Skip to main content

Review of Face Presentation Attack Detection Competitions

  • Chapter
  • First Online:
Handbook of Biometric Anti-Spoofing

Abstract

Face presentation attack detection has received increasing attention ever since the vulnerabilities to spoofing have been widely recognized. The state of the art in software-based face anti-spoofing has been assessed in three international competitions organized in conjunction with major biometrics conferences in 2011, 2013, and 2017, each introducing new challenges to the research community. In this chapter, we present the design and results of the three competitions. The particular focus is on the latest competition, where the aim was to evaluate the generalization abilities of the proposed algorithms under some real-world variations faced in mobile scenarios, including previously unseen acquisition conditions, presentation attack instruments, and sensors. We also discuss the lessons learnt from the competitions and future challenges in the field in general.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The dataset was not yet released at the time of the competition.

  2. 2.

    http://opencamera.sourceforge.net/.

  3. 3.

    The source code for baseline can be downloaded along with the OULU-NPU database.

  4. 4.

    Idiap submitted also the scores of the individual sub-systems.

References

  1. International Organization for Standardization (2016) ISO/IEC JTC 1/SC 37 biometrics: information technology—biometric presentation attack detection—part 1: framework. Technical report

    Google Scholar 

  2. Chingovska I, Erdogmus N, Anjos A, Marcel S (2016) Face recognition systems under spoofing attacks. In: Bourlai T (ed) Face recognition across the imaging spectrum. Springer International Publishing, pp 165–194

    Google Scholar 

  3. Li Y, Li Y, Xu K, Yan Q, Deng R (2016) Empirical study of face authentication systems under OSNFD attacks. IEEE Trans Dependable Secur Comput

    Google Scholar 

  4. Mohammadi A, Bhattacharjee S, Marcel S (2018) Deeply vulnerable: a study of the robustness of face recognition to presentation attacks. IET Biom 7(1):15–26

    Article  Google Scholar 

  5. Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: IEEE International conference on automatic face and gesture recognition

    Google Scholar 

  6. Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: International conference of the biometrics special interest group (BIOSIG), pp 1–7

    Google Scholar 

  7. Costa-Pazo A, Bhattacharjee S, Vazquez-Fernandez E, Marcel S (2016) The REPLAY-MOBILE face presentation-attack database. In: International conference on biometrics special interests group (BIOSIG)

    Google Scholar 

  8. Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. Springer, Berlin, Heidelberg, pp 504–517. https://doi.org/10.1007/978-3-642-15567-3_37

    Chapter  Google Scholar 

  9. Wen D, Han H, Jain A (2015) Face spoof detection with image distortion analysis. Trans Inf Forensics Secur 10(4):746–761

    Article  Google Scholar 

  10. Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: International conference on biometrics (ICB), pp 26–31

    Google Scholar 

  11. Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche S, Ouafi A, Dornaika F, Taleb-Ahmed A, Qin L, Peng F, Zhang L, Long M, Bhilare S, Kanhangad V, Costa-Pazo A, Vazquez-Fernandez E, Perez-Cabo D, Moreira-Perez JJ, Gonzalez-Jimenez D, Mohammadi A, Bhattacharjee S, Marcel S, Volkova S, Tang Y, Abe N, Li L, Feng X, Xia Z, Jiang X, Liu S, Shao 0R, Yuen PC, Almeida WR, Andalo F, Padilha R, Bertocco G, Dias W, Wainer J, Torres R, Rocha A, Angeloni MA, Folego G, Godoy A, Hadid A (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: IEEE international joint conference on biometrics (IJCB)

    Google Scholar 

  12. Chakka M, Anjos A, Marcel S, Tronci R, Muntoni D, Fadda G, Pili M, Sirena N, Murgia G, Ristori M, Roli F, Yan J, Yi D, Lei Z, Zhang Z, Li S, Schwartz W, Rocha A, Pedrini H, Lorenzo-Navarro J, Castrillon-Santana M, Määttä J, Hadid A, Pietikäinen M (2011) Competition on counter measures to 2-D facial spoofing attacks. In: International joint conference on biometrics (IJCB)

    Google Scholar 

  13. Chingovska I, Yang J, Lei Z, Yi D, Li SZ, Kähm O, Glaser C, Damer N, Kuijper A, Nouak A, Komulainen J, Pereira T, Gupta S, Khandelwal S, Bansal S, Rai A, Krishna T, Goyal D, Waris MA, Zhang H, Ahmad I, Kiranyaz S, Gabbouj M, Tronci R, Pili M, Sirena N, Roli F, Galbally J, Fierrez J, Pinto A, Pedrini H, Schwartz WS, Rocha A, Anjos A, Marcel S (2013) The 2nd competition on counter measures to 2D face spoofing attacks. In: International conference on biometrics (ICB)

