Skip to main content

2019 | OriginalPaper | Buchkapitel

9. Introduction to Face Presentation Attack Detection

verfasst von : Javier Hernandez-Ortega, Julian Fierrez, Aythami Morales, Javier Galbally

Erschienen in: Handbook of Biometric Anti-Spoofing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The main scope of this chapter is to serve as a brief introduction to face presentation attack detection. The next pages present the different presentation attacks that a face recognition system can confront, in which an attacker presents to the sensor, mainly a camera, an artifact (generally a photograph, a video, or a mask) to try to impersonate a genuine user. First, we make an introduction of the current status of face recognition, its level of deployment, and the challenges it faces. In addition, we present the vulnerabilities and the possible attacks that a biometric system may be exposed to, showing that way the high importance of presentation attack detection methods. We review different types of presentation attack methods, from simpler to more complex ones, and in which cases they could be effective. Later, we summarize the most popular presentation attack detection methods to deal with these attacks. Finally, we introduce public datasets used by the research community for exploring the vulnerabilities of face biometrics and developing effective countermeasures against known spoofs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: Computer society conference on computer vision and pattern recognition (CVPR), pp 586–591 Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: Computer society conference on computer vision and pattern recognition (CVPR), pp 586–591
2.
Zurück zum Zitat Biometrics: Market Shares, Strategies, and Forecasts, Worldwide, 2015–2021 (2015). Wintergreen Research, Inc Biometrics: Market Shares, Strategies, and Forecasts, Worldwide, 2015–2021 (2015). Wintergreen Research, Inc
3.
Zurück zum Zitat Gipp B, Beel J, Rössling I (2007) ePassport: The Worlds New Electronic Passport. Risks and its Security. CreateSpace, A Report about the ePassports Benefits Gipp B, Beel J, Rössling I (2007) ePassport: The Worlds New Electronic Passport. Risks and its Security. CreateSpace, A Report about the ePassports Benefits
4.
Zurück zum Zitat Garcia C (2004) Utilización de la firma electrónica en la Administración española iv: Identidad y firma digital. El DNI electrónico, Administración electrónica y procedimiento administrativo Garcia C (2004) Utilización de la firma electrónica en la Administración española iv: Identidad y firma digital. El DNI electrónico, Administración electrónica y procedimiento administrativo
5.
Zurück zum Zitat Jain AK, Li SZ (2011) Handbook of face recognition. Springer, Berlin Jain AK, Li SZ (2011) Handbook of face recognition. Springer, Berlin
6.
Zurück zum Zitat Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process Mag 32(5):20–30CrossRef Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process Mag 32(5):20–30CrossRef
7.
Zurück zum Zitat Galbally J, Marcel S, Fierrez J (2014) Biometric antispoofing methods: a survey in face recognition. IEEE Access 2:1530–1552CrossRef Galbally J, Marcel S, Fierrez J (2014) Biometric antispoofing methods: a survey in face recognition. IEEE Access 2:1530–1552CrossRef
8.
Zurück zum Zitat Gomez-Barrero M, Galbally J, Fierrez J, Ortega-Garcia J (2013) Multimodal biometric fusion: a study on vulnerabilities to indirect attacks. In: Iberoamerican congress on pattern recognition, Springer, Berlin, pp 358–365CrossRef Gomez-Barrero M, Galbally J, Fierrez J, Ortega-Garcia J (2013) Multimodal biometric fusion: a study on vulnerabilities to indirect attacks. In: Iberoamerican congress on pattern recognition, Springer, Berlin, pp 358–365CrossRef
10.
Zurück zum Zitat Goodin D (2008) Get your german interior ministers fingerprint here. Register 30 Goodin D (2008) Get your german interior ministers fingerprint here. Register 30
11.
Zurück zum Zitat Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. Comput Vis–ECCV 504–517 Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. Comput Vis–ECCV 504–517
12.
Zurück zum Zitat Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: IEEE BIOSIG Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: IEEE BIOSIG
13.
Zurück zum Zitat Erdogmus N, Marcel S (2014) Spoofing face recognition with 3D masks. IEEE Trans Inf Forensics Secur 9(7):1084–1097CrossRef Erdogmus N, Marcel S (2014) Spoofing face recognition with 3D masks. IEEE Trans Inf Forensics Secur 9(7):1084–1097CrossRef
14.
Zurück zum Zitat Gonzalez-Sosa E, Vera-Rodriguez R, Fierrez J, Patel V (2018) Person recognition beyond the visible spectrum: combining body shape and texture from mmW images. In: International conference on biometrics (ICB) Gonzalez-Sosa E, Vera-Rodriguez R, Fierrez J, Patel V (2018) Person recognition beyond the visible spectrum: combining body shape and texture from mmW images. In: International conference on biometrics (ICB)
15.
