Spoofing detection device, spoofing detection method, and recording medium

ABSTRACT

To provide a technology of more accurately detecting spoofing in face authentication, without increasing a scale of a device configuration and a burden on a user. A spoofing detection device includes a facial image sequence acquisition unit, a line-of-sight change detection unit, a presentation information display unit, and a spoofing determination unit. The facial image sequence acquisition unit acquires a facial image sequence indicating the face of a user. The line-of-sight change detection unit detects information about a temporal change in the line-of-sight from the facial image sequence. The presentation information display unit displays presentation information presented to the user as part of an authentication process. The spoofing determination unit determines the likelihood of the face indicated by the facial image sequence being spoofing on the basis of the information about the temporal change in the line-of-sight with respect to the presentation information.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a continuation application of U.S. patentapplication Ser. No. 17/529,516 filed on Nov. 18, 2021, which is acontinuation application of U.S. patent application Ser. No. 16/682,083filed on Nov. 13, 2019, which is issued as U.S. Pat. No. 11,210,500,which is a continuation application of U.S. patent application Ser. No.15/514,573 filed on Mar. 27, 2017, which is issued as U.S. Pat. No.10,515,262, which is a National Stage Entry of international applicationPCT/JP2015/005147 filed on Oct. 9, 2015, which claims the benefit ofpriority from Japanese Patent Application 2014-210529 filed on Oct. 15,2014, the disclosures of all of which are incorporated in their entiretyby reference herein.

TECHNICAL FIELD

The present invention relates to a technology of detecting an act ofimpersonation (spoofing) in face authentication.

BACKGROUND ART

A technology of detecting an act of spoofing in a security system (faceauthentication system) using face authentication is widely known. Theact of spoofing is an act of pretending to be another person tofraudulently utilize a system. The act of spoofing is hereinafter alsosimply referred to as spoofing.

Spoofing against a face authentication system is performed by animpersonator presenting another person's face different from that of theimpersonator to a camera for face imaging. The method of presentinganother person's face includes a method of presenting a photograph ofanother person's face to a camera in the system. Further, the methodincludes a method of presenting a video image of another person's facedisplayed on a display of a smartphone or the like to a camera in thesystem. Examples of related arts relating to such spoofing are describedin PTLs 1 to 8 below.

For example, a related art described in PTL 1 detects a line-of-sight ofa user from an image captured from a camera, while presenting an imagefor drawing the user's attention on a display device. Then, the relatedart (liveness detection) determines that the user is a living body whenthe line-of-sight of the user points in a direction of the displaydevice, otherwise determines that spoofing exists.

Further, a related art described in PTL 2 acquires a plurality of facialimages of a user respectively captured from a plurality of differentlines of sight. Then, the related art extracts feature points in theuser's face from the respective plurality of facial images anddetermines whether or not the feature points are on a same plane. Then,the related art determines whether or not spoofing exists, in accordancewith whether or not the feature points are on a same plane.

Further, a related art described in PTL 3 measures distances and anglesto a plurality of measured points in a user's face by a distance sensorto specify positions of the plurality of measured points. Then, therelated art determines whether or not spoofing exists, in accordancewith whether or not the plurality of measured points are on a sameplane.

Further, a related art described in PTL 4 guides a user to move aline-of-sight by randomly moving a mark displayed on a display device.Then, the related art determines whether or not spoofing exists, inaccordance with whether or not the line-of-sight movement of the useragrees with a track of the mark.

Further, a related art described in PTL 5 causes a user to move his orher face in a direction instructed on a display screen and captures themovement with a camera. Then, the related art determines whether or notspoofing exists, in accordance with whether or not a movement of afeature point can be detected in time-series images capturing the user.

Further, a related art described in PTL 6 instructs a user on a way tomove a predetermined part of his or her face (e.g. opening and closingof an eye) and captures the user's face. Then, the related artdetermines whether or not spoofing exists, in accordance with whether ornot the predetermined part of the face in an obtained dynamic imagechanges in accordance with the instruction.

Further, a related art described in PTL 7 captures a line-of-sightmovement of a user moving in a presented image as a dynamicline-of-sight pattern including time-series data of a moving speed and amoved position. Then, the related art registers the movement associatedwith a user identifier. Then, the related art checks the user's dynamicline-of-sight pattern being an authentication target against aregistered dynamic line-of-sight pattern to evaluate a degree ofmatching. By use of the related art, whether or not spoofing exists canbe determined in accordance with the degree of matching of the dynamicline-of-sight patterns.

Further, PTL 8 describes a line-of-sight detection technology that canbe employed in the respective related arts described in PTLs 1, 4, and7. The technology specifies a pupil included in a facial image anddetects a line-of-sight from a position of the pupil and a direction ofthe face.

Thus, as a spoofing detection technology, a method of determination bywhether or not a line-of-sight points in a direction of a display deviceis proposed. A method of determination by whether or not a subject ofimaging is a three-dimensional object, and a method of determination bywhether or not a line-of-sight and a movement of a face, as instructedor as registered, can be detected, are also proposed.

CITATION LIST Patent Literature

-   [PTL1] Japanese Patent No. 4807167-   [PTL2] Japanese Patent No. 5035467-   [PTL3] Japanese Patent No. 4734980-   [PTL4] Japanese Patent No. 4470663-   [PTL5] Japanese Unexamined Patent Application Publication No.    2008-305400-   [PTL6] Japanese Unexamined Patent Application Publication No.    2008-276345-   [PTL7] Japanese Unexamined Patent Application Publication No.    2007-141002-   [PTL8] Japanese Unexamined Patent Application Publication No.    2006-23953

SUMMARY OF INVENTION Technical Problem

However, the related art described in PTL 1 is not able to sufficientlydetect spoofing caused by presenting a video image. For example, it isassumed that an impersonator presents a video image of another person'sface captured so as to point in various line-of-sight directions, beingdisplayed on a display of a smartphone or the like, to a camera in aface authentication system. In this case, a likelihood that aline-of-sight direction in the video image at some time point to adisplay device is high. In this case, the related art mistakenlydetermines the face displayed on the display as a living body. Further,when positions of the display device and the camera in the faceauthentication system are previously known, it is possible to prepare avideo image of a face, a line-of-sight of which points to the displaydevice when the image points to the camera. Thus, the related art is notable to accurately detect spoofing caused by presenting a video image.

Further, the related art described in PTL 2 requires a plurality ofcameras or a moving mechanism of a camera, in order to acquire aplurality of facial images respectively captured from a plurality oflines of sight. Further, the related art described in PTL 3 requires adistance sensor in order to specify positions of a plurality of measuredpoints. Accordingly, there is a problem that a scale of a deviceconfiguration increases in the related arts.

Further, the related art described in PTL 4 guides a user to track, by aline-of-sight, a random movement of a mark displayed for spoofingdetermination. Further, the related art described in PTL 5 instructs auser to move his or her face in a designated direction for spoofingdetermination. Further, the related art described in PTL 6 instructs auser to move a predetermined part of his or her face for spoofingdetermination. Thus, a user is required to perform an extra action forspoofing determination in the related arts. Accordingly, the relatedarts increase a burden on a user.

