Abstract
Through the release of three large-scale datasets and the successful holding of three competitions, we have promoted the development of the face anti-spoofing community. In this chapter, we will summarize our work in recent years from two aspects of datasets and competitions, including the characteristics of datasets CASIA-SURF, CASIA-SURF CeFA and CASIA-SURF HiFiMask, the preliminary solutions of benchmark methods MS-SEF, PSMM-Net, and CCL, and the core ideas of excellent competition algorithms. In addition, based on the development trend of competition algorithms in recent years and the demand for anti-spoofing technology in daily life, we determine the future work direction, including Flexible Modal Face Anti-Spoofing, Generalizable Face Anti-spoofing and Surveillance Face Anti-spoofing aspects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhang S, Liu A, Wan J, Liang Y, Guo G, Escalera S, Escalante HJ, Li SZ (2020) Casia-surf: a large-scale multi-modal benchmark for face anti-spoofing. TBIOM 2(2):182–193
Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: CVPR
Liu A, Tan Z, Wan J, Liang Y, Lei Z, Guo G, Li SZ (2021) Face anti-spoofing via adversarial cross-modality translation. IEEE Trans Inf Forensics Secur 16:2759–2772
Liu A, Liang Y (2022) Ma-vit: modality-agnostic vision transformers for face anti-spoofing. In: Proceedings of the thirty-first international joint conference on artificial intelligence, IJCAI-22, pp 1180–1186. International joint conferences on artificial intelligence organization
Liu A, Wan J, Jiang N, Wang H, Liang Y (2022) Disentangling facial pose and appearance information for face anti-spoofing. In: 2022 26th international conference on pattern recognition (ICPR), pp 4537–4543. IEEE
Boulkenafet Z (2017) A competition on generalized software based face presentation attack detection in mobile scenarios. In: IJCB
Zhang Y, Yin Z, Li Y, Yin G, Yan J, Shao J, Liu Z (2020) Celeba-spoof: large-scale face anti-spoofing dataset with rich annotations. In: ECCV
Liu A, Zhao C, Yu Z, Wan J, Su A, Liu X, Tan Z, Escalera S, **ng J, Liang Y et al (2022) Contrastive context-aware learning for 3d high-fidelity mask face presentation attack detection. IEEE Trans Inf Forensics Secur 17:2497–2507
Dosovitskiy A, Beyer L, Kolesnikov A, Weissenborn D, Zhai X, Unterthiner T, Dehghani M, Minderer M, Heigold G, Gelly S, Uszkoreit J, Houlsby N (2021) An image is worth 16x16 words: transformers for image recognition at scale. In: ICLR
Li X, Wan J, ** Y, Liu A, Guo G, Li SZ (2020) 3dpc-net: 3d point cloud network for face anti-spoofing. In: 2020 IEEE international joint conference on biometrics (IJCB). IEEE, pp 1–8
Patel K, Han H, Jain AK (2016) Secure face unlock: spoof detection on smartphones. IEEE TIFS
George A, Marcel S (2019) Deep pixel-wise binary supervision for face presentation attack detection. In: ICB
Yu Z, Zhao C, Wang Z, Qin Y, Su Z, Li X, Zhou F, Zhao G (2020) Searching central difference convolutional networks for face anti-spoofing. In: CVPR
Zhang K-Y, Yao T, Zhang J, Tai Y, Ding S, Li J, Huang F, Song H, Ma L (2020) Face anti-spoofing via disentangled representation learning. In: ECCV
Liu Y, Stehouwer J, Liu X (2020) On disentangling spoof trace for generic face anti-spoofing. In: ECCV. Springer, pp 406–422
Li H, Li W, Cao H, Wang S, Huang F, Kot AC (2018) Unsupervised domain adaptation for face anti-spoofing. IEEE Trans Inf Forensics Secur 13(7):1794–1809
Tu X, Zhang H, **e M, Luo Y, Zhang Y, Ma Z (2019) Deep transfer across domains for face antispoofing. J Electron Imaging 28(4):043001
Wang G, Han H, Shan S, Chen X (2019) Improving cross-database face presentation attack detection via adversarial domain adaptation. In: ICB. IEEE
Manoel Camillo O, Penna N, Koerich AL, Britto Jr AS, Israel A, Laurensi R, Menon LT (2019) Style transfer applied to face liveness detection with user-centered models. ar**v:1907.07270
Yin Z, Shao J, Yang B, Zhang J (2021) Few-shot domain expansion for face anti-spoofing. ar**v:2106.14162
Shao R, Lan X, Yuen PC (2020) Regularized fine-grained meta face anti-spoofing. In: Proceedings of the AAAI conference on artificial intelligence, vol 34, pp 11974–11981
Qin Y, Yu Z, Yan L, Wang Z, Zhao C, Lei Z (2021) Meta-teacher for face anti-spoofing. IEEE Trans Pattern Anal Mach Intell
Chen Z, Yao T, Sheng K, Ding S, Tai Y, Li J, Huang F, ** X (2021) Generalizable representation learning for mixture domain face anti-spoofing. In: Proceedings of the AAAI conference on artificial intelligence, vol 35, pp 1132–1139
Wang J, Zhang J, Bian Y, Cai Y, Wang C, Pu S (2021) Self-domain adaptation for face anti-spoofing. In: Proceedings of the AAAI conference on artificial intelligence, vol. 35, pp 2746–2754
Zhou Q, Zhang K-Y, Yao T, Yi R, Ding S, Ma L (2022) Adaptive mixture of experts learning for generalizable face anti-spoofing. In: Proceedings of the 30th ACM international conference on multimedia, pp 6009–6018
George A, Marcel S (2021) On the effectiveness of vision transformers for zero-shot face anti-spoofing
Huang H-P, Sun D, Liu Y, Chu W-S, **ao T, Yuan J, Adam H, Yang M-H (2022) Adaptive transformers for robust few-shot cross-domain face anti-spoofing. ar**v preprint ar**v:2203.12175
Cheng Z, Zhu X, Gong S (2018) Surveillance face recognition challenge. ar**v preprint ar**v:1804.09691
Nada H, Sindagi VA, Zhang H, Patel VM (2018) Pushing the limits of unconstrained face detection: a challenge dataset and baseline results. In: 2018 IEEE 9th international conference on biometrics theory, applications and systems (BTAS), pp 1–10. IEEE
Grgic M, Delac K, Grgic S (2011) Scface-surveillance cameras face database. Multimedia Tools Appl 51(3):863–879
Kim M, Jain AK, Liu X (2022) Adaface: quality adaptive margin for face recognition. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (CVPR), June 2022, pp 18750–18759
Li P, Prieto L, Mery D, Flynn PJ (2019) On low-resolution face recognition in the wild: comparisons and new techniques. IEEE Trans Inf Forensics Secur 14(8):2000–2012
Zhong Y, Deng W, Hu J, Zhao D, Li X, Wen D (2021) Sface: sigmoid-constrained hypersphere loss for robust face recognition. IEEE Trans Image Process 30:2587–2598
Erdogmus N, Marcel S (2013) Spoofing in 2d face recognition with 3d masks and anti-spoofing with kinect. In: IEEE 6th international conference on biometrics: theory, applications and systems (BTAS’13), pp 1–8
Galbally J, Satta R (2016) Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models. IET Biometrics
Steiner H, Kolb A, Jung N (2016) Reliable face anti-spoofing using multispectral swir imaging. In: ICB. IEEE
Jia S, Guo G, Xu Z (2020) A survey on 3d mask presentation attack detection and countermeasures. Pattern Recognit
Liu S-Q, Lan X, Yuen PC (2018) Remote photoplethysmography correspondence feature for 3d mask face presentation attack detection. In: ECCV
Fang H, Liu A, Wan J, Escalera S, Zhao C, Zhang X, Li SZ, Lei Z (2023) Surveillance face anti-spoofing. ar**v preprint ar**v:2301.00975
Chen X, Xu S, Ji Q, Cao S (2021) A dataset and benchmark towards multi-modal face anti-spoofing under surveillance scenarios. IEEE Access 9:28140–28155
George A, Mostaani Z, Geissenbuhler D, Nikisins O, Anjos A, Marcel S (2019) Biometric face presentation attack detection with multi-channel convolutional neural network. TIFS
Liu Y, Stehouwer J, Jourabloo A, Liu X (2019) Deep tree learning for zero-shot face anti-spoofing. In: CVPR
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Wan, J., Guo, G., Escalera, S., Escalante, H.J., Li, S.Z. (2023). Conclusions and Future Work. In: Advances in Face Presentation Attack Detection. Synthesis Lectures on Computer Vision. Springer, Cham. https://doi.org/10.1007/978-3-031-32906-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-031-32906-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-32905-0
Online ISBN: 978-3-031-32906-7
eBook Packages: Synthesis Collection of Technology (R0)eBColl Synthesis Collection 12