    Google Scholar 

  14. Erdogmus N, Marcel S (2013) Spoofing attacks to 2D face recognition systems with 3D masks. In: IEEE international conference of the biometrics special interest group

    Google Scholar 

  15. Raghavendra R, Raja KB, Busch C (2015) Presentation attack detection for face recognition using light field camera. IEEE Trans Image Process 24(3):1060–1075

    Article  MathSciNet  Google Scholar 

  16. Pavlidis I, Symosek P (2000) The imaging issue in an automatic face/disguise detection system. In: IEEE workshop on computer vision beyond the visible spectrum: methods and applications (CVBVS), pp 15–24

    Google Scholar 

  17. Rudd EM, Günther M, Boult TE (2016) PARAPH: presentation attack rejection by analyzing polarization hypotheses. In: IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp 171 – 178. https://doi.org/10.1109/CVPRW.2016.28

  18. Zhang Z, Yi D, Lei Z, Li SZ (2011) Face liveness detection by learning multispectral reflectance distributions. In: International conference on face and gesture, pp 436–441

    Google Scholar 

  19. Kollreider K, Fronthaler H, Faraj MI, Bigun J (2007) Real-time face detection and motion analysis with application in liveness assessment. IEEE Trans Inf Forensics Secur 2(3):548–558

    Article  Google Scholar 

  20. Ng ES, Chia AYS (2012) Face verification using temporal affective cues. In: International conference on pattern recognition (ICPR), pp 1249–1252

    Google Scholar 

  21. Chetty G, Wagner M (2004) Liveness verification in audio-video speaker authentication. In: Australian international conference on speech science and technology, pp 358–363

    Google Scholar 

  22. Frischholz RW, Werner A (2003) Avoiding replay-attacks in a face recognition system using head-pose estimation. In: IEEE international workshop on analysis and modeling of faces and gestures

    Google Scholar 

  23. De Marsico M, Nappi M, Riccio D, Dugelay JL (2012) Moving face spoofing detection via 3D projective invariants. In: IAPR international conference on biometrics (ICB)

    Google Scholar 

  24. Wang T, Yang J, Lei Z, Liao S, Li SZ (2013) Face liveness detection using 3D structure recovered from a single camera. In: International conference on biometrics (ICB)

    Google Scholar 

  25. Li J, Wang Y, Tan T, Jain AK (2004) Live face detection based on the analysis of Fourier spectra. In: Proceedings of biometric technology for human identification, pp 296–303

    Google Scholar 

  26. Bai J, Ng TT, Gao X, Shi YQ (2010) Is physics-based liveness detection truly possible with a single image? In: IEEE international symposium on circuits and systems (ISCAS), pp 3425–3428

    Google Scholar 

  27. Kose N, Dugelay JL (2013) Countermeasure for the protection of face recognition systems against mask attacks. In: International conference on automatic face and gesture recognition (FG)

    Google Scholar 

  28. Määttä J, Hadid A, Pietikäinen M (2011) Face spoofing detection from single images using micro-texture analysis. In: Proceedings of international joint conference on biometrics (IJCB). https://doi.org/10.1109/IJCB.2011.6117510

  29. Yang J, Lei Z, Liao S, Li SZ (2013) Face liveness detection with component dependent descriptor. In: International conference on biometrics (ICB)

    Google Scholar 

  30. Feng L, Po LM, Li Y, Xu X, Yuan F, Cheung TCH, Cheung KW (2016) Integration of image quality and motion cues for face anti-spoofing: a neural network approach. J Vis Commun Image Represent 38:451–460

    Article  Google Scholar 

  31. Galbally J, Marcel S (2014) Face anti-spoofing based on general image quality assessment. In: IAPR/IEEE international conference on pattern recognition (ICPR), pp 1173–1178

    Google Scholar 

  32. Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724

    Article  MathSciNet  Google Scholar 

  33. Bharadwaj S, Dhamecha TI, Vatsa M, Richa S (2013) Computationally efficient face spoofing detection with motion magnification. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)

    Google Scholar 

  34. Pan G, Wu Z, Sun L (2008) Liveness detection for face recognition. In: Proceedings of recent advances in face recognition, pp 109–124. In-Teh

    Google Scholar 

  35. Siddiqui T, Bharadwaj S, Dhamecha T, Agarwal A, Vatsa M, Singh R, Ratha N (2016) Face anti-spoofing with multifeature videolet aggregation. In: International conference on pattern recognition (ICPR)

    Google Scholar 

  36. Tirunagari S, Poh N, Windridge D, Iorliam A, Suki N, Ho ATS (2015) Detection of face spoofing using visual dynamics. IEEE Trans Inf Forensics Secur 10(4):762–777

    Article  Google Scholar 

  37. Li X, Komulainen J, Zhao G, Yuen PC, Pietikäinen M (2016) Generalized face anti-spoofing by detecting pulse from face videos. In: International conference on pattern recognition (ICPR)

    Google Scholar 

  38. Liu S, Yuen PC, Zhang S, Zhao G (2016) 3D mask face anti-spoofing with remote photoplethysmography. In: European conference on computer vision (ECCV). Springer International Publishing, pp 85–100

    Google Scholar 

  39. de Freitas Pereira T, Anjos A, De Martino J, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: International conference on biometrics (ICB)

    Google Scholar 

  40. Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: IEEE international conference on image processing (ICIP)

    Google Scholar 

  41. Boulkenafet Z, Komulainen J, Hadid A (2016) Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Sig Process Lett 24(2):141–145

    Google Scholar 

  42. Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. IEEE Trans Inf Forensics Secur 11(8):1818–1830

    Article  Google Scholar 

  43. Boulkenafet Z, Komulainen J, Hadid A (2018) On the generalization of color texture-based face anti-spoofing. Image Vis Comput

    Google Scholar 

  44. Patel K, Han H, Jain AK (2016) Cross-database face antispoofing with robust feature representation. In: Chinese conference on biometric recognition (CCBR), pp 611–619

    Chapter  Google Scholar 

  45. Pinto A, Pedrini H, Robson Schwartz W, Rocha A (2015) Face spoofing detection through visual codebooks of spectral temporal cubes. IEEE Trans Image Process 24(12):4726–4740

    Article  MathSciNet  Google Scholar 

  46. Yang J, Lei Z, Li SZ (2014) Learn convolutional neural network for face anti-spoofing. CoRR. http://arxiv.org/abs/1408.5601

  47. Manjani I, Tariyal S, Vatsa M, Singh R, Majumdar A (2017) Detecting silicone mask based presentation attack via deep dictionary learning. IEEE Trans Inf Forensics Secur

    Google Scholar 

  48. Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: Proceedings of IAPR IEEE international joint conference on biometrics (IJCB)

    Google Scholar 

  49. Ojala T, Pietikäinen M, Mäenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971–987

    Article  Google Scholar 

  50. Korshunov P, Marcel S, Muckenhirn H, Gonçalves AR, Mello AGS, Violato RPV, Simoes FO, Neto MU, de Assis Angeloni M, Stuchi JA, Dinkel H, Chen N, Qian Y, Paul D, Saha G, Sahidullah M (2016) Overview of BTAS 2016 speaker anti-spoofing competition. In: IEEE international conference on biometrics theory, applications and systems (BTAS)

    Google Scholar 

  51. Yambay D, Becker B, Kohli N, Yadav D, Czajka A, Bowyer KW, Schuckers S, Singh R, Vatsa M, Noore A, Gragnaniello D, Sansone C, Verdoliva L, He L, Ru Y, Li H, Liu N, Sun Z, Tan T (2017) LivDet-Iris 2017—iris liveness detection competition 2017. In: IEEE international joint conference on biometrics (IJCB)

    Google Scholar 

  52. Yambay D, Doyle JS, Bowyer KW, Czajka A, Schuckers S (2014) LivDet-iris 2013—iris liveness detection competition 2013. In: IEEE international joint conference on biometrics (IJCB), pp 1–8

    Google Scholar 

  53. Galbally J, Marcel S, Fiérrez J (2014) Biometric antispoofing methods: a survey in face recognition. IEEE Access 2:1530–1552

    Article  Google Scholar 

  54. Chingovska I, Anjos A, Marcel S (2013) Anti-spoofing in action: joint operation with a verification system. In: IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp 98–104

    Google Scholar 

  55. Rattani A, Poh N, Ross A (2013) A bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification. In: IEEE international workshop on information forensics and security (WIFS), pp 37–42

    Google Scholar 

Download references

Acknowledgements

The financial support from the Finnish Foundation for Technology Promotion and Infotech Oulu Doctoral Program is acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jukka Komulainen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Komulainen, J., Boulkenafet, Z., Akhtar, Z. (2019). Review of Face Presentation Attack Detection Competitions. In: Marcel, S., Nixon, M., Fierrez, J., Evans, N. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-319-92627-8_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92627-8_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92626-1

  • Online ISBN: 978-3-319-92627-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics