{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:10:49Z","timestamp":1772043049266,"version":"3.50.1"},"reference-count":27,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2019,10,31]],"date-time":"2019-10-31T00:00:00Z","timestamp":1572480000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Jilin Provincial Science and Technology Department","award":["20180201003GX"],"award-info":[{"award-number":["20180201003GX"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In this study, an advanced Kinect sensor was adopted to acquire infrared radiation (IR) images for liveness detection. The proposed liveness detection method based on infrared radiation (IR) images can deal with face spoofs. Face pictures were acquired by a Kinect camera and converted into IR images. Feature extraction and classification were carried out by a deep neural network to distinguish between real individuals and face spoofs. IR images collected by the Kinect camera have depth information. Therefore, the IR pixels from live images have an evident hierarchical structure, while those from photos or videos have no evident hierarchical feature. Accordingly, two types of IR images were learned through the deep network to realize the identification of whether images were from live individuals. In comparison with other liveness detection cross-databases, our recognition accuracy was 99.8% and better than other algorithms. FaceNet is a face recognition model, and it is robust to occlusion, blur, illumination, and steering. We combined the liveness detection and FaceNet model for identity authentication. For improving the application of the authentication approach, we proposed two improved ways to run the FaceNet model. Experimental results showed that the combination of the proposed liveness detection and improved face recognition had a good recognition effect and can be used for identity authentication.<\/jats:p>","DOI":"10.3390\/s19214733","type":"journal-article","created":{"date-parts":[[2019,10,31]],"date-time":"2019-10-31T06:33:29Z","timestamp":1572503609000},"page":"4733","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["An Identity Authentication Method Combining Liveness Detection and Face Recognition"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5133-329X","authenticated-orcid":false,"given":"Shuhua","family":"Liu","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Northeast Normal University, Changchun 130117, China"}]},{"given":"Yu","family":"Song","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Northeast Normal University, Changchun 130117, China"}]},{"given":"Mengyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Northeast Normal University, Changchun 130117, China"}]},{"given":"Jianwei","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Northeast Normal University, Changchun 130117, China"}]},{"given":"Shihao","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Northeast Normal University, Changchun 130117, China"}]},{"given":"Kun","family":"Hou","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Northeast Normal University, Changchun 130117, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,10,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Chihaoui, M., Elkefi, A., Bellil, W., and Ben Amar, C. (2016). A survey of 2D face recognition techniques. Computers, 5.","DOI":"10.3390\/computers5040021"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., and Philbin, J. (2015, January 7\u201312). FaceNet: A unified embedding for face recognition and clustering. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, USA.","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Li, Y., Xu, K., Yan, Q., Li, Y., and Deng, R.H. (2014, January 3\u20136). Understanding OSN-based facial disclosure against face authentication systems. Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, Kyoto, Japan.","DOI":"10.1145\/2590296.2590315"},{"key":"ref_4","first-page":"4","article-title":"Face liveness detection using dynamic texture","volume":"2","author":"Komulainen","year":"2014","journal-title":"EURASIP J. Image Video Process."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","article-title":"Face spoofing detection using colour texture analysis","volume":"11","author":"Boulkenafet","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_6","unstructured":"Chingovska, I., Anjos, A., and Marcel, S. (2012, January 6\u20137). On the effectiveness of local binary patterns in face anti-spoofing. Proceedings of the 11th International Conference of the Biometrics Special Interes Group, Darmstadt, Germany."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1060","DOI":"10.1109\/TIP.2015.2395951","article-title":"Presentation attack detection for face recognition using light field camera","volume":"24","author":"Raghavendra","year":"2015","journal-title":"IEEE Trans. Image Process."},{"key":"ref_8","unstructured":"Li, X.B., Komulainen, J., Zhao, G.Y., Yuen, P.C., and Pietik\u00a8ainen, M. (2016, January 4\u20138). Generalized face anti-spoofing by detecting pulse from face videos. Proceedings of the 23rd International Conference on Pattern Recognition, Cancun, Mexico."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Hernandez-Ortega, J., Fierrez, J., Morales, A., and Tome, P. (2018, January 18\u201322). Time analysis of pulse-based face anti-spoofing in visible and NIR. Proceedings of the Conference on Computer Vision and Pattern Recognition Workshops, Salt Lake City, UT, USA.","DOI":"10.1109\/CVPRW.2018.00096"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Wang, S.Y., Yang, S.H., Chen Y, P., and Huang, J.W. (2017). Face liveness detection based on skin blood flow analysis. Symmetry, 9.","DOI":"10.3390\/sym9120305"},{"key":"ref_11","unstructured":"Sun, L., Pan, G., Wu, Z.H., and Lao, S.H. (2007, January 27\u201329). Blinking-based live face detection using conditional random fields. Proceedings of the International Conference on Biometrics, Seoul, Korea."},{"key":"ref_12","unstructured":"Li, J.W. (2008, January 11\u201313). Eye blink detection based on multiple gabor response waves. Proceedings of the International Conference on Machine Learning and Cybernetics, San Diego, CA, USA."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1109\/TIFS.2007.902037","article-title":"Real-time face detection and motion analysis with application in \u201cliveness\u201d assessment","volume":"2","author":"Kollreider","year":"2007","journal-title":"Trans. Inf. Forensics Secur."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Bharadwaj, S., Dhamecha, T.I., Vatsa, M., and Singh, R. (2013, January 23\u201328). Computationally efficient face spoofing detection with motion magnification. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Portland, OR, USA.","DOI":"10.1109\/CVPRW.2013.23"},{"key":"ref_15","unstructured":"Yang, J.W., Lei, Z., and Li, S.Z. (2014). Learn convolutional neural network for face anti-spoofing. arXiv."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Atoum, Y., Liu, Y.J., Jourabloo, A., and Liu, X.M. (2017, January 1). Face antispoofing using patch and depth-based cnns. Proceedings of the IEEE International Joint Conference on Biometrics, Denver, CO, USA.","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Li, L., Feng, X.Y., Boulkenafet, Z., Xia, Z.Q., Li, M.M., and Hadid, A. (2016, January 12\u201315). An original face anti-spoofing approach using partial convolutional neural network. Proceedings of the 6th International Conference on Image Processing Theory Tools and Applications, Oulu, Finland.","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Tu, X.K., and Fang, Y.C. (2017, January 14\u201318). Ultra-deep neural network for face anti-spoofing. Proceedings of the International Conference on Neural Information Processing, Guangzhou, China.","DOI":"10.1007\/978-3-319-70096-0_70"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Li, L., Feng, X.Y., Jiang, X.Y., Xia, Z.Q., and Hadid, A. (2017, January 17\u201320). Face antispoofing via deep local binary patterns. Proceedings of the IEEE International Conference on Image Processing, Beijing, China.","DOI":"10.1109\/ICIP.2017.8296251"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Nagpal, C., and Dubey, S.R. (2018). A performance evaluation of convolutional neural networks for face anti spoofing. arXiv.","DOI":"10.1109\/IJCNN.2019.8852422"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2639","DOI":"10.1109\/TIFS.2018.2825949","article-title":"Learning generalized deep feature representation for face anti-spoofing","volume":"13","author":"Li","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Gan, J.Y., Li, S.L., Zhai, Y.K., and Liu, C.Y. (2017, January 17\u201319). 3D convolutional neural network based on face anti-spoofing. Proceedings of the International Conference on Multimedia and Image Processing, Wuhan, China.","DOI":"10.1109\/ICMIP.2017.9"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1928","DOI":"10.3390\/s19081928","article-title":"The effectiveness of depth data in liveness face authentication using 3D sensor cameras","volume":"19","author":"Ghazel","year":"2019","journal-title":"Sensors"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","article-title":"Joint face detection and alignment using multitask cascaded convolutional networks","volume":"23","author":"Zhang","year":"2016","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_25","unstructured":"Sim, T., Baker, S., and Bsat, M. (2002, January 21). The CMU pose, illumination, and expression (PIE) database. Proceedings of the Fifth IEEE International Conference on Automatic Face Gesture Recognition, Washington, DC, USA."},{"key":"ref_26","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., and Li, S. (April, January 30). A face antispoofing database with diverse attacks. Proceedings of the International Conference on Biometrics(ICB), New Delhi, India."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Parveen, S., Ahmad, S.M.S., Abbas, N.H., Adnan, W.A.W., Hanafi, M., and Naeem, N. (2016). Face liveness detection using Dynamic Local Ternary Pattern (DLTP). Computers, 5.","DOI":"10.3390\/computers5020010"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/21\/4733\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:30:44Z","timestamp":1760189444000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/21\/4733"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,31]]},"references-count":27,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2019,11]]}},"alternative-id":["s19214733"],"URL":"https:\/\/doi.org\/10.3390\/s19214733","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,31]]}}}