and H. Li, “Beyond the pixel world: A novel acoustic-based face anti-spoofing system for smartphones,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3238–3253, 2022.
- C. Kong, S. Wang, and H. Li, “Digital and physical face attacks: Reviewing and one step further,” arXiv preprint arXiv:2209.14692, 2022.
- X. Tan, Y. Li, J. Liu, and L. Jiang, “Face liveness detection from a single image with sparse low rank bilinear discriminative model,” in European Conference on Computer Vision. Springer, 2010, pp. 504–517.
- J. Yang, Z. Lei, and S. Z. Li, “Learn convolutional neural network for face anti-spoofing,” arXiv preprint arXiv:1408.5601, 2014.
- K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
- O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein et al., “Imagenet large scale visual recognition challenge,” International journal of computer vision, vol. 115, no. 3, pp. 211–252, 2015.
- H. Ge, X. Tu, W. Ai, Y. Luo, Z. Ma, and M. Xie, “Face anti-spoofing by the enhancement of temporal motion,” in 2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC). IEEE, 2020, pp. 106–111.
- Z. Xu, S. Li, and W. Deng, “Learning temporal features using lstm-cnn architecture for face anti-spoofing,” in 2015 3rd IAPR asian conference on pattern recognition (ACPR). IEEE, 2015, pp. 141–145.
- U. Muhammad, T. Holmberg, W. C. de Melo, and A. Hadid, “Face anti-spoofing via sample learning based recurrent neural network (rnn).” in BMVC, 2019, p. 113.
- X. Yang, W. Luo, L. Bao, Y. Gao, D. Gong, S. Zheng, Z. Li, and W. Liu, “Face anti-spoofing: Model matters, so does data,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 3507–3516.
- Z. Yu, J. Wan, Y. Qin, X. Li, S. Z. Li, and G. Zhao, “Nas-fas: Static-dynamic central difference network search for face anti-spoofing,” IEEE transactions on pattern analysis and machine intelligence, vol. 43, no. 9, pp. 3005–3023, 2020.
- Y. Atoum, Y. Liu, A. Jourabloo, and X. Liu, “Face anti-spoofing using patch and depth-based cnns,” in 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 2017, pp. 319–328.
- Y. Liu, A. Jourabloo, and X. Liu, “Learning deep models for face anti-spoofing: Binary or auxiliary supervision,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp. 389–398.
- Z. Yu, C. Zhao, Z. Wang, Y. Qin, Z. Su, X. Li, F. Zhou, and G. Zhao, “Searching central difference convolutional networks for face anti-spoofing,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 5295–5305.
- R. Cai, Z. Li, R. Wan, H. Li, Y. Hu, and A. C. Kot, “Learning meta pattern for face anti-spoofing,” IEEE Transactions on Information Forensics and Security, 2022.
- R. Cai, Z. Yu, C. Kong, H. Li, C. Chen, Y. Hu, and A. Kot, “S-adapter: Generalizing vision transformer for face anti-spoofing with statistical tokens,” arXiv preprint arXiv:2309.04038, 2023.
- T. Shen, Y. Huang, and Z. Tong, “Facebagnet: Bag-of-local-features model for multi-modal face anti-spoofing,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2019, pp. 0–0.
- Z. Yu, Y. Qin, X. Li, Z. Wang, C. Zhao, Z. Lei, and G. Zhao, “Multi-modal face anti-spoofing based on central difference networks,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2020, pp. 650–651.
- A. Liu, Z. Tan, J. Wan, S. Escalera, G. Guo, and S. Z. Li, “Casia-surf cefa: A benchmark for multi-modal cross-ethnicity face anti-spoofing,” in Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2021, pp. 1179–1187.
- A. Luo, C. Kong, J. Huang, Y. Hu, X. Kang, and A. C. Kot, “Beyond the prior forgery knowledge: Mining critical clues for general face forgery detection,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 1168–1182, 2023.
- C. Kong, H. Li, and S. Wang, “Enhancing general face forgery detection via vision transformer with low-rank adaptation,” arXiv preprint arXiv:2303.00917, 2023.
- A. Liu, X. Li, J. Wan, Y. Liang, S. Escalera, H. J. Escalante, M. Madadi, Y. Jin, Z. Wu, X. Yu et al., “Cross-ethnicity face anti-spoofing recognition challenge: A review,” IET Biometrics, vol. 10, no. 1, pp. 24–43, 2021.
- A. Liu and Y. Liang, “Ma-vit: Modality-agnostic vision transformers for face anti-spoofing,” arXiv preprint arXiv:2304.07549, 2023.
- X. Li, J. Komulainen, G. Zhao, P.-C. Yuen, and M. Pietikäinen, “Generalized face anti-spoofing by detecting pulse from face videos,” in 2016 23rd International Conference on Pattern Recognition (ICPR). IEEE, 2016, pp. 4244–4249.
- Z. Yu, R. Cai, Z. Li, W. Yang, J. Shi, and A. C. Kot, “Benchmarking joint face spoofing and forgery detection with visual and physiological cues,” arXiv preprint arXiv:2208.05401, 2022.
- B. Lin, X. Li, Z. Yu, and G. Zhao, “Face liveness detection by rppg features and contextual patch-based cnn,” in Proceedings of the 2019 3rd international conference on biometric engineering and applications, 2019, pp. 61–68.
- Z. Yu, W. Peng, X. Li, X. Hong, and G. Zhao, “Remote heart rate measurement from highly compressed facial videos: an end-to-end deep learning solution with video enhancement,” in Proceedings of the IEEE/CVF International Conference on Computer Vision, 2019, pp. 151–160.
- A. Liu, J. Wan, S. Escalera, H. Jair Escalante, Z. Tan, Q. Yuan, K. Wang, C. Lin, G. Guo, I. Guyon et al., “Multi-modal face anti-spoofing attack detection challenge at cvpr2019,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2019, pp. 0–0.
- H. Kuang, R. Ji, H. Liu, S. Zhang, X. Sun, F. Huang, and B. Zhang, “Multi-modal multi-layer fusion network with average binary center loss for face anti-spoofing,” in Proceedings of the 27th ACM International Conference on Multimedia, 2019, pp. 48–56.
- F. Jiang, P. Liu, X. Shao, and X. Zhou, “Face anti-spoofing with generated near-infrared images,” Multimedia Tools and Applications, vol. 79, no. 29, pp. 21 299–21 323, 2020.
- P. Zhang, F. Zou, Z. Wu, N. Dai, S. Mark, M. Fu, J. Zhao, and K. Li, “Feathernets: Convolutional neural networks as light as feather for face anti-spoofing,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2019, pp. 0–0.
- Y. Liu, J. Stehouwer, and X. Liu, “On disentangling spoof trace for generic face anti-spoofing,” in European Conference on Computer Vision. Springer, 2020, pp. 406–422.
- M. S. Hossain, L. Rupty, K. Roy, M. Hasan, S. Sengupta, and N. Mohammed, “A-deeppixbis: Attentional angular margin for face anti-spoofing,” in 2020 Digital Image Computing: Techniques and Applications (DICTA). IEEE, 2020, pp. 1–8.
- Z. Yu, Y. Qin, X. Xu, C. Zhao, Z. Wang, Z. Lei, and G. Zhao, “Auto-fas: Searching lightweight networks for face anti-spoofing,” in ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2020, pp. 996–1000.
- A. George and S. Marcel, “Deep pixel-wise binary supervision for face presentation attack detection,” in 2019 International Conference on Biometrics (ICB). IEEE, 2019, pp. 1–8.
- Y. Liu, J. Stehouwer, A. Jourabloo, and X. Liu, “Deep tree learning for zero-shot face anti-spoofing,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 4680–4689.
- T. Kim, Y. Kim, I. Kim, and D. Kim, “Basn: Enriching feature representation using bipartite auxiliary supervisions for face anti-spoofing,” in Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2019, pp. 0–0.
- Y. Zhang, Z. Yin, Y. Li, G. Yin, J. Yan, J. Shao, and Z. Liu, “Celeba-spoof: Large-scale face anti-spoofing dataset with rich annotations,” in European Conference on Computer Vision. Springer, 2020, pp. 70–85.
- Z. Yu, X. Li, X. Niu, J. Shi, and G. Zhao, “Face anti-spoofing with human material perception,” in European Conference on Computer Vision. Springer, 2020, pp. 557–575.
- Y. Chen, J. Sun, X. Jin, T. Li, R. Zhang, and Y. Zhang, “Your face your heart: Secure mobile face authentication with photoplethysmograms,” in IEEE INFOCOM 2017-IEEE Conference on Computer Communications. IEEE, 2017, pp. 1–9.
- “About face id advanced technology,” https://support.apple.com/en-us/HT208108., 2018.
- H. Farrukh, R. M. Aburas, S. Cao, and H. Wang, “Facerevelio: a face liveness detection system for smartphones with a single front camera,” in Proceedings of the 26th Annual International Conference on Mobile Computing and Networking, 2020, pp. 1–13.
- D. Tang, Z. Zhou, Y. Zhang, and K. Zhang, “Face flashing: a secure liveness detection protocol based on light reflections,” arXiv preprint arXiv:1801.01949, 2018.
- M. Zhou, Q. Wang, Q. Li, P. Jiang, J. Yang, C. Shen, C. Wang, and S. Ding, “Securing face liveness detection using unforgeable lip motion patterns,” arXiv preprint arXiv:2106.08013, 2021.
- H. Chen, W. Wang, J. Zhang, and Q. Zhang, “Echoface: Acoustic sensor-based media attack detection for face authentication,” IEEE Internet of Things Journal, vol. 7, no. 3, pp. 2152–2159, 2019.
- B. Zhou, Z. Xie, Y. Zhang, J. Lohokare, R. Gao, and F. Ye, “Robust human face authentication leveraging acoustic sensing on smartphones,” IEEE Transactions on Mobile Computing, pp. 1–1, 2021.
- ——, “Robust human face authentication leveraging acoustic sensing on smartphones,” IEEE Transactions on Mobile Computing, vol. 21, no. 8, pp. 3009–3023, 2021.
- F. J. Harris, “On the use of windows for harmonic analysis with the discrete fourier transform,” Proceedings of the IEEE, vol. 66, no. 1, pp. 51–83, 1978.
- G. Pan, L. Sun, Z. Wu, and S. Lao, “Eyeblink-based anti-spoofing in face recognition from a generic webcamera,” in 2007 IEEE 11th international conference on computer vision. IEEE, 2007, pp. 1–8.
- A. Anjos and S. Marcel, “Counter-measures to photo attacks in face recognition: a public database and a baseline,” in 2011 international joint conference on Biometrics (IJCB). IEEE, 2011, pp. 1–7.
- Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, and S. Z. Li, “A face antispoofing database with diverse attacks,” in 2012 5th IAPR international conference on Biometrics (ICB). IEEE, 2012, pp. 26–31.
- I. Chingovska, A. Anjos, and S. Marcel, “On the effectiveness of local binary patterns in face anti-spoofing,” in 2012 BIOSIG-proceedings of the international conference of biometrics special interest group (BIOSIG). IEEE, 2012, pp. 1–7.
- K. Patel, H. Han, A. K. Jain, and G. Ott, “Live face video vs. spoof face video: Use of moiré patterns to detect replay video attacks,” in 2015 International Conference on Biometrics (ICB). IEEE, 2015, pp. 98–105.
- I. Chingovska, N. Erdogmus, A. Anjos, and S. Marcel, “Face recognition systems under spoofing attacks,” in Face Recognition Across the Imaging Spectrum. Springer, 2016, pp. 165–194.
- Z. Boulkenafet, J. Komulainen, L. Li, X. Feng, and A. Hadid, “Oulu-npu: A mobile face presentation attack database with real-world variations,” in 2017 12th IEEE international conference on automatic face & gesture recognition (FG 2017). IEEE, 2017, pp. 612–618.
- H. Li, W. Li, H. Cao, S. Wang, F. Huang, and A. C. Kot, “Unsupervised domain adaptation for face anti-spoofing,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 7, pp. 1794–1809, 2018.
- Y. Zhang, Z. Yin, Y. Li, G. Yin, J. Yan, J. Shao, and Z. Liu, “Celeba-spoof: Large-scale face anti-spoofing dataset with rich annotations,” in European Conference on Computer Vision (ECCV), 2020.
- J. M. Di Martino, Q. Qiu, and G. Sapiro, “Rethinking shape from shading for spoofing detection,” IEEE Transactions on Image Processing, vol. 30, pp. 1086–1099, 2020.
- D. E. King, “Dlib-ml: A machine learning toolkit,” The Journal of Machine Learning Research, vol. 10, pp. 1755–1758, 2009.
- C. Kong, B. Chen, W. Yang, H. Li, P. Chen, and S. Wang, “Appearance matters, so does audio: Revealing the hidden face via cross-modality transfer,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 1, pp. 423–436, 2021.
- A. Paszke, S. Gross, F. Massa, A. Lerer, J. Bradbury, G. Chanan, T. Killeen, Z. Lin, N. Gimelshein, L. Antiga et al., “Pytorch: An imperative style, high-performance deep learning library.” in NeurIPS, 2019.
- D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” arXiv preprint arXiv:1412.6980, 2014.
- M. Gao, Y. Liu, Y. Chen, Y. Li, Z. Ba, X. Xu, J. Han, and K. Ren, “Device-independent smartphone eavesdropping jointly using accelerometer and gyroscope,” IEEE Transactions on Dependable and Secure Computing, 2022.
- D. Liu, Q. Wang, M. Zhou, P. Jiang, Q. Li, C. Shen, and C. Wang, “Soundid: Securing mobile two-factor authentication via acoustic signals,” IEEE Transactions on Dependable and Secure Computing, 2022.
- B. Chen, W. Yang, H. Li, S. Wang, and S. Kwong, “Camera invariant feature learning for generalized face anti-spoofing,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2477–2492, 2021.
- A. K. Jain, D. Deb, and J. J. Engelsma, “Biometrics: Trust, but verify,” IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 4, no. 3, pp. 303–323, 2021.
- K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 770–778.
- G. Huang, Z. Liu, L. Van Der Maaten, and K. Q. Weinberger, “Densely connected convolutional networks,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2017, pp. 4700–4708.
- H. Zhang, W. Hu, and X. Wang, “Parc-net: Position aware circular convolution with merits from convnets and transformer,” in European Conference on Computer Vision. Springer, 2022, pp. 613–630.
- M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, and L.-C. Chen, “Mobilenetv2: Inverted residuals and linear bottlenecks,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp. 4510–4520.
- Chenqi Kong (19 papers)
- Kexin Zheng (4 papers)
- Yibing Liu (12 papers)
- Shiqi Wang (163 papers)
- Anderson Rocha (40 papers)
- Haoliang Li (67 papers)