Abstract
Biometric systems are prevalent in access control but are vulnerable to frauds. A typical attempt of violating them is through presentation attacks, in which synthetic data is directly presented to an acquisition sensor to deceive these systems. A well-designed biometric system should have a presentation attack detection (PAD) module. A fruitful way to perform PAD is to model properties of peculiar traits (artifacts) in synthetic data. Studies have been advocating for approaches that seek to model the artifacts automatically from data (data-driven), achieving state-of-the-art results in PAD. However, the following questions arise from this literature: Which approaches are the state of the art? When do these approaches fail? How can such approaches complement the proposed ones based on human knowledge on PAD? How robust are these approaches under cross-dataset scenarios? Are these approaches robust against new attack types (e.g., face morphing)? Do these methods provide other ways to perform PAD, for example, using open-set classifiers rather than the classical binary formulation? Are these methods applicable to the multi-biometric setting? In this chapter, we address these questions through a literature review, focusing on three biometric modalities: face, fingerprint, and iris.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
References
BBC News, Doctor ‘used silicone fingers’ to sign in for colleagues. BBC News. https://www.bbc.com/news/world-latin-america-21756709 (2013). Accessed 13 Jan 2019
J. Bergstra, R. Bardenet, Y. Bengio, B. Kégl, Algorithms for hyper-parameter optimization, in Advances in Neural Information Processing Systems (2011), pp. 2546–2554
J. Bergstra, D. Yamins, D.D. Cox, Making a science of model search: hyperparameter optimization in hundreds of dimensions for vision architectures, in International Conference on Machine Learning (2013), pp. I-115–I-123
S. Bhattacharjee, A. Mohammadi, S. Marcel, Spoofing deep face recognition with custom silicone masks, in IEEE International Conference on Biometrics: Theory, Applications and Systems (2018)
Z. Boulkenafet, J. Komulainen, L. Li, X. Feng, A. Hadid, OULU-NPU: a mobile face presentation attack database with real-world variations, in IEEE International Conference on Automatic Face and Gesture Recognition (2017)
G. Cai, S. Su, C. Leng, J. Wu, Y. Wu, S. Li, Cover patches: a general feature extraction strategy for spoofing detection. Concurrency Comput. Pract. Exp. 31, e4641 (2018)
I. Chingovska, A. Anjos, S. Marcel, On the effectiveness of local binary patterns in face anti-spoofing, in International Conference of the Biometrics Special Interest Group (2012)
T. Chugh, K. Cao, A.K. Jain, Fingerprint spoof buster: use of minutiae-centered patches. IEEE Trans. Inf. Forensics Secur. 13(9), 2190–2202 (2018)
G.B. de Souza, D.F. da Silva Santos, R.G. Pires, A.N. Marana, J.P. Papa, Deep features extraction for robust fingerprint spoofing attack detection. J. Artif. Intell. Soft Comput. Res. 9(1), 41–49 (2019)
K. Delac, M. Grgic, A survey of biometric recognition methods, in International Symposium Electronics in Marine, vol. 46 (2004), pp. 16–18
J.S. Doyle, K.W. Bowyer, Robust detection of textured contact lenses in iris recognition using BSIF. IEEE Access 3, 1672–1683 (2015)
N. Erdogmus, S. Marcel, Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect, in IEEE International Conference on Biometrics: Theory, Applications and Systems (2013)
N. Erdoğmuş, S. Marcel, Introduction, in Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks (Springer, London, 2014), pp. 1–11
L. Ghiani, D. Yambay, V. Mura, S. Tocco, G.L. Marcialis, F. Roli, S. Schuckcrs, LivDet 2013 fingerprint liveness detection competition 2013, in IAPR International Conference on Biometrics (2013), pp. 1–6
D. Gragnaniello, C. Sansone, G. Poggi, L. Verdoliva, Biometric spoofing detection by a domain-aware convolutional neural network, in International Conference on Signal Image Technology and Internet-Based Systems (2017), pp. 193–198
P. Gupta, S. Behera, M. Vatsa, R. Singh, On iris spoofing using print attack, in International Conference on Pattern Recognition (2014), pp. 1681–1686
L. He, H. Li, F. Liu, N. Liu, Z. Sun, Z. He, Multi-patch convolution neural network for iris liveness detection, in IEEE International Conference on Biometrics: Theory, Applications and Systems (2016), pp. 1–7