Further, the related art described in PTL 7 requires preregistration ofa dynamic line-of-sight pattern, and increases a burden on a user.

Further, PTL 8 does not describe applying the line-of-sight detectiontechnology to spoofing determination.

The present invention is made to solve the aforementioned problems. Thatis to say, an object of the present invention is to provide a technologyof more accurately detecting spoofing in face authentication, withoutincreasing a scale of a device configuration and a burden on a user.

Solution to Problem

To achieve the above object, a spoofing detection device of the presentinvention includes: facial image sequence acquisition means thatacquires a facial image sequence indicating a user's face; line-of-sightchange detection means that detects information about temporalline-of-sight change from the facial image sequence; presentationinformation display means that displays presentation informationpresented to the user as part of authentication processing; and spoofingdetermination means that determines a likelihood that a face indicatedby the facial image sequence is spoofing, in accordance with theinformation about temporal line-of-sight change with respect to thepresentation information.

A spoofing detection method of the present invention includes:detecting, by a computer device, information about temporalline-of-sight change from a facial image sequence indicating a user'sface; and determining, by a computer device, a likelihood that a faceindicated by the facial image sequence is spoofing, in accordance withthe information about temporal line-of-sight change with respect topresentation information presented to the user as part of authenticationprocessing.

A recording medium, of the present invention, storing a spoofingdetection program causing a computer device to perform: a facial imagesequence acquisition step of acquiring a facial image sequenceindicating a user's face; a line-of-sight change detection step ofdetecting information about temporal line-of-sight change from thefacial image sequence; an information presentation step of displayingpresentation information presented to the user as part of authenticationprocessing; and a spoofing determination step of determining alikelihood that a face indicated by the facial image sequence isspoofing, in accordance with the information about temporalline-of-sight change with respect to the presentation information.

Advantageous Effects of Invention

The present invention is able to provide a technology of more accuratelydetecting spoofing in face authentication, without increasing a scale ofa device configuration and a burden on a user.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a functional block diagram of a spoofing detection deviceaccording to a first example embodiment of the present invention.

FIG. 2 is a diagram illustrating an example of a hardware configurationof the spoofing detection device according to the first exampleembodiment of the present invention.

FIG. 3 is a flowchart illustrating an operation of the spoofingdetection device according to the first example embodiment of thepresent invention.

FIG. 4 is a functional block diagram of a spoofing detection deviceaccording to a second example embodiment of the present invention.

FIG. 5 is a flowchart illustrating an operation of the spoofingdetection device according to the second example embodiment of thepresent invention.

FIG. 6 is a diagram illustrating an example of a facial image sequenceaccording to the second example embodiment of the present invention.

FIG. 7 is a diagram illustrating an example of detected change in aline-of-sight position, according to the second example embodiment ofthe present invention.

FIG. 8 is a diagram illustrating an example of a detected derivativevalue of a line-of-sight position, according to the second exampleembodiment of the present invention.

FIG. 9 is a diagram illustrating an example of detected informationabout temporal line-of-sight change, according to the second exampleembodiment of the present invention.

FIG. 10 is a diagram illustrating an example of switching ofpresentation information according to the second example embodiment ofthe present invention.

FIG. 11 is a functional block diagram of a spoofing detection deviceaccording to a third example embodiment of the present invention.

FIG. 12 is a flowchart illustrating an operation of the spoofingdetection device according to the third example embodiment of thepresent invention.

DESCRIPTION OF EMBODIMENTS

Example embodiments of the present invention will be described in detailbelow with reference to the drawings.

First Example Embodiment

FIG. 1 illustrates a configuration of a spoofing detection device 1according to a first example embodiment of the present invention. InFIG. 1 , the spoofing detection device 1 includes a facial imagesequence acquisition unit 11, a line-of-sight change detection unit 12,a presentation information display unit 13, and a spoofing determinationunit 14. In FIG. 1 , a direction of an arrow connecting rectanglesrepresenting functional blocks indicates an example, and does not limita signal direction between functional blocks.

FIG. 2 illustrates an example of a hardware configuration of thespoofing detection device 1. In FIG. 2 , the spoofing detection device 1can be configured with a computer device. The computer device includes acentral processing unit (CPU) 1001, a random access memory (RAM) 1002, aread only memory (ROM) 1003, a storage device 1004, an imaging device1005, and a display device 1006. The ROM 1003 and the storage device1004 store a computer program causing the computer device to operate asthe spoofing detection device 1 according to the present exampleembodiment, and various types of data. The imaging device 1005 is adevice such as a camera capturing an image of a subject and generatingan image displaying the subject. The display device 1006 is a devicedisplaying various types of information on a display screen. The CPU1001 controls the respective units in the computer device by reading thecomputer program and the various types of data stored in the ROM 1003and the storage device 1004 into the RAM 1002, and executing theprogram. In this case, the facial image sequence acquisition unit 11 isconfigured with the imaging device 1005, and the CPU 1001 reading thecomputer program and the various types of data stored in the ROM 1003and the storage device 1004 into the RAM 1002, and executing theprogram. Further, the line-of-sight change detection unit 12 isconfigured with the CPU 1001 reading the computer program and thevarious types of data stored in the ROM 1003 and the storage device 1004into the RAM 1002, and executing the program. Further, the presentationinformation display unit 13 is configured with the display device 1006,and the CPU 1001 reading the computer program and the various types ofdata stored in the ROM 1003 and the storage device 1004 into the RAM1002, and executing the program. The spoofing determination unit 14 isconfigured with the display device 1006, and the CPU 1001 reading thecomputer program and the various types of data stored in the ROM 1003and the storage device 1004 into the RAM 1002, and executing theprogram. The hardware configurations of the spoofing detection device 1and the respective functional blocks thereof are not limited to theconfiguration described above.

The facial image sequence acquisition unit 11 acquires a facial imagesequence as input. The facial image sequence is a time series of aplurality of facial images indicating a user's face. The facial imagesequence acquisition unit 11 may acquire the facial image sequencethrough the imaging device 1005. Further, the facial image sequenceacquisition unit 11 may acquire, as the facial image sequence, a facialimage sequence in which a region indicating a face is previouslyextracted. Alternatively, the facial image sequence acquisition unit 11may extract respective facial regions from a time series of a pluralityof images captured by the imaging device 1005, and generate the facialimage sequence.

The line-of-sight change detection unit 12 detects information abouttemporal line-of-sight change from a facial image sequence.Specifically, the line-of-sight change detection unit 12 detectsinformation indicating a line-of-sight from each facial imageconstituting the facial image sequence. Then, the line-of-sight changedetection unit 12 may assume a time series of information indicating aline-of-sight or a time derivative value thereof as the informationabout temporal line-of-sight change. Further, the line-of-sight changedetection unit 12 may use both of a time series of informationindicating a line-of-sight and a derivative value thereof as theinformation about temporal line-of-sight change.

For example, the line-of-sight change detection unit 12 may employinformation indicating a line-of-sight direction as the informationindicating a line-of-sight. The information indicating a line-of-sightdirection may be information indicating a direction of a line-of-sighton the basis of an optical axis of a camera, or information indicating adirection in a global coordinate system. Alternatively, theline-of-sight change detection unit 12 may employ information indicatinga line-of-sight position as the information indicating a line-of-sight.For example, the information indicating a line-of-sight position may beposition coordinates of a point closely watched by a user, in a displayscreen in the display device 1006.

The line-of-sight change detection unit 12 may employ a knownline-of-sight detection technology for processing of detectinginformation indicating a line-of-sight from a facial image. When theemployed line-of-sight detection technology assumes a gray-scale imagecomposed of brightness value information as a facial image being adetection target, the aforementioned facial image sequence acquisitionunit 11 acquires a gray-scale facial image sequence. Even in this case,an externally input image string is not necessarily gray-scale. Forexample, an image string input from the imaging device 1005 may becomposed of RGB images composed of color components of R (red), G(green), and B (blue). In this case, the facial image sequenceacquisition unit 11 or the line-of-sight change detection unit 12 mayperform processing of generating a gray-scale image string from theinput RGB image string. Without being limited to the above, the facialimage sequence acquisition unit 11 or the line-of-sight change detectionunit 12 may acquire or generate a facial image sequence in a formrelated to an employed line-of-sight detection technology.

The presentation information display unit 13 displays presentationinformation on the display device 1006. The presentation informationrefers to information presented to a user as part of authenticationprocessing. Further, the part of authentication processing refers topresentation information being presented to a user in a flow ofauthentication processing performed in an unillustrated faceauthentication system in which the spoofing detection device 1 is used.Such presentation information is information presented as part ofauthentication processing even when spoofing detection is not performedin such a face authentication system. In other words, it is desirablethat such presentation information be not information separatelyprepared for spoofing detection. For example, such presentationinformation may include textual information simply indicating aprocedure such as “AUTHENTICATION STARTS,” “PLEASE FACE FORWARD,” and“PLEASE ENTER PASSCODE NUMBER.” In addition, the presentationinformation may include a diagram. The presentation information is notlimited to textual information and a diagram, and may include anothertype of information, as long as the information is presented to a useras part of authentication processing.

Specifically, the presentation information display unit 13 displayspresentation information at any timing and at any display position. Thepresentation information display unit 13 may predetermine a displaytiming and a display position of the presentation information.Alternatively, the presentation information display unit 13 may randomlydetermine a display timing and a display position for each processingoperation performing spoofing determination.

The spoofing determination unit 14 determines a likelihood that a faceindicated by a facial image sequence is spoofing, in accordance withinformation about temporal line-of-sight change with respect topresentation information. A line-of-sight of a user changes inaccordance with presentation information. For example, the line-of-sightof the user is considered to change in accordance with a display timing,a display position, a presentation content, or the like of thepresentation information. Further, for example, the line-of-sight of theuser is also considered to change in accordance with a change in adisplay position of the presentation information, a change in apresentation content, or the like. Accordingly, the information abouttemporal line-of-sight change is related to the presentationinformation. Accordingly, the spoofing determination unit 14 maydetermine a likelihood of spoofing in accordance with relevance of theinformation about temporal line-of-sight change detected along with thepresentation of the presentation information to the presentationinformation.

Further, the spoofing determination unit 14 outputs a determinationresult of spoofing. For example, when determining that spoofing exists,the spoofing determination unit 14 may output the determination resultto the display device 1006 and another output device (unillustrated).

An operation of the spoofing detection device 1 as configured above willbe described with reference to FIG. 3 .

First, the facial image sequence acquisition unit 11 starts acquisitionof a facial image sequence (Step S1).

For example, the facial image sequence acquisition unit 11 acquires afacial image sequence by successively acquiring frames constituting avideo image input from the imaging device 1005 while extracting a regionindicating a face from each frame.

Next, the line-of-sight change detection unit 12 starts detection ofinformation about temporal line-of-sight change from the facial imagesequence (Step S2).

As described above, the line-of-sight change detection unit 12 detectsinformation indicating a line-of-sight from each facial image in thefacial image sequence successively acquired by the facial image sequenceacquisition unit 11. Then, the line-of-sight change detection unit 12detects a time series and a derivative value of the information asinformation about line-of-sight change.

Next, the presentation information display unit 13 displays, on thedisplay device 1006, presentation information presented to a user aspart of authentication processing (Step S3).

Next, the spoofing determination unit 14 determines a likelihood that aperson indicated by the facial image sequence is spoofing, in accordancewith relevance of the information about temporal line-of-sight changedetected by the line-of-sight change detection unit 12 to thepresentation information displayed by the presentation informationdisplay unit 13 (Step S4).

For example, the line-of-sight change detection unit 12 may determinewhether or not spoofing exists, in accordance with whether or not theinformation about temporal line-of-sight change relates to apresentation timing, a display position, or a content of thepresentation information, or changes thereof.

The above concludes the operation of the spoofing detection device 1.

Next, an effect of the first example embodiment of the present inventionwill be described.

The spoofing detection device according to the first example embodimentof the present invention is able to more accurately detect spoofing inface authentication, without increasing a scale of a deviceconfiguration and a burden on a user.

The reason is that the facial image sequence acquisition unit acquires afacial image sequence indicating a user's face, and the line-of-sightchange detection unit detects information about temporal line-of-sightchange from the facial image sequence. Further, the presentationinformation display unit displays presentation information presented tothe user as part of authentication processing. Then, the spoofingdetermination unit determines a likelihood that the face included in thefacial image sequence is spoofing, in accordance with the informationabout temporal line-of-sight change with respect to the presentationinformation.

A line-of-sight of a real person not being spoofing changes inaccordance with presentation information. For example, a line-of-sightof a real person changes at a timing when presentation information isdisplayed on the display device and in a direction of a display positionin the display device. However, when an impersonator displays a videoimage of a face of another person different from himself or herself on adisplay of a smartphone or the like, and presents the image to theimaging device, a line-of-sight of the another person in the displaychanges independently of the presentation information. For example, aline-of-sight of the another person in the display changes independentlyof a presentation timing and a display position of the presentationinformation.

Specifically, when a line-of-sight of the another person in the displayis fixed, the line-of-sight does not change in conjunction with adisplay timing of the presentation information. Further, when aline-of-sight of the another person's face in the display moves invarious directions, the line-of-sight is highly likely to change in aperiod in which the presentation information is not presented or at atiming different from a presentation timing. Further, in this case, theline-of-sight is highly likely to point in a direction different from adirection of a display position at a presentation timing. Consequently,when a video image of another person's face is displayed on a display ofa smartphone or the like and the image is presented to a camera,information about temporal line-of-sight change detected by theline-of-sight change detection unit does not change in accordance withpresentation information. Accordingly, the present example embodiment isable to accurately determine a likelihood of spoofing in accordance withrelevance of information about temporal line-of-sight change topresentation information.

At this time, the present example embodiment uses information abouttemporal change obtained from a natural movement of a line-of-sight of auser to presentation information presented as part of authenticationprocessing. Accordingly, the user is not required to perform an extraaction or a line-of-sight movement, being instructed for spoofingdetermination. Further, the present example embodiment does not requirea device, a distance sensor, or the like for acquiring images from aplurality of lines of sight for determination of three-dimensionality ofa subject of imaging. The present example embodiment may acquire afacial image sequence of a user by at least one imaging device.Accordingly, the present example embodiment does not increase a scale ofa device configuration.

Second Example Embodiment

Next, a second example embodiment of the present invention will bedescribed in detail with reference to drawings. In the respectivedrawings referred to in the description of the present exampleembodiment, a same component as and a step operating similarly to thefirst example embodiment of the present invention are respectively givensame reference signs as the first example embodiment, and detaileddescription thereof is omitted in the present example embodiment.

First, FIG. 4 illustrates a configuration of a spoofing detection device2 according to the second example embodiment of the present invention.In FIG. 4 , the spoofing detection device 2 differs from the spoofingdetection device 1 according to the first example embodiment of thepresent invention in that a presentation information display unit 23 isincluded in place of the presentation information display unit 13. Thespoofing detection device 2 also differs from the spoofing detectiondevice 1 in that a spoofing determination unit 24 is included in placeof the spoofing determination unit 14. In FIG. 4 , a direction of anarrow connecting rectangles representing functional blocks indicates anexample, and does not limit a signal direction between functionalblocks.

The presentation information display unit 23 switches presentationinformation presented to a user as part of authentication processing.For example, the presentation information display unit 23 may switch adisplay position of presentation information. It is assumed that theswitching of a display position refers to changing a display position ina display screen in a display device 1006. Further, for example, thepresentation information display unit 23 may switch presentationinformation to another piece of presentation information. It is assumedthat the switching to another piece of presentation information refersto changing presentation information displayed on the display device1006 to another piece of presentation information. Further, whenswitching presentation information to another piece of presentationinformation, the presentation information display unit 23 may switch adisplay position thereof. While the presentation information displayunit 23 performs such switching at least once, the switching frequencyis not limited. Further, the presentation information display unit 23may perform the switching of presentation information as described aboveat any timing.

Specifically, for example, the presentation information display unit 23displays first presentation information at a timing of a time m_(t1) ata display position (m_(x1),m_(y1)). Then, the presentation informationdisplay unit 23 switches the first presentation information to secondpresentation information at a timing of a time m_(t2). At this time, thepresentation information display unit 23 displays the secondpresentation information at a display position (m_(x2),m_(y2)). In thiscase, the presentation information display unit 23 may predetermine orrandomly determine m_(t1), m_(t2), (m_(x1),m_(y1)), and (m_(x2),m_(y2)).

The spoofing determination unit 24 determines a likelihood of spoofingin accordance with relevance of information about temporal line-of-sightchange detected by the line-of-sight change detection unit 12 toswitching of presentation information. Specifically, the spoofingdetermination unit 24 may determine whether or not spoofing exists, bycomparing the information about temporal line-of-sight change detectedfrom a facial image sequence with a switching timing of the presentationinformation and a change in a display position due to the switching. Forexample, the spoofing determination unit 24 may determine whether or nota face indicated by the facial image sequence is spoofing, in accordancewith whether or not the information about temporal line-of-sight changerelates to the aforementioned switching timing m_(t2). Further, thespoofing determination unit 24 may perform spoofing determination inaccordance with whether or not the information about temporalline-of-sight change relates to a change in the display position by theswitching from (m_(x1),m_(y1)) to (m_(x2),m_(y2)).

An operation of the spoofing detection device 2 as configured above willbe described with reference to FIG. 5 .

First, similarly to the first example embodiment of the presentinvention, the spoofing detection device 2 performs Steps S1 to S2.Thus, the spoofing detection device 2 starts acquisition of a facialimage sequence and starts detection of information about temporalline-of-sight change.

Next, the presentation information display unit 23 displays, on thedisplay device 1006, first presentation information presented to a useras part of authentication processing (Step S23).

Next, the presentation information display unit 23 switches the firstpresentation information to second presentation information (Step S24).

Next, the spoofing determination unit 24 determines a likelihood ofspoofing with respect to a person indicated by the facial imagesequence, in accordance with relevance of the information about temporalline-of-sight change detected by the line-of-sight change detection unit12 to the switching of the presentation information by the presentationinformation display unit 23 (Step S25).

For example, as described above, the line-of-sight change detection unit12 may determine whether or not spoofing exists, in accordance withwhether or not the information about temporal line-of-sight changerelates to a switching timing of the presentation information and achange in a display position accompanying the switching.

The above concludes the operation of the spoofing detection device 2.

Next, the operation according to the second example embodiment of thepresent invention will be described by use of a specific example.

First, the facial image sequence acquisition unit 11 starts acquisitionof a facial image sequence (Step 51).

It is assumed that the facial image sequence acquired by the facialimage sequence acquisition unit 11 is a string of facial images obtainedby extracting face regions from respective gray-scale images captured atcertain intervals. For example, the facial image sequence acquisitionunit 11 may obtain a face position by use of a known face detectiontechnology from time-series gray-scale images output from an imagingdevice 1005 such as a video camera. Then, the facial image sequenceacquisition unit 11 may extract face regions from the respective imagesas a facial image sequence, in accordance with the obtained faceposition. Alternatively, the facial image sequence acquisition unit 11may acquire a facial image sequence obtained by previously extractingface regions by an external device from an image string output from theimaging device 1005. FIG. 6 illustrates an example of a facial imagesequence in this specific example. The facial image sequence illustratedin FIG. 6 is acquired over a period from a time 1 to a time T.

The line-of-sight change detection unit 12 detects information abouttemporal line-of-sight change from the facial image sequence in FIG. 6(Step S2).

The line-of-sight change detection unit 12 detects information about aline-of-sight by use of a known line-of-sight detection technology fromthe respective facial images in the facial image sequence. For example,when a known technology of detecting a line-of-sight direction isemployed, the line-of-sight change detection unit 12 may detect aline-of-sight direction from a facial image at a time t in the facialimage sequence. Then, the x component of the direction may be denoted asgx(t) and the y component thereof as gy(t). Further, for example, when aknown technology of detecting a line-of-sight position is employed, theline-of-sight change detection unit 12 may detect a line-of-sightposition from a facial image at a time t in the facial image sequence.Then, the x coordinate of the position may be denoted as gx(t) and the ycoordinate thereof as gy(t). In this specific example, it is assumedthat information indicating a line-of-sight position is employed.

Then, the line-of-sight change detection unit 12 uses time series ofgx(t) and gy(t) for T facial images from the start (t=1) to the end(t=T) of the facial image sequence as information about temporalline-of-sight change. Further, the line-of-sight change detection unit12 uses values [Gx(t),Gy(t)] obtained by differentiating [gx(t),gy(t)](t=1 to T) with respect to time t as the information about temporalline-of-sight change. In other words, in this specific example, theinformation about temporal line-of-sight change is composed of fourvalues with respect to time t, a line-of-sight position [gx(t),gy(t)]and derivative values thereof [Gx(t),Gy(t)].

