CHAPTER
Chingovska_SPRINGER_2016/IDIAP
Face Recognition Systems Under Spoofing Attacks
Chingovska, Ivana
Erdogmus, Nesli
Anjos, André
Marcel, Sébastien
https://publications.idiap.ch/index.php/publications/showcite/Chingovska_Idiap-RR-18-2020
Related documents
Face Recognition Systems Under Spoofing Attacks
2016
Springer International Publishing
165-194
978-3-319-28501-6
http://link.springer.com/chapter/10.1007%2F978-3-319-28501-6_8
URL
10.1007/978-3-319-28501-6_8
doi
In this chapter, we give an overview of spoofing attacks and spoofing countermeasures for face recognition systems , with a focus on visual spectrum systems (VIS) in 2D and 3D, as well as near-infrared (NIR) and multispectral systems . We cover the existing types of spoofing attacks and report on their success to bypass several state-of-the-art face recognition systems. The results on two different face spoofing databases in VIS and one newly developed face spoofing database in NIR show that spoofing attacks present a significant security risk for face recognition systems in any part of the spectrum. The risk is partially reduced when using multispectral systems. We also give a systematic overview of the existing anti-spoofing techniques, with an analysis of their advantages and limitations and prospective for future work.
REPORT
Chingovska_Idiap-RR-18-2020/IDIAP
Face Recognition Systems Under Spoofing Attacks
Chingovska, Ivana
Erdogmus, Nesli
Anjos, André
Marcel, Sébastien
EXTERNAL
https://publications.idiap.ch/attachments/reports/2015/Chingovska_Idiap-RR-18-2020.pdf
PUBLIC
Idiap-RR-18-2020
2020
Idiap
September 2020
Submitted for as a book-chapter for: Face Recognition Across the Electromagnetic Spectrum (Springer)
In this chapter we give an overview of spoofing attacks and spoofing
counter-measures for face recognition systems, in particular in a verification sce-
nario. We focus on 2D and 3D attacks to Visible Spectrum systems (VIS), as well
as Near Infrared (NIR) and multispectral systems. We cover the existing types of
spoofing attacks and report on their success to bypass several state-of-the-art face
verification systems. The results on two different face spoofing databases with VIS
attacks and one newly developed face spoofing database with VIS and NIR attacks,
show that spoofing attacks present a significant security threat for face verification
systems in any part of the spectrum. The risk is partially reduced when using mul-
tispectral systems. We also give a systematic overview of the existing anti-spoofing
techniques, with an analysis of their advantages and limitations and prospectives for
future work.