Face Biometrics Under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions

@article{Hadid2014FaceBU,
  title={Face Biometrics Under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions},
  author={Abdenour Hadid},
  journal={2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops},
  year={2014},
  pages={113-118},
  url={https://api.semanticscholar.org/CorpusID:9540938}
}
  • A. Hadid
  • Published in 23 June 2014
  • Computer Science
  • 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops
The goal of this position paper is to share the lessons learned about spoofing and anti-spoofing in face biometrics, and to highlight open issues and future directions.

Figures from this paper

Provoking security: Spoofing attacks against crypto-biometric systems

This paper presents crypto-biometric techniques, analyzing comparatively the different categories according to the main goal of the design and the methodology used in, and suggests a novel bimodal system, able to reject such kind of attacks.

A Bimodal Verification Cryptosystem as a Framework against Spoofing Attacks

A novel bimodal privacy friendly cryptosystem is suggested, able to reject such kind of attacks, presenting an anti-spoofing behavior under the cooperation between user and the function.

Verifying the Effectiveness of New Face Spoofing DB with Capture Angle and Distance

A new database called the “pattern recognition-face spoofing advancement database” that can be used to prevent such attacks based on 2D image analysis and is the first face spoofing database that considers the changes in both the angle and distance.

A survey on face presentation attack detection mechanisms: hitherto and future perspectives

This systematic study presents a review of face anti-spoofing techniques that use computational approaches ranging from traditional hardware-based solutions to up-to-date handcrafted features or deep learning-based approaches and investigates that despite prevalent face PAD mechanisms demonstrate potential performance, there exist some crucial issues that requisite a futuristic attention.

The Effect of Vulnerability in Facial Biometric Authentication

This research specifically explores vulnerabilities in biometric authentication, focusing on the growing threat of spoormg attacks on face recognition systems through video-based deception, and achieves an impressive accuracy of 96.93%.

Face Anti-Spoofing by Learning Polarization Cues in a Real-World Scenario

A computational framework is developed to extract and classify the unique face polarized features using convolutional neural networks and SVM together and a four-directional polarized face image dataset is released to inspire future applications within biometric anti-spoofing field.

The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras

It was found that selecting a wide depth range of the3D camera is important for anti-spoofing security recognition systems such as surveillance cameras used in airports, and to utilise the depth information and implement techniques that detect faces regardless of the distance, a 3D camera with long maximum depth range and high resolution stereo cameras could be selected, which can have a positive impact on accuracy.

Recent Advances in Face Presentation Attack Detection

This chapter reviews the significant advances in face-PAD research since the publication of the first edition of the Handbook of Biometric Anti-Spoofing and discusses advances involving other imaging modalities, such as near-infrared (NIR) and thermal imaging.

Assessing vulnerability of dorsal hand-vein verification system to spoofing attacks using smartphone camera

Vulnerability of dorsal hand-vein biometric systems to display based presentation attacks to spoofing attacks is investigated and SFAR values obtained are too high to be acceptable for real-world deployments and indicate that dorsalHandveinBiometric systems are also vulnerable to spoofed attacks.

Unraveling robustness of deep face anti-spoofing models against pixel attacks

This paper presents the results of an analytical study on transfer-learning-based convolutional neural networks for face liveness detection and differential evolution-based adversarial attacks to evaluate the efficiency of face anti-spoofing classifiers against adversarial attack.
...

On the effectiveness of local binary patterns in face anti-spoofing

This paper inspects the potential of texture features based on Local Binary Patterns (LBP) and their variations on three types of attacks: printed photographs, and photos and videos displayed on electronic screens of different sizes and concludes that LBP show moderate discriminability when confronted with a wide set of attack types.

Motion-based counter-measures to photo attacks in face recognition

A publicly available PHOTO-ATTACK database is introduced, and a new technique of counter-measure solely based on foreground/background motion correlation using Optical Flow that outperforms all other algorithms achieving nearly perfect scoring with an equal-error rate of 1.52% is proposed.

Anti-spoofing in Action: Joint Operation with a Verification System

Techniques for decision- level and score-level fusion to integrate a recognition and anti-spoofing systems are studied, using an open-source framework that handles the ternary classification problem (clients, impostors and attacks) transparently.

Liveness Detection for Face Recognition

A real-time liveness detection approach is presented against photograph spoofing in a non-intrusive manner for face recognition, which does not require any additional hardware except for a generic webcamera.

Face spoofing detection through partial least squares and low-level descriptors

This paper describes an anti-spoofing solution based on a set of low-level feature descriptors capable of distinguishing between ‘live’ and ‘spoof’ images and videos, and explores both spatial and temporal information to learn distinctive characteristics between the two classes.

A face antispoofing database with diverse attacks

A face antispoofing database which covers a diverse range of potential attack variations, and a baseline algorithm is given for comparison, which explores the high frequency information in the facial region to determine the liveness.

Counter-measures to photo attacks in face recognition: A public database and a baseline

This work introduces the publicly available PRINT-ATTACK database and exemplifies how to use its companion protocol with a motion-based algorithm that detects correlations between the person's head movements and the scene context to compare to other counter-measure techniques.

Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect

The 3D Mask Attack Database (3DMAD), the first publicly available 3D spoofing database, recorded with a low-cost depth camera is introduced and it is shown that easily attainable facial masks can pose a serious threat to 2D face recognition systems and LBP is a powerful weapon to eliminate it.

Verifying liveness by multiple experts in face biometrics

A holistic liveness detection paradigm that collaborates with standard techniques in 2D face biometrics is suggested that shows that many attacks are avertible via a combination of anti-spoofing measures.