{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T01:29:12Z","timestamp":1777598952301,"version":"3.51.4"},"reference-count":49,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2018,2,26]],"date-time":"2018-02-26T00:00:00Z","timestamp":1519603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Although face recognition systems have wide application, they are vulnerable to presentation attack samples (fake samples). Therefore, a presentation attack detection (PAD) method is required to enhance the security level of face recognition systems. Most of the previously proposed PAD methods for face recognition systems have focused on using handcrafted image features, which are designed by expert knowledge of designers, such as Gabor filter, local binary pattern (LBP), local ternary pattern (LTP), and histogram of oriented gradients (HOG). As a result, the extracted features reflect limited aspects of the problem, yielding a detection accuracy that is low and varies with the characteristics of presentation attack face images. The deep learning method has been developed in the computer vision research community, which is proven to be suitable for automatically training a feature extractor that can be used to enhance the ability of handcrafted features. To overcome the limitations of previously proposed PAD methods, we propose a new PAD method that uses a combination of deep and handcrafted features extracted from the images by visible-light camera sensor. Our proposed method uses the convolutional neural network (CNN) method to extract deep image features and the multi-level local binary pattern (MLBP) method to extract skin detail features from face images to discriminate the real and presentation attack face images. By combining the two types of image features, we form a new type of image features, called hybrid features, which has stronger discrimination ability than single image features. Finally, we use the support vector machine (SVM) method to classify the image features into real or presentation attack class. Our experimental results indicate that our proposed method outperforms previous PAD methods by yielding the smallest error rates on the same image databases.<\/jats:p>","DOI":"10.3390\/s18030699","type":"journal-article","created":{"date-parts":[[2018,2,27]],"date-time":"2018-02-27T04:20:47Z","timestamp":1519705247000},"page":"699","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":85,"title":["Combining Deep and Handcrafted Image Features for Presentation Attack Detection in Face Recognition Systems Using Visible-Light Camera Sensors"],"prefix":"10.3390","volume":"18","author":[{"given":"Dat Tien","family":"Nguyen","sequence":"first","affiliation":[{"name":"Division of Electronics and Electrical Engineering, Dongguk University, 30 Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"}]},{"given":"Tuyen Danh","family":"Pham","sequence":"additional","affiliation":[{"name":"Division of Electronics and Electrical Engineering, Dongguk University, 30 Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"}]},{"given":"Na Rae","family":"Baek","sequence":"additional","affiliation":[{"name":"Division of Electronics and Electrical Engineering, Dongguk University, 30 Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"}]},{"given":"Kang Ryoung","family":"Park","sequence":"additional","affiliation":[{"name":"Division of Electronics and Electrical Engineering, Dongguk University, 30 Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2018,2,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","article-title":"An introduction to biometric recognition","volume":"14","author":"Jain","year":"2004","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.patcog.2017.05.021","article-title":"Long range iris recognition: A survey","volume":"72","author":"Nguyen","year":"2017","journal-title":"Pattern Recognit."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"16866","DOI":"10.3390\/s150716866","article-title":"Nonintrusive finger-vein recognition system using NIR image sensor and accuracy analyses according to various factors","volume":"15","author":"Pham","year":"2015","journal-title":"Sensors"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2621","DOI":"10.1016\/j.eswa.2010.08.052","article-title":"Online joint palmprint and palmvein verification","volume":"38","author":"Zhang","year":"2011","journal-title":"Expert Syst. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1016\/j.eswa.2016.01.050","article-title":"An empirical study on iris recognition in a mobile phone","volume":"54","author":"Kim","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/j.neucom.2014.09.013","article-title":"A novel hierarchical approach for multispectral palmprint recognition","volume":"151","author":"Hong","year":"2015","journal-title":"Neurocomputing"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1049\/iet-bmt.2016.0072","article-title":"Multimodal biometric recognition using human ear and palmprint","volume":"6","author":"Hezil","year":"2017","journal-title":"IET Biom."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.neucom.2016.08.139","article-title":"Ear recognition: More than a survey","volume":"255","author":"Emersic","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Nguyen, D.T., Yoon, H.S., Pham, D.T., and Park, K.R. (2017). Spoof detection for finger-vein recognition system using NIR camera. Sensors, 17.","DOI":"10.3390\/s17102261"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"864","DOI":"10.1109\/TIFS.2015.2398817","article-title":"Deep representation for iris, face and fingerprint spoofing detection","volume":"10","author":"Menotti","year":"2015","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.patcog.2017.08.003","article-title":"A survey of local feature methods for 3D face recognition","volume":"72","author":"Soltanpour","year":"2017","journal-title":"Pattern Recognit."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"21726","DOI":"10.3390\/s141121726","article-title":"Face recognition system for set-top box-based intelligent TV","volume":"14","author":"Lee","year":"2014","journal-title":"Sensors"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.3390\/s150101537","article-title":"Face liveness detection using defocus","volume":"15","author":"Kim","year":"2015","journal-title":"Sensors"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Tan, X., Li, Y., Liu, J., and Jiang, L. (2010, January 5\u201311). Face liveness detection from a single image with sparse low rank bilinear discriminative model. Proceedings of the 11th European Conference on Computer Vision, Heraklion, Crete, Greece.","DOI":"10.1007\/978-3-642-15567-3_37"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Maatta, J., Hadid, A., and Pietikainen, M. (2011, January 11\u201313). Face spoofing detection from single image using micro-texture analysis. Proceedings of the International Joint Conference on Biometric, Washington DC, USA.","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"ref_16","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., and Li, S.Z. (April, January 29). A face anti-spoofing database with diverse attack. Proceedings of the 5th International Conference on Biometric, New Delhi, India."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., and Hadid, A. (2015, January 27\u201330). Face anti-spoofing based on color texture analysis. Proceedings of the IEEE International Conference on Image Processing, Quebec, QC, Canada.","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"ref_18","first-page":"1","article-title":"Deep texture features for robust face spoofing detection","volume":"64","author":"Pires","year":"2017","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Galbally, J., and Marcel, S. (2014, January 24\u201328). Face anti-spoofing based on general image quality assessment. Proceedings of the 22nd International Conference on Pattern Recognition, Stockholm, Sweden.","DOI":"10.1109\/ICPR.2014.211"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Benlamoudi, A., Samai, D., Ouafi, A., Bekhouche, S.E., Taleb-Ahmed, A., and Hadid, A. (2015, January 25\u201327). Face spoofing detection using local binary patterns and Fisher score. Proceedings of the 3rd International Conference on Control, Engineering and Information Technology, Tlemcen, Algeria.","DOI":"10.1109\/CEIT.2015.7233145"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Parveen, S., Ahmad, S.M.S., Abbas, N.H., Adnan, W.A.W., Hanafi, M., and Naeem, N. (2016). Face liveness detection using dynamic local ternary pattern (DLTP). Computers, 5.","DOI":"10.3390\/computers5020010"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1186\/1687-5281-2014-2","article-title":"Face liveness detection using dynamic texture","volume":"2014","author":"Komulainen","year":"2014","journal-title":"EURASIP J. Image Video Process."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2016\/4721849","article-title":"Face spoof attack recognition using discriminative image patches","volume":"2016","author":"Akhtar","year":"2016","journal-title":"J. Electr. Comput. Eng."},{"key":"ref_24","unstructured":"Krizhevsky, A., Sutskever, I., and Hinton, G.E. (2012, January 3\u20138). ImageNet classification with deep convolutional neural networks. Proceedings of the Advances in Neural Information Processing Systems, Lake Tahoe, NV, USA."},{"key":"ref_25","unstructured":"Simonyan, K., and Zisserman, A. (2013, January 25\u201327). Very deep convolutional neural networks for large-scale image recognition. Proceedings of the International Conference on Learning Representations, Kunming, China."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep residual learning for image recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Weinberger, K.Q., and Van de Maaten, L. (2017, January 22\u201325). Densely Connected Convolutional Networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Qin, H., Yan, J., Li, X., and Hu, X. (2016, January 27\u201330). Joint training of cascaded CNN for face detection. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.376"},{"key":"ref_29","unstructured":"Gurghian, A., Koduri, T., Bailur, S.V., Carey, K.J., and Murali, V.N. (July, January 26). DeepLanes: End-to-end lane position estimation using deep neural networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Las Vegas, NV, USA."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1016\/j.neucom.2017.08.062","article-title":"A hybrid deep learning CNN-ELM for age and gender classification","volume":"275","author":"Duan","year":"2018","journal-title":"Neurocomputing"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Niu, Z., Zhou, M., Wang, L., Gao, X., and Hua, G. (2016, January 27\u201330). Ordinal regression with multiple output CNN for age estimation. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.532"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Nguyen, D.T., Kim, K.W., Hong, H.G., Koo, J.H., Kim, M.C., and Park, K.R. (2017). Gender recognition from human-body images using visible-light and thermal camera videos based on a convolutional neural network for image feature extraction. Sensors, 17.","DOI":"10.3390\/s17030637"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"6232","DOI":"10.1109\/TGRS.2016.2584107","article-title":"Deep feature extraction and classification of hyper spectral images based on convolutional neural networks","volume":"54","author":"Chen","year":"2016","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.patrec.2016.11.011","article-title":"How could a subcellar image, or a painting by Van Gogh, be similar to a great white shark or to a pizza?","volume":"85","author":"Nanni","year":"2017","journal-title":"Pattern Recognit. Lett."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.patcog.2017.05.025","article-title":"Handcrafted vs. non-handcrafted features for computer vision classification","volume":"71","author":"Nanni","year":"2017","journal-title":"Pattern Recognit."},{"key":"ref_36","unstructured":"(2017, November 20). Dongguk Face Spoof Detection CNN Model (DFSD-CNN) with Algorithm. Available online: http:\/\/dm.dgu.edu\/link.html."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Kazemi, V., and Sullivan, J. (2014, January 23\u201328). One millisecond face alignment with an ensemble of regression trees. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA.","DOI":"10.1109\/CVPR.2014.241"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1016\/j.procs.2015.08.011","article-title":"Facial expression recognition: A survey","volume":"58","author":"Kumari","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1262","DOI":"10.1016\/j.patcog.2010.12.005","article-title":"Age estimation using a hierarchical classifier based on global and local facial features","volume":"44","author":"Choi","year":"2011","journal-title":"Pattern Recognit."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"21898","DOI":"10.3390\/s150921898","article-title":"Human age estimation method robust to camera sensor and\/or face movement","volume":"15","author":"Nguyen","year":"2015","journal-title":"Sensors"},{"key":"ref_41","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from over-fitting","volume":"15","author":"Srivastava","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1961189.1961199","article-title":"LIBSVM: A library for support vector machines","volume":"2","author":"Chang","year":"2011","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_43","unstructured":"(2017, November 20). LIBSVM Tools for SVM Classification. Available online: https:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/."},{"key":"ref_44","unstructured":"(2017, November 20). Deep Learning Matlab Toolbox. Available online: https:\/\/www.mathworks.com\/help\/nnet\/deep-learning-basics.html."},{"key":"ref_45","unstructured":"(2017, November 20). Principal Component Analysis Matlab Toolbox. Available online: https:\/\/www.mathworks.com\/help\/stats\/pca.html."},{"key":"ref_46","unstructured":"(2017, November 10). Support Vector Machines (SVM) for Classification. Available online: https:\/\/www.mathworks.com\/help\/stats\/support-vector-machine-classification.html."},{"key":"ref_47","unstructured":"ISO\/IEC JTC1 SC37 Biometrics (2014). ISO\/IEC WD 30107\u20133: 2014 Information Technology\u2014Presentation Attack Detection-Part 3: Testing and Reporting and Classification of Attacks, International Organization for Standardization."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Raghavendra, R., and Busch, C. (2015, January 23\u201327). Presentation attack detection algorithms for finger vein biometrics: A comprehensive study. Proceedings of the 11th International Conference on Signal-Image Technology and Internet-Based Systems, Bangkok, Thailand.","DOI":"10.1109\/SITIS.2015.74"},{"key":"ref_49","unstructured":"(2018, February 19). NVIDIA TitanX. Available online: https:\/\/www.nvidia.com\/en-us\/geforce\/products\/10series\/titan-x-pascal\/."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/3\/699\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T14:56:31Z","timestamp":1760194591000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/3\/699"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,26]]},"references-count":49,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,3]]}},"alternative-id":["s18030699"],"URL":"https:\/\/doi.org\/10.3390\/s18030699","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,26]]}}}