K. Ito, T. Okano, T. Aoki, Recent advances in biometric security: A case study of liveness detection in face recognition, in Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (2017), pp. 220–227
A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)
N. Kohli, D. Yadav, M. Vatsa, R. Singh, A. Noore, Synthetic iris presentation attack using iDCGAN, in IEEE International Joint Conference on Biometrics (2018), pp. 674–680
A. Krizhevsky, I. Sutskever, G. Hinton, ImageNet classification with deep convolutional neural networks, in Advances in Neural Information Processing Systems (2012), pp. 1097–1105
A. Kuehlkamp, A. Pinto, A. Rocha, K.W. Bowyer, A. Czajka, Ensemble of multi-view learning classifiers for cross-domain iris presentation attack detection. IEEE Trans. Inf. Forensics Secur. 4(6), 1419–1431 (2019)
A. Kumar, A. Passi, Comparison and combination of iris matchers for reliable personal authentication. Pattern Recogn. 43(3), 1016–1026 (2010)
X. Li, J. Komulainen, G. Zhao, P.C. Yuen, M. Pietikäinen, Generalized face anti-spoofing by detecting pulse from face videos, in International Conference on Pattern Recognition (2016), pp. 4244–4249
H. Li, P. He, S. Wang, A. Rocha, X. Jiang, A.C. Kot, Learning generalized deep feature representation for face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 13(10), 2639–2652 (2018)
I. Manjani, S. Tariyal, M. Vatsa, R. Singh, A. Majumdar, Detecting silicone mask-based presentation attack via deep dictionary learning. IEEE Trans. Inf. Forensics Secur. 12(7), 1713–1723 (2017)
G.L. Marcialis, A. Lewicke, B. Tan, P. Coli, D. Grimberg, A. Congiu, A. Tidu, F. Roli, S. Schuckers, First international fingerprint liveness detection competition – LivDet 2009, in International Conference on Image Analysis and Processing (2009), pp. 12–23
D. Menotti, G. Chiachia, A. Pinto, W.R. Schwartz, H. Pedrini, A.X. Falcao, A. Rocha, Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 864–879 (2015)
R.F. Nogueira, R. de Alencar Lotufo, R.C. Machado, Fingerprint liveness detection using convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 11(6), 1206–1213 (2016)
F. Pala, B. Bhanu, Iris liveness detection by relative distance comparisons, in IEEE Conference on Computer Vision and Pattern Recognition Workshops (2017)
F. Pala, B. Bhanu, On the accuracy and robustness of deep triplet embedding for fingerprint liveness detection, in IEEE International Conference on Image Processing (2017), pp. 116–120
E. Park, W. Kim, Q. Li, J. Kim, H. Kim, Fingerprint liveness detection using CNN features of random sample patches, in International Conference of the Biometrics Special Interest Group (2016), pp. 1–4
K. Patel, H. Han, A.K. Jain, Secure face unlock: spoof detection on smartphones. IEEE Trans. Inf. Forensics Secur. 11(10), 2268–2283 (2016)
N. Pinto, D. Doukhan, J. DiCarlo, D. Cox, A high-throughput screening approach to discovering good forms of biologically inspired visual representation. PLoS Comput. Biol. 5(11), e1000579 (2009)
A. Pinto, W.R. Schwartz, H. Pedrini, A. de Rezende Rocha, Using visual rhythms for detecting video-based facial spoof attacks. IEEE Trans. Inf. Forensics Secur. 10(5), 1025–1038 (2015)
A. Pinto, H. Pedrini, M. Krumdick, B. Becker, A. Czajka, K.W. Bowyer, A. Rocha, Counteracting presentation attacks in face fingerprint and iris recognition, in Deep Learning in Biometrics (Taylor and Francis, Boca Raton, 2018)
R. Raghavendra, K.B. Raja, C. Busch, ContlensNet: robust iris contact lens detection using deep convolutional neural networks, in IEEE Winter Conference on Applications of Computer Vision (2017), pp. 1160–1167
A. Rattani, W. Scheirer, A. Ross, Open set fingerprint spoof detection across novel fabrication materials. IEEE Trans. Inf. Forensics Secur. 10(11), 2447–2460 (2015)
Y.A.U. Rehman, L.M. Po, M. Liu, LiveNet: improving features generalization for face liveness detection using convolution neural networks. Expert Syst. Appl. 108, 159–169 (2018)
P. Silva, E. Luz, R. Baeta, H. Pedrini, A. Falcao, D. Menotti, An approach to iris contact lens detection based on deep image representations, in Conference on Graphics, Patterns and Images (2015), pp. 157–164
K. Simonyan, A. Zisserman, Very deep convolutional networks for large-scale image recognition (2014), arXiv preprint arXiv:1409.1556
G.B. Souza, D.F. Santos, R.G. Pires, A.N. Marana, J.P. Papa, Deep Boltzmann machines for robust fingerprint spoofing attack detection, in International Joint Conference on Neural Networks (2017), pp. 1863–1870
Z. Sun, T. Tan, Iris anti-spoofing, in Handbook of Biometric Anti-spoofing: Trusted Biometrics under Spoofing Attacks (Springer, London, 2014), pp. 103–123
Z. Sun, H. Zhang, T. Tan, J. Wang, Iris image classification based on hierarchical visual codebook. IEEE Trans. Pattern Anal. Mach. Intell. 36(6), 1120–1133 (2014)
S. Sundaran, J.K. Antony, K. Vipin, Biometrie liveness authentication detection, in International Conference on Innovations in Information, Embedded and Communication Systems (2017), pp. 1–3
C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, A. Rabinovich, Going deeper with convolutions, in IEEE Conference on Computer Vision and Pattern Recognition (2015), pp. 1–9
X. Tan, Y. Li, J. Liu, L. Jiang, Face liveness detection from a single image with sparse low rank bilinear discriminative model, in European Conference on Computer Vision (2010), pp. 504–551
S. Tariyal, A. Majumdar, R. Singh, M. Vatsa, Deep dictionary learning. IEEE Access 4, 10096–10109 (2016)
A. Toosi, A. Bottino, S. Cumani, P. Negri, P.L. Sottile, Feature fusion for fingerprint liveness detection: a comparative study. IEEE Access 5, 23695–23709 (2017)
A. Toosi, S. Cumani, A. Bottino, CNN patch-based voting for fingerprint liveness detection, in International Joint Conference on Computational Intelligence (2017), pp. 158–165
C. Wang, K. Li, Z. Wu, Q. Zhao, A DCNN based fingerprint liveness detection algorithm with voting strategy, in Chinese Conference on Biometric Recognition (2015), pp. 241–249
L. Wu, Y. Xu, X. Xu, W. Qi, M. Jian, A face liveness detection scheme to combining static and dynamic features, in Chinese Conference on Biometric Recognition (2016), pp. 628–636
D. Yambay, L. Ghiani, P. Denti, G.L. Marcialis, F. Roli, S. Schuckers, LivDet 2011 – fingerprint liveness detection competition 2011, in IAPR International Conference on Biometrics (2012), pp. 208–215
D. Yambay, B. Becker, N. Kohli, D. Yadav, A. Czajka, K.W. Bowyer, S. Schuckers, R. Singh, M. Vatsa, A. Noore, et al., LivDet iris 2017 – iris liveness detection competition 2017, in IEEE International Joint Conference on Biometrics (2017), pp. 733–741
D. Yang, J. Lai, L. Mei, Deep representations based on sparse auto-encoder networks for face spoofing detection, in Chinese Conference on Biometric Recognition (2016), pp. 620–627
Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, S.Z. Li, A face antispoofing database with diverse attacks, in IAPR International Conference on Biometrics (2012), pp. 26–31
Y. Zhang, B. Zhou, X. Qiu, H. Wu, X. Zhan, 2D fake fingerprint detection for portable devices using improved light convolutional neural networks, in Chinese Conference on Biometric Recognition (2017), pp. 353–360
Acknowledgements
The authors thank the financial support of the European Union through the Horizon 2020 Identity Project as well as the São Paulo Research Foundation—Fapesp, through the grant #2017/12646-3 (DéjàVu), and the Brazilian Coordination for the Improvement of Higher Education Personnel—Capes, through the DeepEyes grant.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix 1: Datasets and Research Work
See Table 4.
Appendix 2: List of Acronyms
- BSIF:
-
Binary statistical image features
- CNN:
-
Convolutional neural network
- DBM:
-
Deep Boltzmann machine
- DCNN:
-
Deep convolutional neural network
- DNN:
-
Deep neural network
- HTER:
-
Half total error rate
- LBP:
-
Local binary pattern
- MLP:
-
Multilayer perceptron
- PA:
-
Presentation attack
- PAD:
-
Presentation attack detection
- SAE:
-
Sparse auto-encoder
- SVM:
-
Support vector machines
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Pereira, L.A.M. et al. (2020). The Rise of Data-Driven Models in Presentation Attack Detection. In: Jiang, R., Li, CT., Crookes, D., Meng, W., Rosenberger, C. (eds) Deep Biometrics. Unsupervised and Semi-Supervised Learning. Springer, Cham. https://doi.org/10.1007/978-3-030-32583-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-32583-1_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-32582-4
Online ISBN: 978-3-030-32583-1
eBook Packages: EngineeringEngineering (R0)