Skip to main content

Anti-spoofing, Face Databases

  • Reference work entry
  • First Online:
Encyclopedia of Biometrics

Synonyms

Face counterfeits databases; Liveness detection databases; Presentation attack databases

Definition

Datasets for the evaluation of face verification system vulnerabilities to spoofing attacks and for the evaluation of face spoofing countermeasures.

Introduction

The first public dataset for studying anti-spoofing in face recognition appeared in 2010, accompanying the work of Tan and others in [1]. In this work, the authors explore the Lambertian reflectance model to derive differences between the 2D images of the face presented during an attack and a real (3D) face, in real-access attempts. Following the trend of similar past work [2, 3], the authors focus on the binary classification task of face spoofing detection considering pictures of real accesses and attacks recorded with a conventional webcam. Anti-spoofing methods that deal with texture analysis can use the NUAA Photo Imposter Database to compare results with values published on the original work.

As demonstrated in...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 899.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. X. Tan, Y. Li, J. Liu, L. Jiang, Face liveness detection from a single image with sparse low rank bilinear discriminative model, in Proceedings of the European Conference on Computer Vision (ECCV), LNCS, vol. 6316, Heraklion, Crete, Greece, (Springer, 2010), pp. 504–517

    Google Scholar 

  2. J. Li, Y. Wang, T. Tan, A.K. Jain, Live face detection based on the analysis of fourier spectra, in Biometric Technology for Human Identification, Orlando, Florida, USA, 2004, pp. 296–303

    Google Scholar 

  3. J. Bai, T. Ng, X. Gao, Y. Shi, Is physics-based liveness detection truly possible with a single image? in International Symposium on Circuits and Systems, Paris, France, (IEEE, 2010), pp. 3425–3428

    Google Scholar 

  4. A. Anjos, S. Marcel, Counter-measures to photo attacks in face recognition: a public database and a baseline, in Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington, DC, 2011

    Google Scholar 

  5. A. Anjos, M.M. Chakka and S. Marcel, Motion-based counter-measures to photo attacks in face recognition IET Biometrics, 3(3), 147–158 (2014)

    Google Scholar 

  6. M.M. Chakka, A. Anjos, S. Marcel, R. Tronci, B. Muntoni, G. Fadda, M. Pili, N. Sirena, G. Murgia, M. Ristri, F. Roli, J. Yan, D. Yi, Z. Lei, Z. Zhang, S.Z. Li, W.R. Schwartz, A. Rocha, H. Pedrini, J. Lorenzo-Navarro, M. Castrillon-Santana, J. Maatta, A. Hadid, M. Pietikainen, Competition on countermeasures to 2-D facial spoofing attacks, in International Joint Conference on Biometrics (IJCB), Washington, DC., USA, 2011

    Google Scholar 

  7. I. Chingovska, A. Anjos, S. Marcel, On the effectiveness of local binary patterns in face anti-spoofing, in IEEE BIOSIG’12, Darmstadt, Germany, Sept 2012

    Google Scholar 

  8. I. Chingovska, J. Yang, Z. Lei, D. Yi, S.Z. Li, O. Kähm, C. Glaser, N. Damer, A. Kuijper, A. Nouak, J. Komulainen, T. Pereira, S. Gupta, S. Khandelwal, S. Bansal, A. Rai, T. Krishna, D. Goyal, M.-A. Waris, H. Zhang, I. Ahmad, S. Kiranyaz, M. Gabbouj, R. Tronci, M. Pili, N. Sirena, F. Roli, J. Galbally, J. Fierrez, A. Pinto, H. Pedrini, W.S. Schwartz, A. Rocha, A. Anjos, S. Marcel1, The 2nd competition on counter measures to 2D face spoofing attacks, in IAPR International Conference on Biometrics, ICB, Madrid, Spain, June 2013

    Google Scholar 

  9. Z. Zhiwei, J. Yan, S. Liu, Z. Lei, D. Yi, S.Z. Li, A face antispoofing database with diverse attacks, in Proceedings of IAPR International Conference on Biometrics (ICB), Beijing, China, 2012, pp. 26–31

    Google Scholar 

  10. N. Erdogmus, S. Marcel, Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect, in Biometrics: Theory, Applications and Systems Conference (BTAS’13), Washington, DC., USA, Sept 2013

    Google Scholar 

  11. J. Määttä, A. Hadid, M. Pietikäinen, Face spoofing detection from single images using micro-texture analysis, in Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, 2011

    Google Scholar 

  12. J. Määttä, A. Hadid, M. Pietikäinen, Face spoofing detection from single images using texture and local shape analysis. IET Biometrics 1(1), 3–10, (2012)

    Google Scholar 

  13. T. Ahonen, A. Hadid, M. Pietikäinen, Face recognition with local binary patterns, in European Conference on Computer Vision (ECCV), Czech republic, Prague, 2004, pp. 469–481

    Google Scholar 

  14. B. Froba, A. Ernst, Face detection with the modified census transform, in IEEE International Conference on Automatic Face and Gesture Recognition, Seoul, Korea, 2004, pp. 91–96

    Google Scholar 

  15. N. Kose, J.-L. Dugelay, Countermeasure for the protection of face recognition systems against mask attacks, in IEEE International Conference on Automatic Face and Gesture Recognition, Shanghai, China, Apr 2013

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Anjos, A., Chingovska, I., Marcel, S. (2015). Anti-spoofing, Face Databases. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_9067

Download citation

Publish with us

Policies and ethics