Biometric Antispoofing Methods: A Survey in Face Recognition

In recent decades, we have witnessed the evolution of biometric technology from the first pioneering works in face and voice recognition to the current state of development wherein a wide spectrum of highly accurate systems may be found, ranging from largely deployed modalities, such as fingerprint, face, or iris, to more marginal ones, such as signature or hand. This path of technological evolution has naturally led to a critical issue that has only started to be addressed recently: the resistance of this rapidly emerging technology to external attacks and, in particular, to spoofing. Spoofing, referred to by the term presentation attack in current standards, is a purely biometric vulnerability that is not shared with other IT security solutions. It refers to the ability to fool a biometric system into recognizing an illegitimate user as a genuine one by means of presenting a synthetic forged version of the original biometric trait to the sensor. The entire biometric community, including researchers, developers, standardizing bodies, and vendors, has thrown itself into the challenging task of proposing and developing efficient protection methods against this threat. The goal of this paper is to provide a comprehensive overview on the work that has been carried out over the last decade in the emerging field of antispoofing, with special attention to the mature and largely deployed face modality. The work covers theories, methodologies, state-of-the-art techniques, and evaluation databases and also aims at providing an outlook into the future of this very active field of research.

[1]  Julian Fiérrez,et al.  An evaluation of indirect attacks and countermeasures in fingerprint verification systems , 2011, Pattern Recognit. Lett..

[2]  Enrique Argones-Rúa,et al.  Audio-visual speech asynchrony detection using co-inertia analysis and coupled hidden markov models , 2009, Pattern Analysis and Applications.

[3]  Bela Gipp,et al.  ePassport: The World's New Electronic Passport , 2007 .

[4]  Patrick J. Flynn,et al.  A survey of approaches and challenges in 3D and multi-modal 3D + 2D face recognition , 2006, Comput. Vis. Image Underst..

[5]  Jean-Luc Dugelay,et al.  Reflectance analysis based countermeasure technique to detect face mask attacks , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).

[6]  Lin Sun,et al.  TIR/VIS Correlation for Liveness Detection in Face Recognition , 2011, CAIP.

[7]  Arun Ross,et al.  Combining match scores with liveness values in a fingerprint verification system , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[8]  Stephanie Schuckers,et al.  Multimodal fusion vulnerability to non-zero effort (spoof) imposters , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[9]  Sébastien Marcel,et al.  Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[10]  Josef Bigün,et al.  Verifying liveness by multiple experts in face biometrics , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[11]  H. Hadow The National Physical Laboratory , 1913, Nature.

[12]  Sébastien Marcel,et al.  Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[13]  Anil K. Jain,et al.  Skilled Forgery Detection in On-Line Signatures: A Multimodal Approach , 2004, ICBA.

[14]  Jukka Komulainen,et al.  Face Spoofing Detection Using Dynamic Texture , 2012, ACCV Workshops.

[15]  Harold Cummins Counterfeit Finger-Prints , 1934 .

[16]  Patrick J. Flynn,et al.  A sparse representation approach to face matching across plastic surgery , 2012, 2012 IEEE Workshop on the Applications of Computer Vision (WACV).

[17]  Robert H. Deng,et al.  Understanding OSN-based facial disclosure against face authentication systems , 2014, AsiaCCS.

[18]  T. Tan,et al.  Learning Hierarchical Visual Codebook for Iris Liveness Detection , 2011 .

[19]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[20]  Zahid Akhtar Shabbeer Ahmad Momin Security of multimodal biometric systems against spoof attacks , 2012 .

[21]  Sébastien Marcel,et al.  Anti-spoofing in Action: Joint Operation with a Verification System , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[22]  Seongbeak Yoon,et al.  Masked fake face detection using radiance measurements. , 2009, Journal of the Optical Society of America. A, Optics, image science, and vision.

[23]  Bodade M. Rajesh,et al.  Fake Iris Detection: A Holistic Approach , 2011 .

[24]  Chong D. Lee Finger-Prints Can Be Forged , 1934 .

[25]  Farzin Deravi,et al.  Liveness Detection Using Gaze Collinearity , 2012, 2012 Third International Conference on Emerging Security Technologies.

[26]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[27]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[28]  Gian Luca Marcialis,et al.  LivDet 2013 Fingerprint Liveness Detection Competition 2013 , 2013, 2013 International Conference on Biometrics (ICB).

[29]  Yi Li,et al.  Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.

[30]  F. Roli,et al.  Security evaluation of biometric authentication systems under real spoofing attacks , 2012, IET Biom..

[31]  Sébastien Marcel,et al.  On the vulnerability of finger vein recognition to spoofing , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[32]  Sébastien Marcel,et al.  Spoofing 2D face recognition systems with 3D masks , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).

[33]  Sudeep Sarkar,et al.  From Scores to Face Templates: A Model-Based Approach , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[34]  Bin Qin,et al.  The Anti-spoofing Study of Vein Identification System , 2009, 2009 International Conference on Computational Intelligence and Security.

[35]  Shengcai Liao,et al.  Face liveness detection with component dependent descriptor , 2013, 2013 International Conference on Biometrics (ICB).

[36]  Michael David Kelly,et al.  Visual identification of people by computer , 1970 .

[37]  Robert K. Rowe,et al.  Spoof Detection Schemes , 2008 .

[38]  Sébastien Marcel,et al.  Can face anti-spoofing countermeasures work in a real world scenario? , 2013, 2013 International Conference on Biometrics (ICB).

[39]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[40]  Tieniu Tan,et al.  Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.

[41]  K. Davis,et al.  Automatic Recognition of Spoken Digits , 1952 .

[42]  Jukka Komulainen,et al.  The 2nd competition on counter measures to 2D face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).

[43]  Christoph Busch,et al.  Presentation attack detection methods for fingerprint recognition systems: a survey , 2014, IET Biom..

[44]  Johan Blommé Evaluation of biometric security systems against artificial fingers , 2003 .

[45]  Gian Luca Marcialis,et al.  Evaluation of serial and parallel multibiometric systems under spoofing attacks , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[46]  Nguyen Minh Duc Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba , 2009 .

[47]  Stan Z. Li,et al.  Face liveness detection by learning multispectral reflectance distributions , 2011, Face and Gesture 2011.

[48]  Michele Nappi,et al.  Moving face spoofing detection via 3D projective invariants , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[49]  Asad Ali,et al.  Biometric liveness detection using gaze information , 2015 .

[50]  J. Herrero Vulnerabilities and attack protection in security systems based on biometric recognition , 2009 .

[51]  I. Pavlidis,et al.  The imaging issue in an automatic face/disguise detection system , 2000, Proceedings IEEE Workshop on Computer Vision Beyond the Visible Spectrum: Methods and Applications (Cat. No.PR00640).

[52]  David J. Kriegman,et al.  From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[53]  丁晓青,et al.  Face Live Detection Method Based on Physiological Motion Analysis , 2009 .

[54]  Matti Pietikäinen,et al.  Complementary countermeasures for detecting scenic face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).

[55]  Danilo Gligoroski,et al.  Walk the Walk: Attacking Gait Biometrics by Imitation , 2010, ISC.

[56]  P Margot,et al.  Fingerprint forgery--a survey. , 2001, Journal of forensic sciences.

[57]  Matti Pietikäinen,et al.  Context based face anti-spoofing , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[58]  Arun Ross,et al.  Generating Synthetic Irises by Feature Agglomeration , 2006, 2006 International Conference on Image Processing.

[59]  Sébastien Marcel,et al.  Motion-based counter-measures to photo attacks in face recognition , 2014, IET Biom..

[60]  Alessandra Lumini,et al.  An evaluation of direct attacks using fake fingers generated from ISO templates , 2010, Pattern Recognit. Lett..

[61]  Richa Singh,et al.  Disguise detection and face recognition in visible and thermal spectrums , 2013, 2013 International Conference on Biometrics (ICB).

[62]  Josef Bigün,et al.  Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..

[63]  Tieniu Tan,et al.  A study of multibiometric traits of identical twins , 2010, Defense + Commercial Sensing.

[64]  Kang Ryoung Park,et al.  Face liveness detection based on texture and frequency analyses , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[65]  Jean-Luc Dugelay,et al.  Countermeasure for the protection of face recognition systems against mask attacks , 2013, 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG).

[66]  Jana Dittmann,et al.  Printed fingerprints at crime scenes: a faster detection of malicious traces using scans of confocal microscopes , 2013, Electronic Imaging.

[67]  Jang-Hee Yoo,et al.  Liveness Detection for Embedded Face Recognition System , 2008 .

[68]  Réjean Plamondon,et al.  Synthetic on-line signature generation. Part I: Methodology and algorithms , 2012, Pattern Recognit..

[69]  Gian Luca Marcialis,et al.  Fingerprint silicon Replicas: Static and Dynamic Features for Vitality Detection Using an Optical Capture Device , 2008, Int. J. Image Graph..

[70]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[71]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[72]  Venu Govindaraju,et al.  Evaluation of biometric spoofing in a multimodal system , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[73]  Michael Wagner,et al.  "liveness" Verification in Audio-video Authentication , 2004, INTERSPEECH.

[74]  Pradeep Buddharaju,et al.  Physiology-Based Face Recognition in the Thermal Infrared Spectrum , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[75]  Hong Li,et al.  A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[76]  Michael Wagner,et al.  Liveness detection using cross-modal correlations in face-voice person authentication , 2005, INTERSPEECH.

[77]  Jean-Luc Dugelay,et al.  On the vulnerability of face recognition systems to spoofing mask attacks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[78]  N. Kose,et al.  Classification of captured and recaptured images to detect photograph spoofing , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).

[79]  Rolf Ingold,et al.  A New Forgery Scenario Based on Regaining Dynamics of Signature , 2007, ICB.

[80]  Anderson Rocha,et al.  Face spoofing detection through partial least squares and low-level descriptors , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[81]  Himanshu S. Bhatt,et al.  Plastic Surgery: A New Dimension to Face Recognition , 2010, IEEE Transactions on Information Forensics and Security.

[82]  Sangyoun Lee,et al.  Face liveness detection using variable focusing , 2013, 2013 International Conference on Biometrics (ICB).

[83]  Tieniu Tan,et al.  Contact Lens Detection Based on Weighted LBP , 2010, 2010 20th International Conference on Pattern Recognition.

[84]  Ioannis A. Kakadiaris,et al.  Twins 3D face recognition challenge , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[85]  Sébastien Marcel,et al.  Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.

[86]  Samarth Bharadwaj,et al.  Computationally Efficient Face Spoofing Detection with Motion Magnification , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[87]  George W. Quinn,et al.  Distinguishing identical twins by face recognition , 2011, Face and Gesture 2011.

[88]  Himanshu S. Bhatt,et al.  Recognizing Surgically Altered Face Images Using Multiobjective Evolutionary Algorithm , 2013, IEEE Transactions on Information Forensics and Security.

[89]  Stan Z. Li,et al.  Handbook of Biometric Anti-Spoofing , 2014, Advances in Computer Vision and Pattern Recognition.

[90]  Jang-Hee Yoo,et al.  A motion and similarity-based fake detection method for biometric face recognition systems , 2011, IEEE Transactions on Consumer Electronics.

[91]  Junjie Yan,et al.  Face liveness detection by exploring multiple scenic clues , 2012, 2012 12th International Conference on Control Automation Robotics & Vision (ICARCV).

[92]  Francine J. Prokoski,et al.  Infrared Identification of Faces and Body Parts , 1996 .

[93]  Yun Q. Shi,et al.  Is physics-based liveness detection truly possible with a single image? , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[94]  박규태,et al.  Liveness detection method and apparatus in video image , 2007 .

[95]  Julian Fierrez Adapted fusion schemes for multimodal biometric authentication (Esquemas adaptados de fusión para autenticación biométrica multimodal) , 2006 .

[96]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[97]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[98]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[99]  Bruce Schneier,et al.  Secrets and Lies: Digital Security in a Networked World , 2000 .

[100]  Matti Pietikäinen,et al.  Face spoofing detection from single images using texture and local shape analysis , 2012, IET Biom..

[101]  Andreas Uhl,et al.  Attacking Iris Recognition: An Efficient Hill-Climbing Technique , 2010, 2010 20th International Conference on Pattern Recognition.

[102]  Jean-Luc Dugelay,et al.  Shape and Texture Based Countermeasure to Protect Face Recognition Systems against Mask Attacks , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[103]  R. Sanchez-Reillo,et al.  Evaluation methodology for fake samples detection in biometrics , 2008, 2008 42nd Annual IEEE International Carnahan Conference on Security Technology.

[104]  Tieniu Tan,et al.  Counterfeit iris detection based on texture analysis , 2008, 2008 19th International Conference on Pattern Recognition.

[105]  Javier Ruiz-del-Solar,et al.  A comparative study of thermal face recognition methods in unconstrained environments , 2012, Pattern Recognit..

[106]  Junjie Yan,et al.  A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[107]  Arun Ross,et al.  Can facial cosmetics affect the matching accuracy of face recognition systems? , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[108]  Farzin Deravi,et al.  A review of speech-based bimodal recognition , 2002, IEEE Trans. Multim..

[109]  Norman Poh,et al.  Biometric system design under zero and non-zero effort attacks , 2013, 2013 International Conference on Biometrics (ICB).

[110]  Arun Ross,et al.  A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems , 2014 .

[111]  Lin Sun,et al.  Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[112]  Jana Dittmann,et al.  High-resolution printed amino acid traces: a first-feature extraction approach for fingerprint forgery detection , 2012, Other Conferences.

[113]  Sébastien Marcel,et al.  On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..

[114]  Stephanie Schuckers,et al.  Increase the Security of Multibiometric Systems by Incorporating a Spoofing Detection Algorithm in the Fusion Mechanism , 2011, MCS.

[115]  Pietro Coli,et al.  Vitality detection in personal authentication systems using fingerprints , 2008 .

[116]  Fabio Roli,et al.  Fusion of multiple clues for photo-attack detection in face recognition systems , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[117]  V. Bhagavatula Real-Time Face Detection and Motion Analysis With Application in "Liveness" Assessment , 2007 .

[118]  Jana Dittmann,et al.  Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics , 2011, Electronic Imaging.

[119]  Gian Luca Marcialis,et al.  LivDet 2011 — Fingerprint liveness detection competition 2011 , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[120]  Amani Al-Ajlan Survey on fingerprint liveness detection , 2013, 2013 International Workshop on Biometrics and Forensics (IWBF).

[121]  Massimo Tistarelli,et al.  Structural Similarity based image quality map for face recognition across plastic surgery , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[122]  Mohammed Rizwan,et al.  Multimodal Biometric Fusion: Performance under Spoof Attacks , 2011, J. Intell. Syst..

[123]  Jiang-Wei Li,et al.  Eye blink detection based on multiple Gabor response waves , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[124]  Sébastien Marcel,et al.  Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition , 2014, IEEE Transactions on Image Processing.

[125]  Trevor Hastie,et al.  The Elements of Statistical Learning , 2001 .

[126]  Zhaohui Wu,et al.  Liveness Detection for Face Recognition , 2008 .

[127]  Marie Sandström Liveness Detection in Fingerprint Recognition Systems , 2004 .

[128]  Sébastien Marcel,et al.  LBP - TOP Based Countermeasure against Face Spoofing Attacks , 2012, ACCV Workshops.

[129]  Anderson Rocha,et al.  Video-Based Face Spoofing Detection through Visual Rhythm Analysis , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.

[130]  Kevin W. Bowyer,et al.  LivDet-iris 2013 - Iris Liveness Detection Competition 2013 , 2014, IEEE International Joint Conference on Biometrics.

[131]  Robert M. Jarvis,et al.  The Adventure of the Norwood Builder: A Lawyerly Annotated Edition , 2015 .

[132]  Matti Pietikäinen,et al.  Competition on counter measures to 2-D facial spoofing attacks , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[133]  Lin Sun,et al.  Monocular camera-based face liveness detection by combining eyeblink and scene context , 2011, Telecommun. Syst..

[134]  Julian Fiérrez,et al.  Evaluation of direct attacks to fingerprint verification systems , 2011, Telecommun. Syst..

[135]  Anil K. Jain,et al.  Analysis of facial features in identical twins , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[136]  Emanuela Marasco Secure Multibiometric Systems , 2010 .

[137]  Sanjay N. Talbar,et al.  Dynamic iris localisation: a novel approach suitable for fake iris detection , 2009 .

[138]  Shengcai Liao,et al.  Face liveness detection using 3D structure recovered from a single camera , 2013, 2013 International Conference on Biometrics (ICB).

[139]  Nicholas W. D. Evans,et al.  On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[140]  Gian Luca Foresti,et al.  MoBio_LivDet: Mobile biometric liveness detection , 2014, 2014 11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).

[141]  Michael Wagner,et al.  UCBN: A New Audio-Visual Broadcast News Corpus for Multimodal Speaker Verification Studies , 2006 .

[142]  Josef Bigün,et al.  Evaluating liveness by face images and the structure tensor , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[143]  Gian Luca Marcialis,et al.  First International Fingerprint Liveness Detection Competition - LivDet 2009 , 2009, ICIAP.

[144]  Conrad Sanderson,et al.  The VidTIMIT Database , 2002 .

[145]  Mita Nasipuri,et al.  Automated thermal face recognition based on minutiae extraction , 2013, Int. J. Comput. Intell. Stud..

[146]  Julian Fiérrez,et al.  Direct Attacks Using Fake Images in Iris Verification , 2008, BIOID.

[147]  Anderson Rocha,et al.  Face liveness detection under bad illumination conditions , 2011, 2011 18th IEEE International Conference on Image Processing.

[148]  Matti Pietikäinen,et al.  Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[149]  J. Bigun,et al.  Assuring liveness in biometric identity authentication by real-time face tracking , 2004, Proceedings of the 2004 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2004. CIHSPS 2004..

[150]  J. L. Wayman,et al.  Best practices in testing and reporting performance of biometric devices. , 2002 .