Skip to main content

Remote Blood Pulse Analysis for Face Presentation Attack Detection

  • Chapter
  • First Online:
Handbook of Biometric Anti-Spoofing

Abstract

In this chapter, the usage of Remote Photoplethysmography (rPPG) as a mean for face presentation attack detection is investigated. Remote photoplethysmography consists in retrieving the heart-rate of a subject from a video sequence containing some skin, and recorded at a distance. To get a pulse signal, such methods take advantage of subtle color variation on skin pixels due to the blood flowing through vessels. Since the inferred pulse signal gives information on the liveness of the recorded subject, it can be used for biometric presentation attack detection (PAD). Inspired by work made for speaker presentation attack detection, we propose to use long-term spectral statistical features of the pulse signal to discriminate real accesses from attack attempts. A thorough experimental evaluation, with different rPPG and classification algorithms is carried on four publicly available datasets containing a wide range of face presentation attacks. Obtained results suggest that the proposed features are effective for this task, and we empirically show that our approach performs better than state-of-the-art rPPG-based presentation attack detection algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Source code and results https://gitlab.idiap.ch/bob/bob.hobpad2.chapter13.

  2. 2.

    https://pypi.python.org/pypi/bob.rppg.base.

References

  1. Liu S, Yang B, Yuen PC, Zhao G (2016) A 3D mask face anti-spoofing database with real world variations. In: IEEE conference computer vision and pattern recognition workshops (CVPRW), pp 1551–1557

    Google Scholar 

  2. Galbally J, Marcel S, Fierrez J (2014) Biometric antispoofing methods: a survey in face recognition. IEEE Access 2:1530–1552

    Article  Google Scholar 

  3. Li L, Correia PL, Hadid A (2018) Face recognition under spoofing attacks: countermeasures and research directions. IET Biom 7(1):3–14

    Article  Google Scholar 

  4. Pan G, Sun L, Wu Z, Lao S (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: International conference on computer vision (ICCV), pp 1–8

    Google Scholar 

  5. Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: International joint conference on biometrics, pp 1–7

    Google Scholar 

  6. Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: International conference of the biometrics special interest group, pp 1–7. IEEE

    Google Scholar 

  7. Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761

    Google Scholar 

  8. Caetano Garcia D, de Queiroz R (2015) Face-spoofing 2D-detection based on Moire-pattern analysis. IEEE Trans Inf Forensics Secur 10(4):778–786

    Article  Google Scholar 

  9. de Freitas Pereira T, Anjos A, Martino JMD, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: International conference on biometrics (ICB), pp 1–8

    Google Scholar 

  10. Patel K, Han H, Jain AK (2016) Cross-database face antispoofing with robust feature representation. In: Chinese conference on biometric recognition. Lecture Notes in Computer Science (LNCS), vol 9967. LNCS, pp 611–619

    Chapter  Google Scholar 

  11. Patel K, Han H, Jain AK (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268–2283

    Article  Google Scholar 

  12. Verkruysse W, Svaasand L, Nelson J (2008) Remote plethysmographic imaging using ambient light. Opt Express 16(26):21434–21445

    Article  Google Scholar 

  13. Poh M, McDuff D, Picard R (2010) Non-contact, automated cardiac pulse measurements using video imaging and blind source separation. Opt Express 18(10)

    Article  Google Scholar 

  14. Lewandowska M, Ruminski J, Kocejko T, Nowak J (2011) Measuring pulse rate with a webcam—a non-contact method for evaluating cardiac activity. In: Proceedings federated conference on computer science and information systems, pp 405–410

    Google Scholar 

  15. McDuff D, Estepp J, Piasecki A, Blackford E (2015) A survey of remote optical photoplethysmographic imaging methods. In: IEEE international conference of the engineering in medicine and biology society (EMBC), pp 6398–6404

    Google Scholar 

  16. Wang W, den Brinker AC, Stuijk S, de Haan G (2017) Algorithmic principles of remote PPG. IEEE Trans Biomed Eng 64:1479–1491

    Article  Google Scholar 

  17. de Haan G, van Leest A (2014) Improved motion robustness of remote-PPG by using the blood volume pulse signature. Physiol Meas 35(9):1913

    Article  Google Scholar 

  18. Lin YC, Lin YH (2017) A study of color illumination effect on the SNR of rPPG signals. In: International conference on engineering in medicine and biology society (EMBC), pp 4301–4304

    Google Scholar 

  19. McDuff DJ, Blackford EB, Estepp JR (2017) The impact of video compression on remote cardiac pulse measurement using imaging photoplethysmography. In: IEEE international conference on automatic face and gesture recognition (AFGR), pp 63–70

    Google Scholar 

  20. Liu S, Yuen P, Zhang S, Zhao G (2016) 3D mask face anti-spoofing with remote photoplethysmography. In: European conference on computer vision (ECCV), pp 85–100

