Abstract
The main scope of this chapter is to serve as an introduction to face presentation attack detection, including key resources and advances in the field in the last few years. The next pages present the different presentation attacks that a face recognition system can confront, in which an attacker presents to the sensor, mainly a camera, a Presentation Attack Instrument (PAI), that is generally a photograph, a video, or a mask, with the target to impersonate a genuine user or to hide the actual identity of the attacker via obfuscation. First, we make an introduction of the current status of face recognition, its level of deployment, and its challenges. In addition, we present the vulnerabilities and the possible attacks that a face recognition system may be exposed to, showing that way the high importance of presentation attack detection methods. We review different types of presentation attack methods, from simpler to more complex ones, and in which cases they could be effective. Then, we summarize the most popular presentation attack detection methods to deal with these attacks. Finally, we introduce public datasets used by the research community for exploring vulnerabilities of face biometrics to presentation attacks and develo** effective countermeasures against known PAIs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
https://3dthis.com, https://www.reallusion.com/character-creator/headshot.
- 2.
- 3.
References
Galbally J, Ferrara P, Haraksim R, Psyllos A, Beslay L (2019) Study on face identification technology for its implementation in the Schengen information system. Joint Research Centre, Ispra, Italy, Rep. JRC-34751
Tome P, Fierrez J, Vera-Rodriguez R, Nixon MS (2014) Soft biometrics and their application in person recognition at a distance. IEEE Trans Inf Forensics Secur 9(3):464–475
Alonso-Fernandez F, Farrugia RA, Fierrez J, Bigun J (2019) Super-resolution for selfie biometrics: introduction and application to face and iris. In: Selfie biometrics. Springer, pp 105–128
Tome P, Vera-Rodriguez R, Fierrez J, Ortega-Garcia J (2015) Facial soft biometric features for forensic face recognition. Forensic Sci Int 257:271–284
Hernandez-Ortega J, Daza R, Morales A, Fierrez J, Ortega-Garcia J (2020) edBB: biometrics and behavior for assessing remote education. In: AAAI workshop on artificial intelligence for education (AI4EDU)
Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: Computer society conference on computer vision and pattern recognition (CVPR), pp 586–591
International biometric group and others: biometrics market and industry report 2009-2014 (2007)
Richardson R (2021). https://www.gmfus.org/news/facial-recognition-public-sector-policy-landscape
Gipp B, Beel J, Rössling I (2007) ePassport: the world’s new electronic passport. A Report about the ePassport’s Benefits, Risks and it’s Security. CreateSpace
Garcia C (2004) Utilización de la firma electrónica en la Administración española iv: Identidad y firma digital. El DNI electrónico, Administración electrónica y procedimiento administrativo
Jain AK, Li SZ (2011) Handbook of face recognition. Springer
Tistarelli M, Champod C (2017) Handbook of biometrics for forensic science. Springer
Zhao J, Cheng Y, Xu Y, **ong L, Li J, Zhao F, Jayashree K, Pranata S, Shen S, **ng J et al (2018) Towards pose invariant face recognition in the wild. In: IEEE conference on computer vision and pattern recognition (CVPR), pp 2207–2216
Li P, Prieto L, Mery D, Flynn PJ (2019) On low-resolution face recognition in the wild: comparisons and new techniques. IEEE Trans Inf Forensics Secur 14(8):2000–2012
Gonzalez-Sosa E, Fierrez J, Vera-Rodriguez R, Alonso-Fernandez F (2018) Facial soft biometrics for recognition in the wild: recent works, annotation and COTS evaluation. IEEE Trans Inf Forensics Secur 13(8):2001–2014
Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process Mag 32(5):20–30
Li L, Correia PL, Hadid A (2018) Face recognition under spoofing attacks: countermeasures and research directions. IET Biom 7(1):3–14
Galbally J, Fierrez J, Ortega-Garcia J (2007) Vulnerabilities in biometric systems: attacks and recent advances in liveness detection. In: Proceedings of Spanish workshop on biometrics, (SWB)
Galbally J, Marcel S, Fierrez J (2014) Biometric antispoofing methods: a survey in face recognition. IEEE Access 2:1530–1552
Gomez-Barrero M, Galbally J, Fierrez J, Ortega-Garcia J (2013) Multimodal biometric fusion: a study on vulnerabilities to indirect attacks. In: Iberoamerican congress on pattern recognition. Springer, pp 358–365
Martinez-Diaz M, Fierrez J, Galbally J, Ortega-Garcia J (2011) An evaluation of indirect attacks and countermeasures in fingerprint verification systems. Pattern Recognit Lett 32:1643–1651
Pena A, Serna I, Morales A, Fierrez J, Lapedriza A (2021) Facial expressions as a vulnerability in face recognition. In: IEEE international conference on image processing (ICIP), pp 2988–2992
Newman LH (2016). https://www.wired.com/2016/08/hackers-trick-facial-recognition-logins-photos-facebook-thanks-zuck/
Goodin D (2008) Get your german interior minister’s fingerprint here. The Register 30
Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. Computer Vision–ECCV, pp 504–517
Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: IEEE BIOSIG
Li Y, Yang X, Sun P, Qi H, Lyu S (2020) Celeb-DF: a large-scale challenging dataset for DeepFake forensics. In: IEEE/CVF conference on computer vision and pattern recognition (CVPR)
Erdogmus N, Marcel S (2014) Spoofing face recognition with 3D masks. IEEE Trans Inf Forensics Secur 9(7):1084–1097
Proceedings IEEE International Conference on Acoustics Speech Signal Process (ICASSP) (2017)
Proceedings of IEEE/IAPR international joint conference on biometrics (IJCB) (2017)
Chakka MM, Anjos A, Marcel S, Tronci R, Muntoni D, Fadda G, Pili M, Sirena N, Murgia G, Ristori M, Roli F, Yan J, Yi D, Lei Z, Zhang Z, Li SZ, Schwartz WR, Rocha A, Pedrini H, Lorenzo-Navarro J, Castrillón-Santana M, Määttä J, Hadid A, Pietikäinen M (2011) Competition on counter measures to 2-D facial spoofing attacks. In: IEEE international joint conference on biometrics (IJCB)
Chingovska I, Yang J, Lei Z, Yi D, Li SZ, Kahm O, Glaser C, Damer N, Kuijper A, Nouak A et al (2013) The 2nd competition on counter measures to 2D face spoofing attacks. In: International conference on biometrics (ICB)
Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche S, Ouafi A, Dornaika F, Taleb-Ahmed A, Qin L et al (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: International joint conference on biometrics (IJCB), pp 688–696
Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: International conference on biometrics (ICB), pp 26–31
George A, Mostaani Z, Geissenbuhler D, Nikisins O, Anjos A, Marcel S (2019) Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE Trans Inf Forensics Secur 15:42–55
Purnapatra S, Smalt N, Bahmani K, Das P, Yambay D, Mohammadi A, George A, Bourlai T, Marcel S, Schuckers S et al (2021) Face liveness detection competition (LivDet-Face)-2021. In: IEEE international joint conference on biometrics (IJCB)
Hernandez-Ortega J, Fierrez J, Morales A, Tome P (2018) Time analysis of pulse-based face anti-spoofing in visible and NIR. In: IEEE CVPR computer society workshop on biometrics
ISO: information technology security techniques security evaluation of biometrics, ISO/IEC Standard ISO/IEC 19792:2009, 2009. International Organization for Standardization (2009). https://www.iso.org/standard/51521.html
ISO: Information technology – Biometric presentation attack detection – Part 1: Framework. International Organization for Standardization (2016). https://www.iso.org/standard/53227.html
Kim J, Choi H, Lee W (2011) Spoof detection method for touchless fingerprint acquisition apparatus. Korea Pat 1(054):314
Raguin DH (2020) System for presentation attack detection in an iris or face scanner. US Patent 10,817,722
Dantcheva A, Chen C, Ross A (2012) Can facial cosmetics affect the matching accuracy of face recognition systems? In: IEEE international conference on biometrics: theory, applications and systems (BTAS). IEEE, pp 391–398
Chen C, Dantcheva A, Swearingen T, Ross A (2017) Spoofing faces using makeup: an investigative study. In: IEEE international conference on identity, security and behavior analysis (ISBA)
Anjos A, Chakka MM, Marcel S (2013) Motion-based counter-measures to photo attacks in face recognition. IET Biom 3(3):147–158
Peng F, Qin L, Long M (2018) Face presentation attack detection using guided scale texture. Multimed Tools Appl 77(7):8883–8909
Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: International joint conference on biometrics (IJCB)
Shen M, Wei Y, Liao Z, Zhu L (2021) IriTrack: face presentation attack detection using iris tracking. In: ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5(2)
Nguyen D, Bui Q (2009) Your face is NOT your password. BlackHat DC
Scherhag U, Raghavendra R, Raja KB, Gomez-Barrero M, Rathgeb C, Busch C (2017) On the vulnerability of face recognition systems towards morphed face attacks. In: IEEE international workshop on biometrics and forensics (IWBF)
Ramachandra R, Venkatesh S, Raja KB, Bhattacharjee S, Wasnik P, Marcel S, Busch C (2019) Custom silicone face masks: Vulnerability of commercial face recognition systems & presentation attack detection. In: IEEE international workshop on biometrics and forensics (IWBF)
Bharadwaj S, Dhamecha TI, Vatsa M, Singh R (2013) Computationally efficient face spoofing detection with motion magnification. In: Proceedings of the ieee conference on computer vision and pattern recognition workshops, pp 105–110
da Silva Pinto A, Pedrini H, Schwartz W, Rocha A (2012) Video-based face spoofing detection through visual rhythm analysis. In: SIBGRAPI conference on graphics, patterns and images, pp 221–228
Pinto A, Goldenstein S, Ferreira A, Carvalho T, Pedrini H, Rocha A (2020) Leveraging shape, reflectance and albedo from shading for face presentation attack detection. IEEE Trans Inf Forensics Secur 15:3347–3358
Kim Y, Yoo JH, Choi K (2011) A motion and similarity-based fake detection method for biometric face recognition systems. IEEE Trans Consum Electron 57(2):756–762
Liu S, Yang B, Yuen PC, Zhao G (2016) A 3D mask face anti-spoofing database with real world variations. In: Proceedings of the ieee conference on computer vision and pattern recognition workshops, pp 100–106
Bhattacharjee S, Mohammadi A, Marcel S (2018) Spoofing deep face recognition with custom silicone masks. In: IEEE international conference on biometrics theory, applications and systems (BTAS)
Galbally J, Satta R (2016) Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models. IET Biom 5(2):83–91
Intel (2021). https://www.intelrealsense.com
Kose N, Dugelay JL (2013) On the vulnerability of face recognition systems to spoofing mask attacks. In: (ICASSP )international conference on acoustics, speech and signal processing. IEEE, pp 2357–2361
Liu S, Lan X, Yuen P (2020) Temporal similarity analysis of remote photoplethysmography for fast 3d mask face presentation attack detection. In: IEEE/CVF winter conference on applications of computer vision, pp 2608–2616
Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Adv Neural Inf Process Syst 27
Dolhansky B, Bitton J, Pflaum B, Lu J, Howes R, Wang M, Canton Ferrer C (2020) The deepfake detection challenge dataset. ar**v:2006.07397
Tolosana R, Vera-Rodriguez R, Fierrez J, Morales A, Ortega-Garcia J (2020) Deepfakes and beyond: a survey of face manipulation and fake detection. Inf Fusion 64:131–148
Hernandez-Ortega J, Tolosana R, Fierrez J, Morales A (2021) DeepFakesON-Phys: DeepFakes detection based on heart rate estimation. In: AAAI conference on artificial intelligence workshops
Singh R, Vatsa M, Bhatt HS, Bharadwaj S, Noore A, Nooreyezdan SS (2010) Plastic surgery: a new dimension to face recognition. IEEE Trans Inf Forensics Secur 5(3):441–448
Aggarwal G, Biswas S, Flynn PJ, Bowyer KW (2012)(2012) A sparse representation approach to face matching across plastic surgery. In: IEEE workshop on the applications of computer vision (WACV), pp 113–119
Bhattacharjee S, Mohammadi A, Marcel S (2018) Spoofing deep face recognition with custom silicone masks. In: International conference on biometrics theory, applications and systems (BTAS). IEEE
Raghavendra R, Raja KB, Busch C (2015) Presentation attack detection for face recognition using light field camera. IEEE Trans Image Process 24(3):1060–1075
Yi D, Lei Z, Zhang Z, Li SZ (2014) Face anti-spoofing: multi-spectral approach. In: Handbook of biometric anti-spoofing. Springer, pp 83–102
Lagorio A, Tistarelli M, Cadoni M, Fookes C, Sridharan S (2013) Liveness detection based on 3D face shape analysis. In: International workshop on biometrics and forensics (IWBF). IEEE
Sun L, Huang W, Wu M (2011) TIR/VIS correlation for liveness detection in face recognition. In: International conference on computer analysis of images and patterns. Springer, pp 114–121
Sluganovic I, Roeschlin M, Rasmussen KB, Martinovic I (2016) Using reflexive eye movements for fast challenge-response authentication. In: ACM SIGSAC conference on computer and communications security, pp 1056–1067
Chou CL (2021) Presentation attack detection based on score level fusion and challenge-response technique. J Supercomput 77(5):4681–4697
Kim Y, Na J, Yoon S, Yi J (2009) Masked fake face detection using radiance measurements. JOSA A 26(4):760–766
Yang J, Lei Z, Liao S, Li SZ (2013) Face liveness detection with component dependent descriptor. In: International conference on biometrics (ICB)
Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724
Smith DF, Wiliem A, Lovell BC (2015) Face recognition on consumer devices: reflections on replay attacks. IEEE Trans Inf Forensics Secur 10(4):736–745
Li X, Komulainen J, Zhao G, Yuen PC, Pietikäinen M (2016) Generalized face anti-spoofing by detecting pulse from face videos. In: IEEE international conference on pattern recognition (ICPR), pp 4244–4249
Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: IEEE international conference on automatic face gesture recognition, pp 612–618
George A, Marcel S (2020) Learning one class representations for face presentation attack detection using multi-channel convolutional neural networks. IEEE Trans Inf Forensics Secur 16:361–375
Yu Z, Li X, Wang P, Zhao G (2021) TransRPPG: remote photoplethysmography transformer for 3d mask face presentation attack detection. IEEE Signal Process Lett
Zhang D, Ding D, Li J, Liu Q (2015) PCA based extracting feature using fast fourier transform for facial expression recognition. In: Transactions on engineering technologies, pp 413–424
Gonzalez-Sosa E, Vera-Rodriguez R, Fierrez J, Patel V (2017) Exploring body shape from mmW images for person recognition. IEEE Trans Inf Forensics Secur 12(9):2078–2089
Hernandez-Ortega J, Fierrez J, Morales A, Diaz D (2020) A comparative evaluation of heart rate estimation methods using face videos. In: IEEE conference on computers, software, and applications (COMPSAC)
Daza R, Morales A, Fierrez J, Tolosana R (2020) mEBAL: a multimodal database for eye blink detection and attention level estimation. In: ACM international conference on multimodal interaction (ICMI)
Pan G, Wu Z, Sun L (2008) Liveness detection for face recognition. In: Recent advances in face recognition. InTech
Wu HY, Rubinstein M, Shih E, Guttag J, Durand F, Freeman W (2012) Eulerian video magnification for revealing subtle changes in the world. ACM Trans Graph 31(4)
Liu A, Wan J, Escalera S, Jair Escalante H, Tan Z, Yuan Q, Wang K, Lin C, Guo G, Guyon I et al (2019) Multi-modal face anti-spoofing attack detection challenge at CVPR2019. In: IEEE/CVF conference on computer vision and pattern recognition workshops (CVPRw)
Zhang S, Wang X, Liu A, Zhao C, Wan J, Escalera S, Shi H, Wang Z, Li SZ (2019) A dataset and benchmark for large-scale multi-modal face anti-spoofing. In: IEEE/CVF conference on computer vision and pattern recognition (CVPR), pp 919–928
Ortega-Garcia J, Fierrez J, Alonso-Fernandez F, Galbally J, Freire MR, Gonzalez-Rodriguez J, Garcia-Mateo C, Alba-Castro JL, Gonzalez-Agulla E, Otero-Muras E et al (2010) The multiscenario multienvironment biosecure multimodal database (BMDB). IEEE Trans Pattern Anal Mach Intell 32(6):1097–1111
Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoofing: Binary or auxiliary supervision. In: IEEE/CVF conference on computer vision and pattern recognition (CVPR), pp 389–398
Heusch G, George A, Geissbühler D, Mostaani Z, Marcel S (2020) Deep models and shortwave infrared information to detect face presentation attacks. IEEE Trans Biom Behav Identity Sci 2(4):399–409
Neves JC, Tolosana R, Vera-Rodriguez R, Lopes V, Proenca H, Fierrez J (2020) GANprintR: improved fakes and evaluation of the state of the art in face manipulation detection. IEEE J Sel Top Signal Process 14(5):1038–1048
Tolosana R, Romero-Tapiador S, Fierrez J, Vera-Rodriguez R (2021) DeepFakes evolution: analysis of facial regions and fake detection performance. In: IAPR international conference on pattern recognition workshops (ICPRw)
Dolhansky B, Howes R, Pflaum B, Baram N, Ferrer CC (2019) The DeepFake detection challenge (DFDC) preview dataset. ar**v:1910.08854
Chingovska I, Anjos A, Marcel S (2013) Anti-spoofing in action: joint operation with a verification system. In: Proceedings of the ieee conference on computer vision and pattern recognition workshops, pp 98–104
Fierrez J (2006) Adapted fusion schemes for multimodal biometric authentication. PhD Thesis, Universidad Politecnica de Madrid
de Freitas Pereira T, Anjos A, De Martino JM, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: International conference on biometrics (ICB)
Fierrez J, Morales A, Vera-Rodriguez R, Camacho D (2018) Multiple classifiers in biometrics. Part 1: fundamentals and review. Inf Fusion 44:57–64
Ross AA, Nandakumar K, Jain AK (2006) Handbook of multibiometrics. Springer Science & Business Media
Acknowledgements
This work was mostly done (2nd Edition of the book) in the context of the TABULA RASA and BEAT projects funded under the 7th Framework Programme of EU. The 3rd Edition update has been made in the context of EU H2020 projects PRIMA and TRESPASS-ETN. This work was also partially supported by the Spanish project BIBECA (RTI2018-101248-B-I00 MINECO/FEDER).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Hernandez-Ortega, J., Fierrez, J., Morales, A., Galbally, J. (2023). Introduction to Presentation Attack Detection in Face Biometrics and Recent Advances. In: Marcel, S., Fierrez, J., Evans, N. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, Singapore. https://doi.org/10.1007/978-981-19-5288-3_9
Download citation
DOI: https://doi.org/10.1007/978-981-19-5288-3_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-5287-6
Online ISBN: 978-981-19-5288-3
eBook Packages: Computer ScienceComputer Science (R0)