For example, it is assumed that information illustrated in FIGS. 7 to 9is detected as information about temporal line-of-sight change. FIG. 7illustrates a line-of-sight position [gx(t),gy(t)] detected from therespective facial images in the facial image sequence. FIG. 8illustrates values [Gx(t),Gy(t)] obtained by differentiating theline-of-sight position [gx(t),gy(t)] in FIG. 7 with respect to time t.FIG. 9 indicates the line-of-sight position [gx(t),gy(t)] at each time tand the derivative values [Gx(t),Gy(t)] thereof. As illustrated in FIGS.7 to 9 , the line-of-sight position detected from the facial imagesequence and the derivative values thereof change temporally.

Next, the presentation information display unit 23 displays firstpresentation information at a timing of a time m_(t1) at a displayposition (m_(x1),m_(y1)) (Step S23). FIG. 10 illustrates a displayexample of the first presentation information. In a diagram on the leftin FIG. 10 , the first presentation information is textual information“AUTHENTICATION STARTS.” In this step, it is assumed that thepresentation information display unit 23 randomly selects the firstpresentation timing m_(t1) and the display position (m_(x1),m_(y1)).

Next, the presentation information display unit 23 switches the firstpresentation information to second presentation information at a timingof a time m_(t2) and displays the second presentation information at adisplay position (m_(x2),m_(y2)) (Step S24). It is assumed thatm_(t2)>m_(t1). FIG. 10 illustrates a display example of the secondpresentation information. In a diagram on the right in FIG. 10 , thesecond presentation information is textual information “PLEASE FACESTRAIGHT TOWARD CAMERA.” In this step, it is assumed that thepresentation information display unit 23 randomly selects the secondpresentation timing m_(t2) and the display position (m_(x2),m_(y2)).

While two pieces of presentation information are switched and displayedin this specific example, a case that three or more pieces ofpresentation information are successively switched and displayed is alsoapplicable.

Next, the spoofing determination unit 24 performs spoofing determinationin accordance with relevance of the information about temporalline-of-sight change detected by the line-of-sight change detection unit12 to the switching of the presentation information by the presentationinformation display unit 23 (Step S25).

The spoofing determination unit 24 performs spoofing determination byuse of equations (1) to (3) below. As described above, a line-of-sightposition is denoted as [gx(t),gy(t)], and derivative values thereof aredenoted as [Gx(t),Gy(t)], as detected information about temporalline-of-sight change. Further, it is assumed that a time at which thefirst presentation information is displayed is denoted as m_(t1) and apresentation position thereof as (m_(g1), m_(y1)). It is also assumedthat a time at which the second presentation information is displayed isdenoted as m_(t2) and a presentation position thereof as (m_(x2),m_(y2)).

First, the spoofing determination unit 24 calculates a time τ at which achange in the line-of-sight is greatest around the switching time m_(t2)of the presentation information as expressed in equation (1) below.

$\begin{matrix}{\tau = {\underset{{m_{t2} - t_{a}} \leq t \leq {m_{t2} + t_{b}}}{\arg\max}\left( {{❘G_{x}^{(t)}❘} + {\lambda_{1}{❘G_{y}^{(t)}❘}}} \right)}} & (1)\end{matrix}$

G_(x) ^((t)) and G_(y) ^((t)) are the aforementioned derivative valuesGx(t) and Gy(t), respectively. Further, t_(a), t_(b), and λ₁ areparameters. Note that λ₁ is a parameter for adjusting a balance betweena change component in an x direction and a change component in a ydirection. Further, t_(a) and t_(b) are parameters for determining aninterval in which τ is obtained.

Next, the spoofing determination unit 24 obtains ε₁ being differencebetween magnitude of a change in the line-of-sight position, andmagnitude of a change in the display position between the two pieces ofpresentation information, on the basis of the time τ at which a changein the line-of-sight is greatest, by use of equation (2) below. Further,ci is hereinafter referred to as an evaluation value 1.

$\begin{matrix}{\varepsilon_{1} = {{abs}\left( {{\left( {G_{x}^{(\tau)},G_{y}^{(\tau)}} \right)^{T}} - {\lambda_{2}{\left( {\left( {m_{x2},m_{y2}} \right)^{T} - \left( {m_{x1},m_{y1}} \right)^{T}} \right)}}} \right)}} & (2)\end{matrix}$

Note that λ₂ is a parameter for adjusting a balance between magnitude ofa change in the line-of-sight position, and magnitude of a change in thedisplay position between the two pieces of presentation information.Further, abs in equation (2) is a function for calculating an absolutevalue.

Further, the spoofing determination unit 24 obtains ε₂ being differencebetween a direction of a change in the line-of-sight position, and adirection of a change in the display position between the two pieces ofpresentation information, by use of equation (3) below. Further, ε₂ ishereinafter referred to as an evaluation value 2.

$\begin{matrix}{\varepsilon_{2} = {a{\cos\left( \frac{\left( {G_{x}^{(\tau)},G_{y}^{(\tau)}} \right)\left( {\left( {m_{x2},m_{y2}} \right)^{T} - \left( {m_{x1},m_{y1}} \right)^{T}} \right)}{{\left( {G_{x}^{(\tau)},G_{y}^{(\tau)}} \right)^{T}}{\left( {\left( {m_{x2},m_{y2}} \right)^{T} - \left( {m_{x1},m_{y1}} \right)^{T}} \right)}} \right)}}} & (3)\end{matrix}$

Then, the spoofing determination unit 24 compares the evaluation value 1with a threshold value 1 and compares the evaluation value 2 with athreshold value 2. Then, the spoofing determination unit 24 determineswhether or not the face included in the acquired facial image sequenceis spoofing, in accordance with the comparison results.

In the specific example described above, the values of the evaluationvalues 1 and 2 respectively become smaller as the facial image sequenceacquired by the facial image sequence acquisition unit 11 is more likelyto indicate a real person's face. Further, the values of the evaluationvalues 1 and 2 are respectively designed to become larger as the facialimage sequence is more likely to indicate an impersonated face. Theimpersonated face refers to a face or the like included in a video imagepresented on a display of a smartphone or the like. Then, when both ofthe evaluation values 1 and 2 are respectively greater than thethreshold values, the spoofing determination unit 24 determines that theface is spoofing. Further, when at least either one of the evaluationvalues 1 and 2 is less than the threshold value, the spoofingdetermination unit 24 determines that the face is a person's face (notspoofing). The spoofing determination unit 24 may determine that theface is spoofing when at least either one of the evaluation values 1 and2 is greater than the threshold value.

Further, the threshold value 1 and the threshold value 2 may be changeddepending on a purpose. For example, for a purpose in which failing tocatch an impersonating person is fatal, it is desirable that the valuesof the threshold value 1 and the threshold value 2 be set on the lowside. By contrast, for a purpose in which a real person being mistakenlydetermined as spoofing is a problem, it is desirable that the values ofthe threshold value 1 and the threshold value 2 be set on the high side.

Next, an effect of the second example embodiment of the presentinvention will be described.

The spoofing detection device according to the second example embodimentof the present invention is able to more accurately detect spoofing inface authentication, without increasing a scale of a deviceconfiguration and a burden on a user.

The reason is that, in addition to a configuration similar to the firstexample embodiment of the present invention, the presentationinformation display unit switches and displays presentation informationpresented to a user as part of authentication processing. Then, thespoofing determination unit determines whether or not a face included ina facial image sequence is spoofing, in accordance with informationabout temporal line-of-sight change with respect to the switching of thepresentation information.

A line-of-sight of a real person is considered to change along withswitching of presentation information in face authentication. However,when an impersonator displays a video image of another person's facedifferent from himself or herself on a display of a smartphone or thelike and presents the image to the imaging device, a line-of-sight ofthe another person's face in the display changes independently of theswitching of the presentation information. Specifically, for example,when a line-of-sight of the another person in the display is fixed, theline-of-sight does not change at a switching timing of the presentationinformation. Further, when a line-of-sight of the another person in thedisplay moves in a various manner, the line-of-sight is highly likely tochange in a period other than a switching timing of the presentationinformation. Further, in this case, even when a display position changesalong with switching of the presentation information, the line-of-sightis highly likely to change in a direction of a position other than adisplay position after the change. Accordingly, when a video image ofanother person's face is displayed on a display of a smartphone or thelike and the image is presented to a camera, relevance of informationabout temporal line-of-sight change detected by the line-of-sight changedetection unit to switching of presentation information is low.

Accordingly, the present example embodiment is able to accuratelydetermine spoofing in accordance with relevance of information abouttemporal line-of-sight change to switching of presentation information.Further, at this time, the present example embodiment uses informationabout temporal line-of-sight change with respect to switching ofpresentation information presented as part of authentication processing.In general, presentation information presented as part of authenticationprocessing often includes a plurality of types. Accordingly, byutilizing information about temporal line-of-sight change with respectto switching of such a plurality of pieces of presentation information,the present example embodiment is able to apply a more naturalline-of-sight movement of a user in authentication processing tospoofing determination. Consequently, the present example embodimentreduces a burden on the user.

An example of the presentation information display unit according to thepresent example embodiment switching presentation information to anotherpiece of presentation information has been mainly described. Inaddition, the presentation information display unit may performswitching of displaying same presentation information at another displayposition at any timing.

Third Example Embodiment

Next, a third example embodiment of the present invention will bedescribed in detail with reference to drawings. In the respectivedrawings referred to in the description of the present exampleembodiment, a same component as and a step operating similarly to thefirst example embodiment of the present invention are respectively givensame reference signs as the first example embodiment, and detaileddescription thereof is omitted in the present example embodiment.

First, FIG. 11 illustrates a configuration of a spoofing detectiondevice 3 according to the third example embodiment of the presentinvention. In FIG. 11, the spoofing detection device 3 differs from thespoofing detection device 1 according to the first example embodiment ofthe present invention in that a spoofing determination unit 34 isincluded in place of the spoofing determination unit 14. The spoofingdetection device 3 also differs from the spoofing detection device 1 inthat a standard information storage unit 35 is further included. Thestandard information storage unit 35 constitutes an example embodimentof part of the spoofing determination unit according to the presentinvention. Further, in FIG. 11 , a direction of an arrow connectingrectangles representing functional blocks indicates an example, and doesnot limit a signal direction between functional blocks.

The standard information storage unit 35 stores standard informationabout temporal line-of-sight change related to a content of presentationinformation. In general, a user is considered to unconsciously orhabitually move a line-of-sight in accordance with a content ofpresentation information. The standard information about temporalline-of-sight change indicates temporal change in the line-of-sight thatthe person unconsciously or habitually moves when the presentationinformation is displayed.

For example, with respect to presentation information composed of acharacter string “PLEASE ENTER PASSCODE NUMBER” and a passcode numberentry screen, a user is considered to move a line-of-sight little bylittle near the passcode number entry screen in order to enter apasscode number. Further, for example, with respect to presentationinformation being a character string “PLEASE FACE STRAIGHT TOWARDCAMERA,” a user is considered to fix a line-of-sight in a direction of acamera for a certain time, in order to stare in the direction of thecamera. Further, for example, with respect to presentation informationindicating a long sentence, a user is considered to move a line-of-sightso as to sequentially read words in the sentence, in order to read andinterpret the sentence. Thus, the standard information storage unit 35stores generally assumed information about temporal line-of-sightchange, being associated with a content of the presentation information.

The spoofing determination unit 34 compares information about temporalline-of-sight change detected by the line-of-sight change detection unit12 with information about line-of-sight change stored in the standardinformation storage unit 35, being associated with a content ofpresentation information displayed at the time. Then, when determining,in accordance with the comparison result, that the detected informationabout temporal line-of-sight change does not agree with the standardinformation about temporal line-of-sight change related to the contentof the presentation information, the spoofing determination unit 34determines that spoofing exists. Further, when determining, inaccordance with the comparison result, that the two agree with oneanother, the spoofing determination 34 determines that spoofing does notexist.

An operation of the spoofing detection device 3 as configured above willbe described with reference to FIG. 12 .

First, similarly to the first example embodiment of the presentinvention, the spoofing detection device 3 performs Steps S1 to S3.Thus, the spoofing detection device 3 starts acquisition of a facialimage sequence and detection of information about temporal line-of-sightchange, and displays presentation information.

Next, the spoofing determination unit 34 compares the information abouttemporal line-of-sight change detected by the line-of-sight changedetection unit 12 with standard information about temporal line-of-sightchange related to a content of the presentation information presented bythe presentation information display unit 13. Then, in accordance withthe comparison result, the spoofing determination unit 34 determines alikelihood of spoofing with respect to a person indicated by the facialimage sequence (Step S34).

The above concludes the operation of the spoofing detection device 3.

Next, the operation according to the third example embodiment of thepresent invention will be described by use of a specific example.

In this specific example, the standard information storage unit 35prestores standard information about temporal line-of-sight change,being associated with a content of assumed presentation information. Forexample, the standard information storage unit 35 stores informationabout temporal change in a line-of-sight moving little by little near apasscode number entry screen, being associated with presentationinformation composed of textual information “PLEASE ENTER PASSCODENUMBER.” Further, for example, the standard information storage unit 35stores information about temporal change in a line-of-sight staring in adirection of a camera for a certain time, being associated withpresentation information composed of textual information “PLEASE FACESTRAIGHT TOWARD CAMERA.” Further, for example, the standard informationstorage unit 35 stores information about temporal change in aline-of-sight sequentially moving through each word in a sentence in aposition of presentation information, being associated with thepresentation information composed of a long sentence. It is assumedthat, similarly to detected information about temporal line-of-sightchange, standard information about temporal line-of-sight change iscomposed of a time series of a line-of-sight position and derivativevalues thereof.

In this specific example, the spoofing detection device 3 operatessimilarly to the specific example according to the second exampleembodiment of the present invention up to Steps S1 and S2. Accordingly,it is assumed that the spoofing detection device 3 acquires a facialimage sequence as illustrated in FIG. 6 and detects information abouttemporal line-of-sight change as illustrated in FIGS. 7 to 9 .

Next, the presentation information display unit 13 displays presentationinformation on a display device 1006 (Step S3).

Next, the spoofing determination unit 34 compares the information abouttemporal line-of-sight change detected in Step S2 with standardinformation about temporal line-of-sight change related to thepresentation information displayed in Step S3. Then, in accordance withthe comparison result, the spoofing determination unit 34 determines alikelihood of spoofing with respect to a person indicated by the facialimage sequence (Step S34).

Specifically, the spoofing determination unit 34 calculates differenceε₃ between a variance of the detected information about temporalline-of-sight change [gx(t),gy(t)] and a variance of the standardinformation about temporal line-of-sight change [hx(t),hy(t)] by use ofequation (4) below. Further, ε₃ is hereinafter referred to as anevaluation value 3.

$\begin{matrix}{\varepsilon_{3} = {{❘{{\underset{{m_{t} - t_{c}} \leq t \leq {m_{t} + t_{d}}}{var}\left( g_{x}^{(t)} \right)} - {\underset{{m_{t} - t_{c}} \leq t \leq {m_{t} + t_{d}}}{var}\left( h_{x}^{(t)} \right)}}❘} + {\lambda_{3}{❘{{\underset{{m_{t} - t_{c}} \leq t \leq {m_{t} + t_{d}}}{var}\left( g_{y}^{(t)} \right)} - {\underset{{m_{t} - t_{c}} \leq t \leq {m_{t} + t_{d}}}{var}\left( h_{y}^{(t)} \right)}}❘}}}} & (4)\end{matrix}$

Note that g_(x) ^((t)), g_(y) ^((t)), h_(x) ^((t)), and h_(y) ^((t)) arethe aforementioned information about temporal change gx(t), gy(t),hx(t), and hy(t), respectively. Further, var is a function forcalculating a variance. Further, λ₃ is a parameter for adjusting abalance between an x component and a y component. Further, m_(t) denotesa time at which the presentation information is displayed by thepresentation information display unit 13. Further, t_(c) and t_(d) areparameters for determining an interval in which a variance iscalculated. Each of the values of t_(c) and t_(d) may be set to apositive value, a negative value, or zero. For example, when both valuesof t_(c) and t_(d) are set to positive values, equation (4) abovecalculates the evaluation value 3 with respect to a predeterminedinterval including the time m_(t). Further, when t_(c) is set to zeroand t_(d) is set to a positive value, equation (4) above calculates theevaluation value 3 with respect to a predetermined interval at and afterthe time m_(t). Further, when t_(c) is set to a negative value and t_(d)is set to a positive value, equation (4) above calculates variances withrespect to a predetermined interval at or after the time m_(t)considering a human reaction rate.

The spoofing determination unit 34 compares the evaluation value 3 witha threshold value 3. Then, when the evaluation value 3 is greater thanthe threshold value 3, the spoofing determination unit 34 determinesthat a face indicated by the facial image sequence is spoofing. Further,when the evaluation value 3 is less than the threshold value 3, thespoofing determination unit 34 determines that the face indicated by thefacial image sequence is not spoofing.

Further, the present example embodiment may be implemented incombination with the second example embodiment of the present invention.In that case, the spoofing detection device 3 includes the presentationinformation display unit 23 according to the second example embodimentof the present invention in place of the presentation informationdisplay unit 13. Then, similarly to the spoofing determination unit 24according to the second example embodiment of the present invention, thespoofing determination unit 34 may calculate the evaluation values 1 and2 in the specific example described above. Additionally, the spoofingdetermination unit 34 may calculate the evaluation value 3 in thespecific example described above. In this case, the spoofingdetermination unit 34 may calculate the evaluation value 3 by comparingdetected information about temporal line-of-sight change with standardinformation about temporal line-of-sight change with respect topresentation information before and after switching, respectively. Then,in accordance with the comparison result between the evaluation value 1,the evaluation value 2, and the evaluation value 3, and the respectivethreshold values, the spoofing determination unit 34 may performspoofing determination. For example, the spoofing determination unit 34may determine that the face is spoofing when all of the evaluation value1, the evaluation value 2, and the evaluation value 3 are greater thanthe respective threshold values.

Next, an effect of the third example embodiment of the present inventionwill be described.

The spoofing detection device according to the third example embodimentof the present invention is able to more accurately detect spoofing inface authentication, without increasing a scale of a deviceconfiguration and a burden on a user.

The reason is that, in addition to a configuration similar to the firstexample embodiment of the present invention, the spoofing determinationunit determines a likelihood of spoofing with respect to a faceindicated by a facial image sequence, in accordance with relevance ofdetected information about temporal line-of-sight change to a content ofpresentation information.

In face authentication, a line-of-sight of a real person is consideredto change unconsciously in accordance with a content of presentationinformation. However, when an impersonator displays a video image ofanother person's face different from himself or herself on a display ofa smartphone or the like and presents the image to an imaging device, aline-of-sight of the another person's face in the display is highlylikely to exhibit a movement not assumed from the content of thepresentation information. Specifically, for example, in a case that aline-of-sight of the another person in the display is fixed, even whenthe content of the presentation information is a content prompting entryof a passcode number, the line-of-sight of the another person in thedisplay does not change. Further, in a case that a line-of-sight of theanother person in the display moves in a various manner, even when thecontent of the presentation information is, for example, a sentence, achange in the line-of-sight of the another person in the display ishighly likely to be different from a movement of a line-of-sight readingwords in the sentence. Accordingly, when a video image of anotherperson's face is displayed on a display of a smartphone or the like andthe image is presented to a camera, information about temporalline-of-sight change detected by the line-of-sight change detection unitdoes not agree with standard information about temporal line-of-sightchange related to a content of presentation information.

Thus, the present example embodiment is able to determine spoofing byuse of a natural movement of a line-of-sight of a user, the movementbeing related to a content of presentation information presented to theuser as part of authentication processing. Consequently, the presentexample embodiment is able to accurately detect spoofing, withoutincreasing a burden on the user for spoofing detection.

The facial image sequence acquisition unit according to the respectiveaforementioned example embodiments of the present invention has beendescribed on the assumption that a facial image sequence based on imagesinput from the imaging device is acquired nearly in real time. Inaddition, the facial image sequence acquisition unit may acquire afacial image sequence stored in a storage device (e.g. video datacaptured and saved by an imaging device in the past). In this case, thespoofing determination unit may acquire information about a presentationtiming and a presentation position of presentation information displayedby the presentation information display unit at the time of capturingthe facial image sequence. For example, information about suchpresentation information may be stored in the storage device along withthe facial image sequence. Then, the spoofing determination unit maycompare information indicating temporal line-of-sight change detectedfrom the facial image sequence acquired from the storage device withinformation about the presentation information.