    Google Scholar 

  21. Li X, Komulainen J, Zhao G, Yuen PC, Pietikäinen M (2016) Generalized face anti-spoofing by detecting pulse from face videos. In: International conference on pattern recognition (ICPR), pp 4244–4249

    Google Scholar 

  22. Nowara EM, Sabharwal A, Veeraraghavan A (2017) PPGSecure: biometric presentation attack detection using photopletysmograms. In: IEEE international conference on automatic face and gesture recognition (AFGR), pp 56–62

    Google Scholar 

  23. Bhattacharjee S, Marcel S (2017) What you can’t see can help you—extended-range imaging for 3D-mask presentation attack detection. In: International conference of the biometrics special interest group, pp 1–7

    Google Scholar 

  24. Muckenhirn H, Korshunov P, Magimai-Doss M, Marcel S (2017) Long-term spectral statistics for voice presentation attack detection. IEEE/ACM Trans Audio Speech Lang Process 25(11):2098–2111

    Article  Google Scholar 

  25. Gibert G, D’Alessandro D, Lance F (2013) Face detection method based on photoplethysmography. In: IEEE international conference on advanced video and signal based surveillance, pp 449–453

    Google Scholar 

  26. Wang W, Stuijk S, de Haan G (2015) Unsupervised subject detection via remote PPG. IEEE Trans Biomed Eng 62(11):2629–2637

    Article  Google Scholar 

  27. Wang W, Stuijk S, de Haan G (2017) Living-skin classification via remote-PPG. IEEE Trans Biomed Eng 64(12):2781–2792

    Article  Google Scholar 

  28. de Haan G, Jeanne V (2013) Robust pulse rate from chrominance based rPPG. IEEE Trans Biomed Eng 60(10):2878–2886

    Article  Google Scholar 

  29. Erdogmus N, Marcel S (2013) Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect. In: Proceedings of biometrics: theory, applications and systems (BTAS)

    Google Scholar 

  30. Li X, Chen J, Zhao G, Pietikainen M (2014) Remote heart rate measurement from face videos under realistic situations. In: IEEE Conference on computer vision and pattern recognition (CVPR)

    Google Scholar 

  31. Arashloo S, Kittler J (2017) An anomaly detection approach to face spoofing detection: a new formulation and evaluation protocol. IEEE Access, 80–89

    Google Scholar 

  32. Nikisins O, Mohammadi A, Anjos A, Marcel S (2018) On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing. In: International conference on biometrics (ICB)

    Google Scholar 

  33. Alegre F, Amehraye A, Evans N (2013) A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns. In: IEEE international conference on biometrics: theory, applications and systems (BTAS)

    Google Scholar 

  34. Ding Y, Ross A (2016) An ensemble of one-class SVMs for fingerprint spoof detection across different fabrication materials. IEEE international workshop on information forensics and security (WIFS)

    Google Scholar 

  35. Wang W, Stuijk S, de Haan G (2015) A novel algorithm for remote photoplethysmography: spatial subspace rotation. IEEE Trans Biomed Eng

    Google Scholar 

  36. King DE (2009) Dlib-ml: a machine learning toolkit. J Mach Learn Res 10:1755–1758

    Google Scholar 

  37. Taylor M, Morris T (2014) Adaptive skin segmentation via feature-based face detection. In: SPIE proceedings, real-time image and video processing, vol 9139

    Google Scholar 

  38. Costa-Pazo A, Bhattacharjee S, Vazquez-Fernandez E, Marcel S (2016) The replay-mobile face presentation-attack database. In: International conference of the biometrics special interest group

    Google Scholar 

  39. Heusch G, Anjos A, Marcel S (2017) A reproducible study on remote heart rate measurement. arXiv

    Google Scholar 

  40. Anjos A, Günther M, de Freitas Pereira T, Korshunov P, Mohammadi A, Marcel S (2017) Continuously reproducing toolchains in pattern recognition and machine learning experiments. In: International conference on machine learning (ICML)

    Google Scholar 

  41. Anjos A, El Shafey L, Wallace R, Günther M, McCool C, Marcel S (2012) Bob: a free signal processing and machine learning toolbox for researchers. In: ACM conference on multimedia systems (ACMMM)

    Google Scholar 

  42. Korshunov P, Gonçalves A, Violato R, Simões F, Marcel S (2018) On the use of convolutional neural networks for speech presentation attack detection. In: International conference on identity, security and behavior analysis (ISBA)

    Google Scholar 

Download references

Acknowledgements

Part of this research is based upon work supported by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA), via IARPA R&D Contract No. 2017-17020200005. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the ODNI, IARPA, or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guillaume Heusch .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Heusch, G., Marcel, S. (2019). Remote Blood Pulse Analysis for Face Presentation Attack Detection. In: Marcel, S., Nixon, M., Fierrez, J., Evans, N. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-319-92627-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92627-8_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92626-1

  • Online ISBN: 978-3-319-92627-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics