Face recognition under spoofing attacks: countermeasures and research directions

被引:41
作者
Li, Lei [1 ]
Correia, Paulo Lobato [2 ]
Hadid, Abdenour [1 ,3 ]
机构
[1] Northwestern Polytech Univ, Sch Elect & Informat, Xian, Shaanxi, Peoples R China
[2] Univ Lisbon, Inst Telecomunicacoes, Inst Super Tecn, Lisbon, Portugal
[3] Univ Oulu, Ctr Machine Vis & Signal Proc CMVS, Oulu, Finland
基金
芬兰科学院;
关键词
LIVENESS DETECTION; IMAGE QUALITY; TEXTURE; FINGERPRINT;
D O I
10.1049/iet-bmt.2017.0089
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Among tangible threats facing current biometric systems are spoofing attacks. A spoofing attack occurs when a person tries to masquerade as someone else by falsifying data and thereby attempting to gain illegitimate access and advantages. Recently, an increasing attention has been given to this research problem, as can be attested by the growing number of articles and the various competitions that appear in major biometric forums. This study presents a comprehensive overview of the recent advances in face anti-spoofing state-of-the-art, discussing existing methodologies, available benchmarking databases, reported results and, more importantly, the open issues and future research directions. As a case study for illustration, a face anti-spoofing method is described, which employs a colour local binary pattern descriptor to jointly analyse colour and texture available from the luminance and chrominance channels. Two publicly available databases are used for the analysis, and the importance of inter-database evaluation to attest the generalisation capabilities of an anti-spoofing method is discussed.
引用
收藏
页码:3 / 14
页数:12
相关论文
共 86 条
  • [71] The imaging issue in an automatic face/disguise detection system
    Pavlidis, I
    Symosek, P
    [J]. IEEE WORKSHOP ON COMPUTER VISION BEYOND THE VISIBLE SPECTRUM: METHODS AND APPLICATIONS, PROCEEDINGS, 2000, : 15 - 24
  • [72] Presentation Attack Detection for Face Recognition Using Light Field Camera
    Raghavendra, R.
    Raja, Kiran B.
    Busch, Christoph
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (03) : 1060 - 1075
  • [73] Ratha NK, 2001, LECT NOTES COMPUT SC, V2091, P223
  • [74] Enhancing security and privacy in biometrics-based authentication systems
    Ratha, NK
    Connell, JH
    Bolle, RM
    [J]. IBM SYSTEMS JOURNAL, 2001, 40 (03) : 614 - 634
  • [75] Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials
    Rattani, Ajita
    Scheirer, Walter J.
    Ross, Arun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (11) : 2447 - 2460
  • [76] PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses
    Rudd, Ethan M.
    Gunther, Manuel
    Boult, Terrance E.
    [J]. PROCEEDINGS OF 29TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, (CVPRW 2016), 2016, : 171 - 178
  • [77] Toward Open Set Recognition
    Scheirer, Walter J.
    Rocha, Anderson de Rezende
    Sapkota, Archana
    Boult, Terrance E.
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 35 (07) : 1757 - 1772
  • [78] Sequeira AF, 2016, 2016 39TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), P660, DOI 10.1109/TSP.2016.7760965
  • [79] Face Recognition on Consumer Devices: Reflections on Replay Attacks
    Smith, Daniel F.
    Wiliem, Arnold
    Lovell, Brian C.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (04) : 736 - 745
  • [80] Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model
    Tan, Xiaoyang
    Li, Yi
    Liu, Jun
    Jiang, Lin
    [J]. COMPUTER VISION - ECCV 2010, PT VI, 2010, 6316 : 504 - 517