Biometric Antispoofing Methods: A Survey in Face Recognition

被引:256
作者
Galbally, Javier [1 ]
Marcel, Sebastien [2 ]
Fierrez, Julian [3 ]
机构
[1] Commiss European Communities, Joint Res Ctr, Inst Protect & Secur Citizen, I-21027 Ispra, Italy
[2] IDIAP Res Inst, Ctr Parc, CH-1920 Martigny, Switzerland
[3] Univ Autonoma Madrid, Escuela Politecn Super, Biometr Recognit Grp, E-28049 Madrid, Spain
关键词
Biometrics; security; anti-spoofing; face; LIVENESS DETECTION; FINGERPRINT; ATTACKS; IMAGES; SYSTEMS; IRIS; 3D;
D O I
10.1109/ACCESS.2014.2381273
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering works in face and voice recognition to the current state of development wherein a wide spectrum of highly accurate systems may be found, ranging from largely deployed modalities, such as fingerprint, face, or iris, to more marginal ones, such as signature or hand. This path of technological evolution has naturally led to a critical issue that has only started to be addressed recently: the resistance of this rapidly emerging technology to external attacks and, in particular, to spoofing. Spoofing, referred to by the term presentation attack in current standards, is a purely biometric vulnerability that is not shared with other IT security solutions. It refers to the ability to fool a biometric system into recognizing an illegitimate user as a genuine one by means of presenting a synthetic forged version of the original biometric trait to the sensor. The entire biometric community, including researchers, developers, standardizing bodies, and vendors, has thrown itself into the challenging task of proposing and developing efficient protection methods against this threat. The goal of this paper is to provide a comprehensive overview on the work that has been carried out over the last decade in the emerging field of antispoofing, with special attention to the mature and largely deployed face modality. The work covers theories, methodologies, state-of-the-art techniques, and evaluation databases and also aims at providing an outlook into the future of this very active field of research.
引用
收藏
页码:1530 / 1552
页数:23
相关论文
共 188 条
[1]  
Aggarwal G., 2012, 2012 IEEE Workshop on Applications of Computer Vision (WACV), P113, DOI 10.1109/WACV.2012.6163008
[2]  
Akhtar Z., 2012, 2012 IEEE Fifth International Conference On Biometrics: Theory, Applications And Systems (BTAS 2012), P283, DOI 10.1109/BTAS.2012.6374590
[3]  
Akhtar Z., 2012, THESIS U CAGLIARI CA
[4]   Multimodal Biometric Fusion: Performance under Spoof Attacks [J].
Akhtar, Zahid ;
Rizwan, Mohammed ;
Kale, Sandeep .
JOURNAL OF INTELLIGENT SYSTEMS, 2011, 20 (04) :353-372
[5]  
Akhtar Z, 2014, 2014 11TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE (AVSS), P187, DOI 10.1109/AVSS.2014.6918666
[6]  
Alegre F, 2012, EUR SIGNAL PR CONF, P36
[7]   Liveness Detection using Gaze Collinearity [J].
Ali, Asad ;
Deravi, Farzin ;
Hoque, Sanaul .
2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2012, :62-65
[8]  
Anjos A., 2011, P INT JOINT C BIOM I, P1, DOI [10.1109/IJCB.2011.6117503., DOI 10.1109/IJCB.2011.6117503]
[9]   Motion-based counter-measures to photo attacks in face recognition [J].
Anjos, Andre ;
Chakka, Murali Mohan ;
Marcel, Sebastien .
IET BIOMETRICS, 2014, 3 (03) :147-158
[10]  
[Anonymous], 2011, P INT JOINT C BIOM I