Further, a case of using a time series of information indicating aline-of-sight position or a line-of-sight direction, and derivativevalues thereof as information about temporal line-of-sight changeaccording to the respective aforementioned example embodiments of thepresent invention has been mainly described. In addition, theinformation about temporal line-of-sight change may be another type ofinformation as long as the information can be detected from a facialimage sequence and can indicate temporal change in a line-of-sight.

Further, an example of the spoofing determination unit according to theaforementioned second and third example embodiments of the presentinvention determining spoofing by use of the evaluation values 1 to 3has been mainly described. At this time, equations for respectivelycalculating the evaluation values 1 to 3 are not limited to the above.Further, without being limited to the evaluation values, the spoofingdetermination unit may determine spoofing in accordance with relevanceof detected information about temporal line-of-sight change topresentation information presented to a user as part of authenticationprocessing.

Further, an example of the spoofing determination unit according to therespective aforementioned example embodiments of the present inventiondetermining whether or not a face indicated by a facial image sequenceis spoofing has been mainly described. In addition, the spoofingdetermination unit may output information indicating a degree ofspoofing as a determination result.

Further, an example of each functional block in the spoofing detectiondevice according to the respective aforementioned example embodiments ofthe present invention being provided by a CPU executing a computerprogram stored in the storage device or a ROM has been mainly described.In addition, the respective functional blocks may be provided, in part,in whole, or in combination, by dedicated hardware.

Further, the functional blocks of the spoofing detection deviceaccording to the respective aforementioned example embodiments of thepresent invention may be provided by a plurality of devices in adistributed manner.

Further, the operations of the spoofing detection device according tothe respective aforementioned example embodiments of the presentinvention described with reference to the flowcharts may be stored inthe storage device (recording medium) in a computer device as a computerprogram according to the present invention. Then, the CPU may read outand execute such a computer program. Then, in such a case, the presentinvention is composed of a code of such a computer program or arecording medium.

Further, the respective aforementioned example embodiments may beimplemented in combination as appropriate.

Further, without being limited to the respective aforementioned exampleembodiments, the present invention may be implemented in variousembodiments.

INDUSTRIAL APPLICABILITY

The spoofing detection technology according to the present invention isable to more accurately detect spoofing in face authentication, withoutincreasing a scale of a device configuration and a burden on a user. Thetechnology is widely applicable to a purpose of improving a securitylevel of a system using face authentication.

The present invention has been described with the aforementioned exampleembodiments as exemplary examples. However, the present invention is notlimited to the aforementioned example embodiments. In other words,various embodiments that can be understood by a person skilled in theart may be applied to the present invention, within the scope thereof.

This application claims priority based on Japanese Patent ApplicationNo. 2014-210529 filed on Oct. 15, 2014, the disclosure of which ishereby incorporated by reference thereto in its entirety.

REFERENCE SIGNS LIST

-   -   1, 2, 3 Spoofing detection device    -   11 Facial image sequence acquisition unit    -   12 Line of sight change detection unit    -   13, 23 Presentation information display unit    -   14, 24, 34 Spoofing determination unit    -   Standard information storage unit    -   1001 CPU    -   1002 RAM    -   1003 ROM    -   1004 Storage device    -   1005 Imaging device    -   1006 Display device

1. A face detection device comprising: at least one memory configured tostore instructions; and at least one processor configured to execute theinstructions to perform: acquiring a facial image sequence indicating aface of a user; detecting, from the facial image sequence, a directionof line-of-sight of the user; displaying presentation information on adisplay device and changing a position of the presentation informationon a screen of the display device; and determining the face of the userindicated by the facial image sequence is a living face, based onrelationship between change of the direction of the line-of-sight of theuser and content of the presentation information.
 2. The face detectiondevice according to claim 1, wherein the content of the presentationinformation includes textual information.
 3. The face detection deviceaccording to claim 1, wherein the at least one processor is configuredto execute the instructions to perform: switching of the presentationinformation, and determining a likelihood of the spoofing based onrelevance of the information about temporal line-of-sight change toswitching of the presentation information.
 4. The face detection deviceaccording to claim 3, wherein the at least one processor is configuredto execute the instructions to perform: determining a likelihood of thespoofing based on relevance of the information about temporalline-of-sight change to a timing of the switching.
 5. The face detectiondevice according to claim 3, wherein the at least one processor isconfigured to execute the instructions to perform: determining alikelihood of the spoofing based on relevance of the information abouttemporal line-of-sight change to a change in a display position of thepresentation information by the switching.
 6. An authentication methodcomprising: acquiring a facial image sequence indicating a face of auser; detecting, from the facial image sequence, a direction ofline-of-sight of the user; displaying presentation information on adisplay device and changing a position of the presentation informationon a screen of the display device; and determining the face of the userindicated by the facial image sequence is a living face, based onrelationship between change of the direction of the line-of-sight of theuser and content of the presentation information.
 7. The authenticationmethod according to claim 6, wherein the content of the presentationinformation includes textual information.
 8. The authentication methodaccording to claim 6, wherein the authentication method comprises:switching of the presentation information, and determining a likelihoodof the spoofing based on relevance of the information about temporalline-of-sight change to switching of the presentation information. 9.The authentication method according to claim 8, wherein theauthentication method comprises: determining a likelihood of thespoofing based on relevance of the information about temporalline-of-sight change to a timing of the switching.
 10. Theauthentication method according to claim 8, wherein the authenticationmethod comprises: determining a likelihood of the spoofing based onrelevance of the information about temporal line-of-sight change to achange in a display position of the presentation information by theswitching.
 11. A non-transitory program recording medium recording aprogram causing a computer to execute processing of: acquiring a facialimage sequence indicating a face of a user; detecting, from the facialimage sequence, a direction of line-of-sight of the user; displayingpresentation information on a display device and changing a position ofthe presentation information on a screen of the display device; anddetermining the face of the user indicated by the facial image sequenceis a living face, based on relationship between change of the directionof the line-of-sight of the user and content of the presentationinformation.
 12. The non-transitory program recording medium accordingto claim 11, wherein the content of the presentation informationincludes textual information.
 13. The non-transitory program recordingmedium according to claim 11, wherein the program recorded in thenon-transitory program recording medium causes the computer to executeprocessing of: switching of the presentation information, anddetermining a likelihood of the spoofing based on relevance of theinformation about temporal line-of-sight change to switching of thepresentation information.
 14. The non-transitory program recordingmedium according to claim 13, wherein the program recorded in thenon-transitory program recording medium causes the computer to executeprocessing of: determining a likelihood of the spoofing based onrelevance of the information about temporal line-of-sight change to atiming of the switching.
 15. The non-transitory program recording mediumaccording to claim 13, wherein the program recorded in thenon-transitory program recording medium causes the computer to executeprocessing of: determining a likelihood of the spoofing based onrelevance of the information about temporal line-of-sight change to achange in a display position of the presentation information by theswitching.