Zurück zum Zitat Proceedings of the IEEE international conference acoust. speech signal process. (ICASSP) (2017) Proceedings of the IEEE international conference acoust. speech signal process. (ICASSP) (2017)
16.
Zurück zum Zitat Proceedings of the IEEE/IAPR international joint conference biometrics (IJCB) (2017) Proceedings of the IEEE/IAPR international joint conference biometrics (IJCB) (2017)
17.
Zurück zum Zitat Chingovska I, Yang J, Lei Z, Yi D, Li SZ, Kahm O, Glaser C, Damer N, Kuijper A, Nouak A et al (2013) The 2nd competition on counter measures to 2D face spoofing attacks. In: International conference on biometrics (ICB) Chingovska I, Yang J, Lei Z, Yi D, Li SZ, Kahm O, Glaser C, Damer N, Kuijper A, Nouak A et al (2013) The 2nd competition on counter measures to 2D face spoofing attacks. In: International conference on biometrics (ICB)
18.
Zurück zum Zitat Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: International conference on biometrics (ICB), pp 26–31 Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: International conference on biometrics (ICB), pp 26–31
21.
Zurück zum Zitat Kim J, Choi H, Lee W (2011) Spoof detection method for touchless fingerprint acquisition apparatus. Korea Patent 1(054):314 Kim J, Choi H, Lee W (2011) Spoof detection method for touchless fingerprint acquisition apparatus. Korea Patent 1(054):314
22.
Zurück zum Zitat Dantcheva A, Chen C, Ross A (2012) Can facial cosmetics affect the matching accuracy of face recognition systems? In: 2012 IEEE Fifth international conference on biometrics: theory, applications and systems (BTAS), IEEE, pp 391–398 Dantcheva A, Chen C, Ross A (2012) Can facial cosmetics affect the matching accuracy of face recognition systems? In: 2012 IEEE Fifth international conference on biometrics: theory, applications and systems (BTAS), IEEE, pp 391–398
23.
Zurück zum Zitat Anjos A, Chakka MM, Marcel S (2013) Motion-based counter-measures to photo attacks in face recognition. IET Biom 3(3):147–158CrossRef Anjos A, Chakka MM, Marcel S (2013) Motion-based counter-measures to photo attacks in face recognition. IET Biom 3(3):147–158CrossRef
24.
Zurück zum Zitat Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: International joint conference on biometrics (IJCB), pp 1–7 Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: International joint conference on biometrics (IJCB), pp 1–7
25.
Zurück zum Zitat Nguyen D, Bui Q (2009) Your face is NOT your password. BlackHat DC Nguyen D, Bui Q (2009) Your face is NOT your password. BlackHat DC
26.
Zurück zum Zitat da Silva Pinto A, Pedrini H, Schwartz W, Rocha A (2012) Video-based face spoofing detection through visual rhythm analysis. In: SIBGRAPI conference on graphics, patterns and images, pp 221–228 da Silva Pinto A, Pedrini H, Schwartz W, Rocha A (2012) Video-based face spoofing detection through visual rhythm analysis. In: SIBGRAPI conference on graphics, patterns and images, pp 221–228
27.
Zurück zum Zitat Kim Y, Yoo JH, Choi K (2011) A motion and similarity-based fake detection method for biometric face recognition systems. IEEE Trans Consum Electron 57(2):756–762CrossRef Kim Y, Yoo JH, Choi K (2011) A motion and similarity-based fake detection method for biometric face recognition systems. IEEE Trans Consum Electron 57(2):756–762CrossRef
28.
Zurück zum Zitat Liu S, Yang B, Yuen PC, Zhao G (2016) A 3D Mask Face Anti-spoofing Database with Real World Variations. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 100–106 Liu S, Yang B, Yuen PC, Zhao G (2016) A 3D Mask Face Anti-spoofing Database with Real World Variations. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 100–106
29.
Zurück zum Zitat Galbally J, Satta R (2016) Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models. IET Biom 5(2):83–91CrossRef Galbally J, Satta R (2016) Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models. IET Biom 5(2):83–91CrossRef
31.
Zurück zum Zitat Kose N, Dugelay JL (2013) On the vulnerability of face recognition systems to spoofing mask attacks. In: (ICASSP) International conference on acoustics, speech and signal processing, IEEE, pp 2357–2361 Kose N, Dugelay JL (2013) On the vulnerability of face recognition systems to spoofing mask attacks. In: (ICASSP) International conference on acoustics, speech and signal processing, IEEE, pp 2357–2361
32.
Zurück zum Zitat Lagorio A, Tistarelli M, Cadoni M, Fookes C, Sridharan S (2013) Liveness detection based on 3D face shape analysis. In: International workshop on biometrics and forensics (IWBF), IEEE Lagorio A, Tistarelli M, Cadoni M, Fookes C, Sridharan S (2013) Liveness detection based on 3D face shape analysis. In: International workshop on biometrics and forensics (IWBF), IEEE
33.
Zurück zum Zitat Sun L, Huang W, Wu M (2011) TIR/VIS correlation for liveness detection in face recognition. In: International conference on computer analysis of images and patterns, Springer, Berlin, pp 114–121CrossRef Sun L, Huang W, Wu M (2011) TIR/VIS correlation for liveness detection in face recognition. In: International conference on computer analysis of images and patterns, Springer, Berlin, pp 114–121CrossRef
34.
Zurück zum Zitat Kim Y, Na J, Yoon S, Yi J (2009) Masked fake face detection using radiance measurements. JOSA A 26(4):760–766CrossRef Kim Y, Na J, Yoon S, Yi J (2009) Masked fake face detection using radiance measurements. JOSA A 26(4):760–766CrossRef
35.
Zurück zum Zitat Yang J, Lei Z, Liao S, Li SZ (2013) Face liveness detection with component dependent descriptor. In: International conference on biometrics (ICB), pp 1–6 Yang J, Lei Z, Liao S, Li SZ (2013) Face liveness detection with component dependent descriptor. In: International conference on biometrics (ICB), pp 1–6
36.
Zurück zum Zitat Bharadwaj S, Dhamecha TI, Vatsa M, Singh R (2013) Computationally efficient face spoofing detection with motion magnification. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 105–110 Bharadwaj S, Dhamecha TI, Vatsa M, Singh R (2013) Computationally efficient face spoofing detection with motion magnification. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 105–110
37.
Zurück zum Zitat Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724MathSciNetCrossRef Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724MathSciNetCrossRef
38.
Zurück zum Zitat Smith DF, Wiliem A, Lovell BC (2015) Face recognition on consumer devices: reflections on replay attacks. IEEE Trans Inf Forensics Secur 10(4):736–745CrossRef Smith DF, Wiliem A, Lovell BC (2015) Face recognition on consumer devices: reflections on replay attacks. IEEE Trans Inf Forensics Secur 10(4):736–745CrossRef
39.
Zurück zum Zitat Li X, Komulainen J, Zhao G, Yuen PC, Pietikäinen M (2016) Generalized face anti-spoofing by detecting pulse from face videos. In: 23rd international conference on pattern recognition (ICPR), IEEE, pp 4244–4249 Li X, Komulainen J, Zhao G, Yuen PC, Pietikäinen M (2016) Generalized face anti-spoofing by detecting pulse from face videos. In: 23rd international conference on pattern recognition (ICPR), IEEE, pp 4244–4249
40.
Zurück zum Zitat Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: IEEE International conference on automatic face gesture recognition, pp 612–618 Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: IEEE International conference on automatic face gesture recognition, pp 612–618
41.
Zurück zum Zitat Hernandez-Ortega J, Fierrez J, Morales A, Tome P (2018) Time analysis of pulse-based face anti-spoofing in visible and NIR. In: IEEE CVPR computer society workshop on biometrics Hernandez-Ortega J, Fierrez J, Morales A, Tome P (2018) Time analysis of pulse-based face anti-spoofing in visible and NIR. In: IEEE CVPR computer society workshop on biometrics
42.
Zurück zum Zitat Zhang D, Ding D, Li J, Liu Q (2015) PCA based extracting feature using fast fourier transform for facial expression recognition. In: Transactions on engineering technologies, pp 413–424 Zhang D, Ding D, Li J, Liu Q (2015) PCA based extracting feature using fast fourier transform for facial expression recognition. In: Transactions on engineering technologies, pp 413–424
43.
Zurück zum Zitat Gonzalez-Sosa E, Vera-Rodriguez R, Fierrez J, Patel V (2017) Exploring body shape from mmW images for person recognition. IEEE Trans Inf Forensics Secur 12(9):2078–2089CrossRef Gonzalez-Sosa E, Vera-Rodriguez R, Fierrez J, Patel V (2017) Exploring body shape from mmW images for person recognition. IEEE Trans Inf Forensics Secur 12(9):2078–2089CrossRef
44.
Zurück zum Zitat Pan G, Wu Z, Sun L (2008) Liveness detection for face recognition. In: Recent advances in face recognition. InTech Pan G, Wu Z, Sun L (2008) Liveness detection for face recognition. In: Recent advances in face recognition. InTech
45.
Zurück zum Zitat Wu HY, Rubinstein M, Shih E, Guttag J, Durand F, Freeman W (2012) Eulerian video magnification for revealing subtle changes in the world. ACM Trans Graph 31(4)CrossRef Wu HY, Rubinstein M, Shih E, Guttag J, Durand F, Freeman W (2012) Eulerian video magnification for revealing subtle changes in the world. ACM Trans Graph 31(4)CrossRef
46.
Zurück zum Zitat Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche S, Ouafi A, Dornaika F, Taleb-Ahmed A, Qin L, et al (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: International joint conference on biometrics (IJCB), pp 688–696 Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche S, Ouafi A, Dornaika F, Taleb-Ahmed A, Qin L, et al (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: International joint conference on biometrics (IJCB), pp 688–696
47.
Zurück zum Zitat Chakka MM, Anjos A, Marcel S, Tronci R, Muntoni D, Fadda G, Pili M, Sirena N, Murgia G, Ristori M, Roli F, Yan J, Yi D, Lei Z, Zhang Z, Li SZ, Schwartz WR, Rocha A, Pedrini H, Lorenzo-Navarro J, Castrilln-Santana M, Määttä J, Hadid A, Pietikäinen M (2011) Competition on counter measures to 2-D facial spoofing attacks. In: International joint conference on biometrics (IJCB) Chakka MM, Anjos A, Marcel S, Tronci R, Muntoni D, Fadda G, Pili M, Sirena N, Murgia G, Ristori M, Roli F, Yan J, Yi D, Lei Z, Zhang Z, Li SZ, Schwartz WR, Rocha A, Pedrini H, Lorenzo-Navarro J, Castrilln-Santana M, Määttä J, Hadid A, Pietikäinen M (2011) Competition on counter measures to 2-D facial spoofing attacks. In: International joint conference on biometrics (IJCB)
48.
Zurück zum Zitat Ortega-Garcia J, Fierrez J, Alonso-Fernandez F, Galbally J, Freire MR, Gonzalez-Rodriguez J, Garcia-Mateo C, Alba-Castro JL, Gonzalez-Agulla E, Otero-Muras E (2010) The multiscenario multienvironment biosecure multimodal database (BMDB). IEEE Trans Pattern Anal Mach Intell 32(6):1097–1111CrossRef Ortega-Garcia J, Fierrez J, Alonso-Fernandez F, Galbally J, Freire MR, Gonzalez-Rodriguez J, Garcia-Mateo C, Alba-Castro JL, Gonzalez-Agulla E, Otero-Muras E (2010) The multiscenario multienvironment biosecure multimodal database (BMDB). IEEE Trans Pattern Anal Mach Intell 32(6):1097–1111CrossRef
49.
Zurück zum Zitat Peixoto B, Michelassi C, Rocha A (2011) Face liveness detection under bad illumination conditions. In: International conference on image processing (ICIP), pp 3557–3560 Peixoto B, Michelassi C, Rocha A (2011) Face liveness detection under bad illumination conditions. In: International conference on image processing (ICIP), pp 3557–3560
50.
Zurück zum Zitat Chingovska I, Anjos A, Marcel S (2013) Anti-spoofing in action: joint operation with a verification system. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 98–104 Chingovska I, Anjos A, Marcel S (2013) Anti-spoofing in action: joint operation with a verification system. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 98–104
51.
Zurück zum Zitat de Freitas Pereira T, Anjos A, De Martino JM, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: International conference on biometrics (ICB), pp 1–8 de Freitas Pereira T, Anjos A, De Martino JM, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: International conference on biometrics (ICB), pp 1–8
52.
Zurück zum Zitat Fierrez J, Morales A, Vera-Rodriguez R, Camacho D (2018) Multiple classifiers in biometrics. Part 1: Fundamentals and review. Inf Fusion 44:57–64CrossRef Fierrez J, Morales A, Vera-Rodriguez R, Camacho D (2018) Multiple classifiers in biometrics. Part 1: Fundamentals and review. Inf Fusion 44:57–64CrossRef
53.
Zurück zum Zitat Ross AA, Nandakumar K, Jain AK (2006) Handbook of multibiometrics, Springer Ross AA, Nandakumar K, Jain AK (2006) Handbook of multibiometrics, Springer
Metadaten
Titel
Introduction to Face Presentation Attack Detection
verfasst von
Javier Hernandez-Ortega
Julian Fierrez
Aythami Morales
Javier Galbally
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-92627-8_9

Neuer Inhalt