Face recognition under spoofing attacks: countermeasures and research directions

被引:41
|
作者
Li, Lei [1 ]
Correia, Paulo Lobato [2 ]
Hadid, Abdenour [1 ,3 ]
机构
[1] Northwestern Polytech Univ, Sch Elect & Informat, Xian, Shaanxi, Peoples R China
[2] Univ Lisbon, Inst Telecomunicacoes, Inst Super Tecn, Lisbon, Portugal
[3] Univ Oulu, Ctr Machine Vis & Signal Proc CMVS, Oulu, Finland
基金
芬兰科学院;
关键词
LIVENESS DETECTION; IMAGE QUALITY; TEXTURE; FINGERPRINT;
D O I
10.1049/iet-bmt.2017.0089
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Among tangible threats facing current biometric systems are spoofing attacks. A spoofing attack occurs when a person tries to masquerade as someone else by falsifying data and thereby attempting to gain illegitimate access and advantages. Recently, an increasing attention has been given to this research problem, as can be attested by the growing number of articles and the various competitions that appear in major biometric forums. This study presents a comprehensive overview of the recent advances in face anti-spoofing state-of-the-art, discussing existing methodologies, available benchmarking databases, reported results and, more importantly, the open issues and future research directions. As a case study for illustration, a face anti-spoofing method is described, which employs a colour local binary pattern descriptor to jointly analyse colour and texture available from the luminance and chrominance channels. Two publicly available databases are used for the analysis, and the importance of inter-database evaluation to attest the generalisation capabilities of an anti-spoofing method is discussed.
引用
收藏
页码:3 / 14
页数:12
相关论文
共 50 条
  • [1] Face Biometrics under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues and Research Directions
    Hadid, Abdenour
    2014 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2014, : 113 - 118
  • [2] Mask spoofing in face recognition and countermeasures
    Kose, Neslihan
    Dugelay, Jean-Luc
    IMAGE AND VISION COMPUTING, 2014, 32 (10) : 779 - 789
  • [3] Complementary Countermeasures for Detecting Scenic Face Spoofing Attacks
    Komulainen, Jukka
    Hadid, Abdenour
    Pietikainen, Matti
    Anjos, Andre
    Marcel, Sebastien
    2013 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2013,
  • [4] Guest Editorial: Face Recognition and Spoofing Attacks
    Correia, Paulo Lobato
    Hadid, Abdenour
    IET BIOMETRICS, 2018, 7 (01) : 1 - 2
  • [5] Universal Adversarial Spoofing Attacks against Face Recognition
    Amada, Takuma
    Liew, Seng Pei
    Kakizaki, Kazuya
    Araki, Toshinori
    2021 INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2021), 2021,
  • [6] ON THE VULNERABILITY OF FACE RECOGNITION SYSTEMS TO SPOOFING MASK ATTACKS
    Kose, Neslihan
    Dugelay, Jean-Luc
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 2357 - 2361
  • [7] Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals
    Alegre, Federico
    Vipperla, Ravichander
    Evans, Nicholas
    13TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION 2012 (INTERSPEECH 2012), VOLS 1-3, 2012, : 1686 - 1689
  • [8] Realization and countermeasures for current location spoofing attacks
    Suzuki, Nobuo
    Harada, Taiga
    Fujihata, Takuya
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 2115 - 2121
  • [9] On the Defense of Spoofing Countermeasures Against Adversarial Attacks
    Nguyen-Vu, Long
    Doan, Thien-Phuc
    Bui, Mai
    Hong, Kihun
    Jung, Souhwan
    IEEE ACCESS, 2023, 11 : 94563 - 94574
  • [10] SPOOFING FACE RECOGNITION
    Reeba, Y. Binny
    Shanmugalakshmi, R.
    ICACCS 2015 PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS, 2015,