Skip to main content

Challenges of Face Presentation Attack Detection in Real Scenarios

  • Chapter
  • First Online:
Handbook of Biometric Anti-Spoofing

Abstract

In the current context of digital transformation, the increasing trend in the use of personal devices for accessing online services has fostered the necessity of secure cyberphysical solutions. Biometric technologies for mobile devices, and face recognition specifically, have emerged as a secure and convenient approach. However, such a mobile scenario also brings some specific threats, and spoofing attack detection is, without any doubt, one of the most challenging. Although much effort has been devoted in anti-spoofing techniques over the past few years, there are still many challenges to be solved when implementing these systems in real use cases. This chapter analyses some of the gaps between research and real scenario deployments, including generalisation, usability, and performance. More specifically, we will focus on how to select and configure an algorithm for real scenario deployments, paying special attention to use cases involving limited processing capacity devices (e.g., mobile devices), and we will present a publicly available evaluation framework for this purpose.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://www.iproov.com.

  2. 2.

    https://www.zoloz.com/smile.

  3. 3.

    https://www.bioid.com/liveness-detection/.

  4. 4.

    http://cvl-demos.cs.nott.ac.uk/vrn/.

  5. 5.

    http://biometrics.cse.msu.edu/Publications/Databases/MSU_USSA/.

  6. 6.

    https://www.nist.gov/sites/default/files/usability_and_biometrics_final2.pdf.

  7. 7.

    The evaluation framework may be downloaded using the following URL: https://github.com/Gradiant/bob.chapter.hobpad2.facepadprotocols.

  8. 8.

    https://gitlab.idiap.ch/bob/bob.ip.qualitymeasure.

  9. 9.

    https://ark.intel.com/es-es/products/52577/Intel-Xeon-Processor-X5675-12M-Cache-3_06-GHz-6_40-GTs-Intel-QPI.

  10. 10.

    http://dlib.net/.

References

  1. Patel K, Han H, Jain A (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10), 2268–2283

    Article  Google Scholar 

  2. Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: 2015 IEEE international conference on image processing (ICIP), pp 2636–2640. https://doi.org/10.1109/ICIP.2015.7351280

  3. Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. Springer, Berlin, pp 504–517. https://doi.org/10.1007/978-3-642-15567-3_37

    Chapter  Google Scholar 

  4. Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: 2012 5th IAPR international conference on biometrics (ICB), pp 26–31. https://doi.org/10.1109/ICB.2012.6199754

  5. Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG - proceedings of the international conference of biometrics special interest group (BIOSIG), pp 1–7

    Google Scholar 

  6. Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761. https://doi.org/10.1109/TIFS.2015.2400395

    Article  Google Scholar 

  7. Costa-Pazo A, Bhattacharjee S, Vazquez-Fernandez E, Marcel S (2016) The replay-mobile face presentation-attack database. In: Proceedings of the international conference on biometrics special interests group (BioSIG)

    Google Scholar 

  8. Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: 2017 12th IEEE international conference on automatic face gesture recognition (FG 2017), pp 612–618. https://doi.org/10.1109/FG.2017.77

  9. Chingovska I, Yang J, Lei Z, Yi D, Li SZ, Kähm O, Glaser C, Damer N, Kuijper A, Nouak A, Komulainen J, Pereira TF, Gupta S, Khandelwal S, Bansal S, Rai A, Krishna T, Goyal D, Waris M, Zhang H, Ahmad I, Kiranyaz S, Gabbouj M, Tronci R, Pili M, Sirena N, Roli F, Galbally J, Fiérrez J, da Silva Pinto A, Pedrini H, Schwartz WS, Rocha A, Anjos A, Marcel S (2013) The 2nd competition on counter measures to 2d face spoofing attacks. In: International conference on biometrics, ICB 2013, 4–7 June 2013, Madrid, Spain, pp 1–6. https://doi.org/10.1109/ICB.2013.6613026

  10. Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche SE, Ouafi A, Dornaika F, Taleb-Ahmed A, Qin L, Peng F, Zhang LB, Long M, Bhilare S, Kanhangad V, Costa-Pazo A, Vazquez-Fernandez E, Pérez-Cabo D, Moreira-Pérez JJ, González-Jiménez D, Mohammadi A, Bhattacharjee S, Marcel S, Volkova S, Tang Y, Abe N, Li L, Feng X, Xia Z, Jiang X, Liu S, Shao R, Yuen PC, Almeida WR, Andaló F, Padilha R, Bertocco G, Dias W, Wainer J, Torres R, Rocha A, Angeloni MA, Folego G, Godoy A, Hadid A (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: IJCB 2017: international joint conference on biometrics (IJCB)

    Google Scholar 

  11. Xu Y, Price T, Frahm JM, Monrose F (2016) Virtual u: defeating face liveness detection by building virtual models from your public photos. In: 25th USENIX security symposium (USENIX security 16). USENIX Association, Austin, TX, pp 497–512

    Google Scholar 

  12. Jackson AS, Bulat A, Argyriou V, Tzimiropoulos G (2017) Large pose 3d face reconstruction from a single image via direct volumetric CNN regression. CoRR. arXiv:1703.07834

  13. de Freitas Pereira T, Anjos A, Martino JMD, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: 2013 international conference on biometrics (ICB), pp 1–8. https://doi.org/10.1109/ICB.2013.6612981

  14. Miguel-Hurtado O, Guest R, Lunerti C (2017) Voice and face interaction evaluation of a mobile authentication platform. In: 51st IEEE international Carnahan conference on security technology, Oct 2017, Madrid, Spain

    Google Scholar 

  15. Trewin S, Swart C, Koved L, Martino J, Singh K, Ben-David S (2012) Biometric authentication on a mobile device: a study of user effort, error and task disruption. In: 28th annual computer security applications conference

    Google Scholar 

  16. Nielsen J (1993) Usability engineering. Morgan Kaufmann Publishers Inc., San Francisco

    Book  Google Scholar 

  17. Nielsen J (2010) Website response times

    Google Scholar 

  18. Anjos A, Günther M, de Freitas Pereira T, Korshunov P, Mohammadi A, Marcel S (2017) Continuously reproducing toolchains in pattern recognition and machine learning experiments. In: International conference on machine learning (ICML)

    Google Scholar 

  19. Anjos A, Shafey LE, Wallace R, Günther M, McCool C, Marcel S (2012) Bob: a free signal processing and machine learning toolbox for researchers. In: 20th ACM conference on multimedia systems (ACMMM), Nara, Japan

    Google Scholar 

  20. Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724. https://doi.org/10.1109/TIP.2013.2292332

    Article  MathSciNet  MATH  Google Scholar 

  21. Jain AK, Klare B, Ross A (2015) Guidelines for best practices in biometrics research. In: International conference on biometrics, ICB 2015, Phuket, Thailand, 19–22 May 2015, pp 541–545

    Google Scholar 

Download references

Acknowledgements

We thank the colleagues of the Biometrics Team at Gradiant for their assistance in developing the reproducible toolkit.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Artur Costa-Pazo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Costa-Pazo, A., Vazquez-Fernandez, E., Alba-Castro, J.L., González-Jiménez, D. (2019). Challenges of Face Presentation Attack Detection in Real Scenarios. In: Marcel, S., Nixon, M., Fierrez, J., Evans, N. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-319-92627-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92627-8_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92626-1

  • Online ISBN: 978-3-319-92627-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics