• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tian Ye, Xiang Shijun. LBP and Multilayer DCT Based Anti-Spoofing Countermeasure in Face Liveness Detection[J]. Journal of Computer Research and Development, 2018, 55(3): 643-650. DOI: 10.7544/issn1000-1239.2018.20160417
Citation: Tian Ye, Xiang Shijun. LBP and Multilayer DCT Based Anti-Spoofing Countermeasure in Face Liveness Detection[J]. Journal of Computer Research and Development, 2018, 55(3): 643-650. DOI: 10.7544/issn1000-1239.2018.20160417

LBP and Multilayer DCT Based Anti-Spoofing Countermeasure in Face Liveness Detection

More Information
  • Published Date: February 28, 2018
  • As security problem has become the tightest bottleneck in the application of face recognition systems, rendering a face recognition system robust against spoof attacks is of great significance to be dealt with. In this paper, aimed at video-based facial spoof attacks, an innovative face antispoofing algorithm based on local binary patterns (LBP) and multilayer discrete cosine transform (DCT) is proposed. First, we extract face images from a target video at a fixed time interval. Second, the low-level descriptors, i.e., the LBP features are generated for each extracted face image. After that, we perform multilayer DCT on the low-level descriptors to obtain the high-level descriptors (LBP-MDCT features). To be more exact, in each layer, the DCT operation is implemented along the ordinate axis of the obtained low-level descriptors, namely the time axis of the entire target video. In the last stage, the high-level descriptors are fed into a support vector machine (SVM) classifier to determine whether the target video is a spoof attack or a valid access. In contrast to existing approaches, the outstanding experimental results attained by the proposed approach on two widely-used datasets (Replay-Attack dataset and CASIA-FASD dataset) demonstrat its performance superiority as well as its low complexity and high efficiency.
  • Related Articles

    [1]Qin Xiongjun, Zhang Jiacheng, Lu Youyou, Shu Jiwu. A Key-Value Database Optimization Method Based on Raw Flash Device[J]. Journal of Computer Research and Development, 2017, 54(6): 1326-1336. DOI: 10.7544/issn1000-1239.2017.20170092
    [2]Miao Dongjing, Liu Xianmin, Li Jianzhong. An Algorithm on Mining Approximate Functional Dependencies in Probabilistic Database[J]. Journal of Computer Research and Development, 2015, 52(12): 2857-2865. DOI: 10.7544/issn1000-1239.2015.20140685
    [3]Xue Jinrong, An Qiusheng, Zheng Jun. Intent Reduction of Concept Lattice and Database Inference Dependence[J]. Journal of Computer Research and Development, 2014, 51(1): 96-103.
    [4]Tang Mingzhu, Yang Yan, Guo Xuequan, Shen Zhonghui, Zhong Yingli. KWSDS: A Top-k Keyword Search System in Relational Databases[J]. Journal of Computer Research and Development, 2012, 49(10): 2251-2259.
    [5]Chen Kunjie, Sun Weiwei, Zhu Liang, and Liu Weimo. An Adaptive Page-Replacement Strategy for Spatial Database Systems[J]. Journal of Computer Research and Development, 2011, 48(10): 1927-1934.
    [6]Xian Hequn, Feng Dengguo. An Integrity Checking Scheme in Outsourced Database Model[J]. Journal of Computer Research and Development, 2010, 47(6): 1107-1115.
    [7]Yin Baocai, Sun Yanfeng, Wang Chengzhang, and Ge Yun. BJUT-3D Large Scale 3D Face Database and Information Processing[J]. Journal of Computer Research and Development, 2009, 46(6): 1009-1018.
    [8]Cai Hongyan, Yao Jiali, and Wang Shan. DETECTOR: A Universal On-Line Keyword Search System over Relational Database[J]. Journal of Computer Research and Development, 2007, 44(1): 119-125.
    [9]Yan Heping, Wang Zhengfei, Wang Wei, Shi Baile. Inference Based Security Database Auditing Framework[J]. Journal of Computer Research and Development, 2006, 43(9): 1630-1638.
    [10]Liao Guoqiong, Liu Yunsheng, Xiao Yingyuan. A Partition Fuzzy Checkpointing Strategy for Real-Time Main Memory Databases[J]. Journal of Computer Research and Development, 2006, 43(7): 1291-1296.
  • Cited by

    Periodical cited type(15)

    1. 邓可望,赵娟,肖振中,师少光,朱亮. 基于多光谱和面部多区域联合的人脸活体检测算法. 集成技术. 2024(01): 72-81 .
    2. 祁春阳,黄杰,赵翔宇,汪周红. 云边协同的轻量级网络结构人脸识别方法. 东南大学学报(自然科学版). 2023(01): 1-13 .
    3. 谢晓华 ,卞锦堂 ,赖剑煌 . 人脸活体检测综述. 中国图象图形学报. 2022(01): 63-87 .
    4. 陈晋音,吴长安,郑海斌. 基于softmax激活变换的对抗防御方法. 网络与信息安全学报. 2022(02): 48-63 .
    5. 封筠,董祉怡,刘甜甜,韩超群,胡晶晶. 融合DQ_CoALBP和LPQ算子的人脸活体检测. 计算机工程与应用. 2022(14): 134-143 .
    6. 伊力哈木·亚尔买买提,张伟. 一种新的人脸面部表情识别算法研究. 电子器件. 2021(03): 616-623 .
    7. 马思源,郑涵,郭文. 应用深度光学应变特征图的人脸活体检测. 中国图象图形学报. 2020(03): 618-628 .
    8. 颜健. 基于特征融合与支持向量机的人脸活体检测技术. 数字技术与应用. 2020(05): 46-47 .
    9. 束鑫,唐慧,杨习贝,宋晓宁,吴小俊. 基于差分量化局部二值模式的人脸反欺诈算法研究. 计算机研究与发展. 2020(07): 1508-1521 . 本站查看
    10. 黄俊,张娜娜,章惠. 融合头部姿态和面部表情的互动式活体检测. 计算机应用. 2020(07): 2089-2095 .
    11. 唐慧,束鑫,杨习贝,李玥. 基于分块彩色MB_-LBP纹理的人脸反欺诈算法. 江苏科技大学学报(自然科学版). 2020(03): 48-53 .
    12. 吴启群,宋晓宁. 联合多通道特征与最小二乘决策的人脸反欺诈方法. 计算机应用研究. 2020(09): 2847-2850 .
    13. 施新岚,黄俊,黄洋,许二敏. 基于Gabor纹理增强的人脸活体检测算法. 重庆邮电大学学报(自然科学版). 2020(06): 1023-1030 .
    14. 田中可,陈成军,李东年,赵正旭. 基于PX-LBP和像素分类的装配体零件识别研究. 机电工程. 2019(03): 236-243 .
    15. 刘伟,章琬苓,项世军. 基于LBP-MDCT和CNN的人脸活体检测算法. 应用科学学报. 2019(05): 609-617 .

    Other cited types(22)

Catalog

    Article views (1946) PDF downloads (977) Cited by(37)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return