Introduction to Presentation Attack Detection in Face Biometrics and Recent Advances

  • Chapter
  • First Online:
Handbook of Biometric Anti-Spoofing

Abstract

The main scope of this chapter is to serve as an introduction to face presentation attack detection, including key resources and advances in the field in the last few years. The next pages present the different presentation attacks that a face recognition system can confront, in which an attacker presents to the sensor, mainly a camera, a Presentation Attack Instrument (PAI), that is generally a photograph, a video, or a mask, with the target to impersonate a genuine user or to hide the actual identity of the attacker via obfuscation. First, we make an introduction of the current status of face recognition, its level of deployment, and its challenges. In addition, we present the vulnerabilities and the possible attacks that a face recognition system may be exposed to, showing that way the high importance of presentation attack detection methods. We review different types of presentation attack methods, from simpler to more complex ones, and in which cases they could be effective. Then, we summarize the most popular presentation attack detection methods to deal with these attacks. Finally, we introduce public datasets used by the research community for exploring vulnerabilities of face biometrics to presentation attacks and develo** effective countermeasures against known PAIs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 192.59
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 246.09
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 246.09
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://3dthis.com, https://www.reallusion.com/character-creator/headshot.

  2. 2.

    http://real-f.jp, https://shapify.me, and http://www.sculpteo.com.

  3. 3.

    http://www.thatsmyface.com/.

References

  1. Galbally J, Ferrara P, Haraksim R, Psyllos A, Beslay L (2019) Study on face identification technology for its implementation in the Schengen information system. Joint Research Centre, Ispra, Italy, Rep. JRC-34751

    Google Scholar 

  2. Tome P, Fierrez J, Vera-Rodriguez R, Nixon MS (2014) Soft biometrics and their application in person recognition at a distance. IEEE Trans Inf Forensics Secur 9(3):464–475

    Article  Google Scholar 

  3. Alonso-Fernandez F, Farrugia RA, Fierrez J, Bigun J (2019) Super-resolution for selfie biometrics: introduction and application to face and iris. In: Selfie biometrics. Springer, pp 105–128

    Google Scholar 

  4. Tome P, Vera-Rodriguez R, Fierrez J, Ortega-Garcia J (2015) Facial soft biometric features for forensic face recognition. Forensic Sci Int 257:271–284

    Article  Google Scholar 

  5. Hernandez-Ortega J, Daza R, Morales A, Fierrez J, Ortega-Garcia J (2020) edBB: biometrics and behavior for assessing remote education. In: AAAI workshop on artificial intelligence for education (AI4EDU)

    Google Scholar 

  6. Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: Computer society conference on computer vision and pattern recognition (CVPR), pp 586–591

    Google Scholar 

  7. International biometric group and others: biometrics market and industry report 2009-2014 (2007)

    Google Scholar 

  8. Richardson R (2021). https://www.gmfus.org/news/facial-recognition-public-sector-policy-landscape

  9. Gipp B, Beel J, Rössling I (2007) ePassport: the world’s new electronic passport. A Report about the ePassport’s Benefits, Risks and it’s Security. CreateSpace

    Google Scholar 

  10. Garcia C (2004) Utilización de la firma electrónica en la Administración española iv: Identidad y firma digital. El DNI electrónico, Administración electrónica y procedimiento administrativo

    Google Scholar 

  11. Jain AK, Li SZ (2011) Handbook of face recognition. Springer

    Google Scholar 

  12. Tistarelli M, Champod C (2017) Handbook of biometrics for forensic science. Springer

    Google Scholar 

  13. Zhao J, Cheng Y, Xu Y, **ong L, Li J, Zhao F, Jayashree K, Pranata S, Shen S, **ng J et al (2018) Towards pose invariant face recognition in the wild. In: IEEE conference on computer vision and pattern recognition (CVPR), pp 2207–2216

    Google Scholar 

  14. Li P, Prieto L, Mery D, Flynn PJ (2019) On low-resolution face recognition in the wild: comparisons and new techniques. IEEE Trans Inf Forensics Secur 14(8):2000–2012

    Article  Google Scholar 

  15. Gonzalez-Sosa E, Fierrez J, Vera-Rodriguez R, Alonso-Fernandez F (2018) Facial soft biometrics for recognition in the wild: recent works, annotation and COTS evaluation. IEEE Trans Inf Forensics Secur 13(8):2001–2014

    Article  Google Scholar 

  16. Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process Mag 32(5):20–30

    Article  Google Scholar 

  17. Li L, Correia PL, Hadid A (2018) Face recognition under spoofing attacks: countermeasures and research directions. IET Biom 7(1):3–14

    Article  Google Scholar 

  18. Galbally J, Fierrez J, Ortega-Garcia J (2007) Vulnerabilities in biometric systems: attacks and recent advances in liveness detection. In: Proceedings of Spanish workshop on biometrics, (SWB)

    Google Scholar 

  19. Galbally J, Marcel S, Fierrez J (2014) Biometric antispoofing methods: a survey in face recognition. IEEE Access 2:1530–1552

    Article  Google Scholar 

  20. Gomez-Barrero M, Galbally J, Fierrez J, Ortega-Garcia J (2013) Multimodal biometric fusion: a study on vulnerabilities to indirect attacks. In: Iberoamerican congress on pattern recognition. Springer, pp 358–365

    Google Scholar 

  21. Martinez-Diaz M, Fierrez J, Galbally J, Ortega-Garcia J (2011) An evaluation of indirect attacks and countermeasures in fingerprint verification systems. Pattern Recognit Lett 32:1643–1651

    Article  Google Scholar 

  22. Pena A, Serna I, Morales A, Fierrez J, Lapedriza A (2021) Facial expressions as a vulnerability in face recognition. In: IEEE international conference on image processing (ICIP), pp 2988–2992

    Google Scholar 

  23. Newman LH (2016). https://www.wired.com/2016/08/hackers-trick-facial-recognition-logins-photos-facebook-thanks-zuck/

  24. Goodin D (2008) Get your german interior minister’s fingerprint here. The Register 30

    Google Scholar 

  25. Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. Computer Vision–ECCV, pp 504–517

    Google Scholar 

  26. Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: IEEE BIOSIG

    Google Scholar 

  27. Li Y, Yang X, Sun P, Qi H, Lyu S (2020) Celeb-DF: a large-scale challenging dataset for DeepFake forensics. In: IEEE/CVF conference on computer vision and pattern recognition (CVPR)

    Google Scholar 

  28. Erdogmus N, Marcel S (2014) Spoofing face recognition with 3D masks. IEEE Trans Inf Forensics Secur 9(7):1084–1097

    Article  Google Scholar 

  29. Proceedings IEEE International Conference on Acoustics Speech Signal Process (ICASSP) (2017)

    Google Scholar 

  30. Proceedings of IEEE/IAPR international joint conference on biometrics (IJCB) (2017)

    Google Scholar 

  31. Chakka MM, Anjos A, Marcel S, Tronci R, Muntoni D, Fadda G, Pili M, Sirena N, Murgia G, Ristori M, Roli F, Yan J, Yi D, Lei Z, Zhang Z, Li SZ, Schwartz WR, Rocha A, Pedrini H, Lorenzo-Navarro J, Castrillón-Santana M, Määttä J, Hadid A, Pietikäinen M (2011) Competition on counter measures to 2-D facial spoofing attacks. In: IEEE international joint conference on biometrics (IJCB)

    Google Scholar 

  32. Chingovska I, Yang J, Lei Z, Yi D, Li SZ, Kahm O, Glaser C, Damer N, Kuijper A, Nouak A et al (2013) The 2nd competition on counter measures to 2D face spoofing attacks. In: International conference on biometrics (ICB)

    Google Scholar 

  33. Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche S, Ouafi A, Dornaika F, Taleb-Ahmed A, Qin L et al (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: International joint conference on biometrics (IJCB), pp 688–696

    Google Scholar 

  34. Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: International conference on biometrics (ICB), pp 26–31

    Google Scholar 

  35. George A, Mostaani Z, Geissenbuhler D, Nikisins O, Anjos A, Marcel S (2019) Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE Trans Inf Forensics Secur 15:42–55

    Article  Google Scholar 

  36. Purnapatra S, Smalt N, Bahmani K, Das P, Yambay D, Mohammadi A, George A, Bourlai T, Marcel S, Schuckers S et al (2021) Face liveness detection competition (LivDet-Face)-2021. In: IEEE international joint conference on biometrics (IJCB)

    Google Scholar 

  37. Hernandez-Ortega J, Fierrez J, Morales A, Tome P (2018) Time analysis of pulse-based face anti-spoofing in visible and NIR. In: IEEE CVPR computer society workshop on biometrics

    Google Scholar 

  38. ISO: information technology security techniques security evaluation of biometrics, ISO/IEC Standard ISO/IEC 19792:2009, 2009. International Organization for Standardization (2009). https://www.iso.org/standard/51521.html

  39. ISO: Information technology – Biometric presentation attack detection – Part 1: Framework. International Organization for Standardization (2016). https://www.iso.org/standard/53227.html

  40. Kim J, Choi H, Lee W (2011) Spoof detection method for touchless fingerprint acquisition apparatus. Korea Pat 1(054):314

    Google Scholar 

  41. Raguin DH (2020) System for presentation attack detection in an iris or face scanner. US Patent 10,817,722

    Google Scholar 

  42. Dantcheva A, Chen C, Ross A (2012) Can facial cosmetics affect the matching accuracy of face recognition systems? In: IEEE international conference on biometrics: theory, applications and systems (BTAS). IEEE, pp 391–398

    Google Scholar 

  43. Chen C, Dantcheva A, Swearingen T, Ross A (2017) Spoofing faces using makeup: an investigative study. In: IEEE international conference on identity, security and behavior analysis (ISBA)

    Google Scholar 

  44. Anjos A, Chakka MM, Marcel S (2013) Motion-based counter-measures to photo attacks in face recognition. IET Biom 3(3):147–158

    Article  Google Scholar 

  45. Peng F, Qin L, Long M (2018) Face presentation attack detection using guided scale texture. Multimed Tools Appl 77(7):8883–8909

    Article  Google Scholar 

  46. Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: International joint conference on biometrics (IJCB)

    Google Scholar 

  47. Shen M, Wei Y, Liao Z, Zhu L (2021) IriTrack: face presentation attack detection using iris tracking. In: ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5(2)

    Google Scholar 

  48. Nguyen D, Bui Q (2009) Your face is NOT your password. BlackHat DC

    Google Scholar 

  49. Scherhag U, Raghavendra R, Raja KB, Gomez-Barrero M, Rathgeb C, Busch C (2017) On the vulnerability of face recognition systems towards morphed face attacks. In: IEEE international workshop on biometrics and forensics (IWBF)

    Google Scholar 

  50. Ramachandra R, Venkatesh S, Raja KB, Bhattacharjee S, Wasnik P, Marcel S, Busch C (2019) Custom silicone face masks: Vulnerability of commercial face recognition systems & presentation attack detection. In: IEEE international workshop on biometrics and forensics (IWBF)

    Google Scholar 

  51. Bharadwaj S, Dhamecha TI, Vatsa M, Singh R (2013) Computationally efficient face spoofing detection with motion magnification. In: Proceedings of the ieee conference on computer vision and pattern recognition workshops, pp 105–110

    Google Scholar 

  52. da Silva Pinto A, Pedrini H, Schwartz W, Rocha A (2012) Video-based face spoofing detection through visual rhythm analysis. In: SIBGRAPI conference on graphics, patterns and images, pp 221–228

    Google Scholar 

  53. Pinto A, Goldenstein S, Ferreira A, Carvalho T, Pedrini H, Rocha A (2020) Leveraging shape, reflectance and albedo from shading for face presentation attack detection. IEEE Trans Inf Forensics Secur 15:3347–3358

    Article  Google Scholar 

  54. Kim Y, Yoo JH, Choi K (2011) A motion and similarity-based fake detection method for biometric face recognition systems. IEEE Trans Consum Electron 57(2):756–762

    Article  Google Scholar 

  55. Liu S, Yang B, Yuen PC, Zhao G (2016) A 3D mask face anti-spoofing database with real world variations. In: Proceedings of the ieee conference on computer vision and pattern recognition workshops, pp 100–106

    Google Scholar 

  56. Bhattacharjee S, Mohammadi A, Marcel S (2018) Spoofing deep face recognition with custom silicone masks. In: IEEE international conference on biometrics theory, applications and systems (BTAS)

    Google Scholar 

  57. Galbally J, Satta R (2016) Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models. IET Biom 5(2):83–91

    Article  Google Scholar 

  58. Intel (2021). https://www.intelrealsense.com

  59. Kose N, Dugelay JL (2013) On the vulnerability of face recognition systems to spoofing mask attacks. In: (ICASSP )international conference on acoustics, speech and signal processing. IEEE, pp 2357–2361

    Google Scholar 

  60. Liu S, Lan X, Yuen P (2020) Temporal similarity analysis of remote photoplethysmography for fast 3d mask face presentation attack detection. In: IEEE/CVF winter conference on applications of computer vision, pp 2608–2616

    Google Scholar 

  61. Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Adv Neural Inf Process Syst 27

    Google Scholar 

  62. Dolhansky B, Bitton J, Pflaum B, Lu J, Howes R, Wang M, Canton Ferrer C (2020) The deepfake detection challenge dataset. ar**v:2006.07397

  63. Tolosana R, Vera-Rodriguez R, Fierrez J, Morales A, Ortega-Garcia J (2020) Deepfakes and beyond: a survey of face manipulation and fake detection. Inf Fusion 64:131–148

    Article  Google Scholar 

  64. Hernandez-Ortega J, Tolosana R, Fierrez J, Morales A (2021) DeepFakesON-Phys: DeepFakes detection based on heart rate estimation. In: AAAI conference on artificial intelligence workshops

    Google Scholar 

  65. Singh R, Vatsa M, Bhatt HS, Bharadwaj S, Noore A, Nooreyezdan SS (2010) Plastic surgery: a new dimension to face recognition. IEEE Trans Inf Forensics Secur 5(3):441–448

    Article  Google Scholar 

  66. Aggarwal G, Biswas S, Flynn PJ, Bowyer KW (2012)(2012) A sparse representation approach to face matching across plastic surgery. In: IEEE workshop on the applications of computer vision (WACV), pp 113–119

    Google Scholar 

  67. Bhattacharjee S, Mohammadi A, Marcel S (2018) Spoofing deep face recognition with custom silicone masks. In: International conference on biometrics theory, applications and systems (BTAS). IEEE

    Google Scholar 

  68. Raghavendra R, Raja KB, Busch C (2015) Presentation attack detection for face recognition using light field camera. IEEE Trans Image Process 24(3):1060–1075

    Article  MathSciNet  MATH  Google Scholar 

  69. Yi D, Lei Z, Zhang Z, Li SZ (2014) Face anti-spoofing: multi-spectral approach. In: Handbook of biometric anti-spoofing. Springer, pp 83–102

    Google Scholar 

  70. Lagorio A, Tistarelli M, Cadoni M, Fookes C, Sridharan S (2013) Liveness detection based on 3D face shape analysis. In: International workshop on biometrics and forensics (IWBF). IEEE

    Google Scholar 

  71. Sun L, Huang W, Wu M (2011) TIR/VIS correlation for liveness detection in face recognition. In: International conference on computer analysis of images and patterns. Springer, pp 114–121

    Google Scholar 

  72. Sluganovic I, Roeschlin M, Rasmussen KB, Martinovic I (2016) Using reflexive eye movements for fast challenge-response authentication. In: ACM SIGSAC conference on computer and communications security, pp 1056–1067

    Google Scholar 

  73. Chou CL (2021) Presentation attack detection based on score level fusion and challenge-response technique. J Supercomput 77(5):4681–4697

    Article  Google Scholar 

  74. Kim Y, Na J, Yoon S, Yi J (2009) Masked fake face detection using radiance measurements. JOSA A 26(4):760–766

    Article  Google Scholar 

  75. Yang J, Lei Z, Liao S, Li SZ (2013) Face liveness detection with component dependent descriptor. In: International conference on biometrics (ICB)

    Google Scholar 

  76. Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724

    Article  MathSciNet  MATH  Google Scholar 

  77. Smith DF, Wiliem A, Lovell BC (2015) Face recognition on consumer devices: reflections on replay attacks. IEEE Trans Inf Forensics Secur 10(4):736–745

    Article  Google Scholar 

  78. Li X, Komulainen J, Zhao G, Yuen PC, Pietikäinen M (2016) Generalized face anti-spoofing by detecting pulse from face videos. In: IEEE international conference on pattern recognition (ICPR), pp 4244–4249

    Google Scholar 

  79. Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: IEEE international conference on automatic face gesture recognition, pp 612–618

    Google Scholar 

  80. George A, Marcel S (2020) Learning one class representations for face presentation attack detection using multi-channel convolutional neural networks. IEEE Trans Inf Forensics Secur 16:361–375

    Article  Google Scholar 

  81. Yu Z, Li X, Wang P, Zhao G (2021) TransRPPG: remote photoplethysmography transformer for 3d mask face presentation attack detection. IEEE Signal Process Lett

    Google Scholar 

  82. Zhang D, Ding D, Li J, Liu Q (2015) PCA based extracting feature using fast fourier transform for facial expression recognition. In: Transactions on engineering technologies, pp 413–424

    Google Scholar 

  83. Gonzalez-Sosa E, Vera-Rodriguez R, Fierrez J, Patel V (2017) Exploring body shape from mmW images for person recognition. IEEE Trans Inf Forensics Secur 12(9):2078–2089

    Article  Google Scholar 

  84. Hernandez-Ortega J, Fierrez J, Morales A, Diaz D (2020) A comparative evaluation of heart rate estimation methods using face videos. In: IEEE conference on computers, software, and applications (COMPSAC)

    Google Scholar 

  85. Daza R, Morales A, Fierrez J, Tolosana R (2020) mEBAL: a multimodal database for eye blink detection and attention level estimation. In: ACM international conference on multimodal interaction (ICMI)

    Google Scholar 

  86. Pan G, Wu Z, Sun L (2008) Liveness detection for face recognition. In: Recent advances in face recognition. InTech

    Google Scholar 

  87. Wu HY, Rubinstein M, Shih E, Guttag J, Durand F, Freeman W (2012) Eulerian video magnification for revealing subtle changes in the world. ACM Trans Graph 31(4)

    Google Scholar 

  88. Liu A, Wan J, Escalera S, Jair Escalante H, Tan Z, Yuan Q, Wang K, Lin C, Guo G, Guyon I et al (2019) Multi-modal face anti-spoofing attack detection challenge at CVPR2019. In: IEEE/CVF conference on computer vision and pattern recognition workshops (CVPRw)

    Google Scholar 

  89. Zhang S, Wang X, Liu A, Zhao C, Wan J, Escalera S, Shi H, Wang Z, Li SZ (2019) A dataset and benchmark for large-scale multi-modal face anti-spoofing. In: IEEE/CVF conference on computer vision and pattern recognition (CVPR), pp 919–928

    Google Scholar 

  90. Ortega-Garcia J, Fierrez J, Alonso-Fernandez F, Galbally J, Freire MR, Gonzalez-Rodriguez J, Garcia-Mateo C, Alba-Castro JL, Gonzalez-Agulla E, Otero-Muras E et al (2010) The multiscenario multienvironment biosecure multimodal database (BMDB). IEEE Trans Pattern Anal Mach Intell 32(6):1097–1111

    Article  Google Scholar 

  91. Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In: IEEE/CVF conference on computer vision and pattern recognition (CVPR), pp 389–398

    Google Scholar 

  92. Heusch G, George A, Geissbühler D, Mostaani Z, Marcel S (2020) Deep models and shortwave infrared information to detect face presentation attacks. IEEE Trans Biom Behav Identity Sci 2(4):399–409

    Article  Google Scholar 

  93. Neves JC, Tolosana R, Vera-Rodriguez R, Lopes V, Proenca H, Fierrez J (2020) GANprintR: improved fakes and evaluation of the state of the art in face manipulation detection. IEEE J Sel Top Signal Process 14(5):1038–1048

    Article  Google Scholar 

  94. Tolosana R, Romero-Tapiador S, Fierrez J, Vera-Rodriguez R (2021) DeepFakes evolution: analysis of facial regions and fake detection performance. In: IAPR international conference on pattern recognition workshops (ICPRw)

    Google Scholar 

  95. Dolhansky B, Howes R, Pflaum B, Baram N, Ferrer CC (2019) The DeepFake detection challenge (DFDC) preview dataset. ar**v:1910.08854

  96. Chingovska I, Anjos A, Marcel S (2013) Anti-spoofing in action: joint operation with a verification system. In: Proceedings of the ieee conference on computer vision and pattern recognition workshops, pp 98–104

    Google Scholar 

  97. Fierrez J (2006) Adapted fusion schemes for multimodal biometric authentication. PhD Thesis, Universidad Politecnica de Madrid

    Google Scholar 

  98. de Freitas Pereira T, Anjos A, De Martino JM, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: International conference on biometrics (ICB)

    Google Scholar 

  99. Fierrez J, Morales A, Vera-Rodriguez R, Camacho D (2018) Multiple classifiers in biometrics. Part 1: fundamentals and review. Inf Fusion 44:57–64

    Google Scholar 

  100. Ross AA, Nandakumar K, Jain AK (2006) Handbook of multibiometrics. Springer Science & Business Media

    Google Scholar 

Download references

Acknowledgements

This work was mostly done (2nd Edition of the book) in the context of the TABULA RASA and BEAT projects funded under the 7th Framework Programme of EU. The 3rd Edition update has been made in the context of EU H2020 projects PRIMA and TRESPASS-ETN. This work was also partially supported by the Spanish project BIBECA (RTI2018-101248-B-I00 MINECO/FEDER).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Javier Hernandez-Ortega , Julian Fierrez , Aythami Morales or Javier Galbally .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hernandez-Ortega, J., Fierrez, J., Morales, A., Galbally, J. (2023). Introduction to Presentation Attack Detection in Face Biometrics and Recent Advances. In: Marcel, S., Fierrez, J., Evans, N. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, Singapore. https://doi.org/10.1007/978-981-19-5288-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-5288-3_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-5287-6

  • Online ISBN: 978-981-19-5288-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation