Skip to main content

Anti-spoofing, Face

  • Reference work entry
  • First Online:
Encyclopedia of Biometrics
  • 225 Accesses

Synonyms

Face Detection; Face Recognition, Overview; Liveness assurance; Liveness verification

Definition

The process of verifying whether the face image presented to an authentication system is real (i.e., alive) or whether it is reproduced or synthetic (“spoofed”) and thus fraudulent. When a face authentication system is to recognize the face of a person by means of an electronic camera and associated image recognition software, it is important to be sure that the person seeking the authentication actually presents his or her face to the camera at the time and place of the authentication request; the face is presented live as on live television as distinct from a movie or cartoon program. In contrast, an impostor could try to present a mask, a photograph, or a video recording, showing the facial image of a legitimate client to the camera in order to be falsely authenticated by the system as that client. That kind of threat to authentication systems is known generally as replay attack...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 899.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S.A.C. Schuckers, Spoofing and anti-spoofing measures. Inf. Secur. Tech. Rep. 7(4), 56–62 (2002)

    Google Scholar 

  2. M.M. Chakka, A. Anjos, S. Marcel, R. Tronci, D. Muntoni, G. Fadda, M. Pili, N. Sirena, G. Murgia, M. Ristori, F. Roli, J. Yan, D. Yi, Z. Lei, Z. Zhang, S.Z. Li, W. Robson Schwartz, A. Rocha, H. Pedrini, J. Lorenzo-Navarro, M. Castrillón Santana, J. Määttä, A. Hadid, M. Pietikäinen, Competition on counter measures to 2-D facial spoofing attacks. IJCB 1–6 (2011), doi: 10.1109/IJCB.2011.6117509

    Google Scholar 

  3. J. Yang, Z. Lei, S. Liao, S.Z. Li, Face liveness detection with component dependent descriptor, in Proceedings of the 6th IAPR International Conference on Biometrics (ICB2013), Madrid, 4–7 June 2013

    Google Scholar 

  4. T. Ojala, M. Pietikäinen, T. Mäenpää, Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 24, 971–987 (2002)

    Google Scholar 

  5. D. Donoho, I. Johnstone, Ideal spatial adaptation via wavelet shrinkage. Biometrika 81(3), 425–455 (1994)

    MATH  MathSciNet  Google Scholar 

  6. Facial liveness assessment system, Int. Patent WO/2005/008566, http://www.wipo.int (27.1.2005)

  7. K. Kollreider, H. Fronthaler, J. Bigun, Evaluating liveness by face images and the structure tensor, in Proceedings of the 4th IEEE Workshop on Automatic Identification Advanced Technologies, Buffalo, 17–18 Oct 2005 (IEEE, 2005)

    Google Scholar 

  8. H.-K. Jee, S.-U. Jung, J.-H. Yoo, Liveness detection for embedded face recognition system. World Acad. Sci. Eng. Technol. 2(6), (2008). waset.org/publications/5308/liveness-detection-for-embedded-face-recognition-system.pdf

  9. Y. Peng, A. Ganesh, J. Wright, W. Xu, Y. Ma, RASL: robust alignment by sparse and low-rank decomposition for linearly correlated images, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, San Francisco, 2010, pp. 763–770

    Google Scholar 

  10. P. Viola, M. Jones, Robust real-time face detection. Int. J. Comput. Vis. 57(2), 137–154 (2009)

    Google Scholar 

  11. L. Li, W. Huang, I.Y.H. Gu, Q. Tian, Foreground object detection from videos containing complex background, in Proceedings of the ACM International Conference on Multimedia, Berkeley, 2003, pp. 2–10

    Google Scholar 

  12. M.M. Chakka, A. Anjosl, S. Marcel, R. Tronci, D. Muntoni, G. Fadda, M. Pili, N. Sirena, G. Murgia, M. Ristori, F. Roli, J. Yan, D. Yi, Z. Lei, Z. Zhang, S.Z. Li, W.R. Schwartz, A. Rocha, R. Pedrini, J. Lorenzo-Navarro, M. Castrillón-Santana, J. Määttä, A. Radid, M. Pietikäinen, Competition on counter measures to 2-D facial spoofing attacks, in IEEE International Joint Conference on Biometrics, Washington, DC, 2011, pp. 1–6

    Google Scholar 

  13. I. Chingovska, J. Yang, Z. Lei, D. Yi, S.Z. Li, O. Kähm, C. Glaser, N. Damer, A. Kuijper, A. Nouak, J. Komulainen, T. Pereira, S. Gupta, S. Khandelwal, S. Bansal, A. Rai, T. Krishna, D. Goyal, M.-A. Waris, H. Zhang, I. Ahmad, S. Kiranyaz, M. Gabbouj, R. Tronci, M. Pili, N. Sirena, F. Roli, J. Galbally, J. Fierrez, A. Pinto, H. Pedrini, W.S. Schwartz, A. Rocha, A. Anjos, S. Marcel, The 2nd competition on counter measures to 2D face spoofing attacks, in IEEE International Conference on Biometrics, Madrid, 2013, pp. 1–6

    Google Scholar 

  14. I. Chingovska, A. Anjos, S. Marcel, On the effectiveness of local binary patterns in face anti-spoofing, in Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, 2012, pp. 1–7

    Google Scholar 

  15. G. Chetty, M. Wagner, “Liveness” verification in audio-video authentication, in Proceedings of the International Conference on Spoken Language Processing, ICSLP-2004, Jeju, 4–7 Oct 2004, vol. III, (2004), pp. 2509–2512

    Google Scholar 

  16. G. Chetty, M. Wagner, Investigating feature level fusion for checking liveness in face voice authentication, in Proceedings Eighth International Symposium on Signal Processing and Its Applications, Sydney, 28–31 Aug 2005

    Google Scholar 

  17. H. Bredin, G. Chollet, Audiovisual speech synchrony measure: application to biometrics. EURASIP J. Adv. Signal Process. 2007(1), 1–11 (2007)

    Google Scholar 

  18. G. Chetty, M. Wagner Speaking faces for face-voice speaker identity verification, in Proceedings of Interspeech-2006 – International Conference on Spoken Language Processing, Paper Mon3A1O-6, Pittsburgh (International Speech Communication Association, 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Wagner, M., Chetty, G. (2015). Anti-spoofing, Face. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_67

Download citation

Publish with us

Policies and ethics