CHAPTER Chingovska_SPRINGER_2016/IDIAP Face Recognition Systems Under Spoofing Attacks Chingovska, Ivana Erdogmus, Nesli Anjos, André Marcel, Sébastien https://publications.idiap.ch/index.php/publications/showcite/Chingovska_Idiap-RR-18-2020 Related documents Face Recognition Systems Under Spoofing Attacks 2016 Springer International Publishing 165-194 978-3-319-28501-6 http://link.springer.com/chapter/10.1007%2F978-3-319-28501-6_8 URL 10.1007/978-3-319-28501-6_8 doi In this chapter, we give an overview of spoofing attacks and spoofing countermeasures for face recognition systems , with a focus on visual spectrum systems (VIS) in 2D and 3D, as well as near-infrared (NIR) and multispectral systems . We cover the existing types of spoofing attacks and report on their success to bypass several state-of-the-art face recognition systems. The results on two different face spoofing databases in VIS and one newly developed face spoofing database in NIR show that spoofing attacks present a significant security risk for face recognition systems in any part of the spectrum. The risk is partially reduced when using multispectral systems. We also give a systematic overview of the existing anti-spoofing techniques, with an analysis of their advantages and limitations and prospective for future work. REPORT Chingovska_Idiap-RR-18-2020/IDIAP Face Recognition Systems Under Spoofing Attacks Chingovska, Ivana Erdogmus, Nesli Anjos, André Marcel, Sébastien EXTERNAL https://publications.idiap.ch/attachments/reports/2015/Chingovska_Idiap-RR-18-2020.pdf PUBLIC Idiap-RR-18-2020 2020 Idiap September 2020 Submitted for as a book-chapter for: Face Recognition Across the Electromagnetic Spectrum (Springer) In this chapter we give an overview of spoofing attacks and spoofing counter-measures for face recognition systems, in particular in a verification sce- nario. We focus on 2D and 3D attacks to Visible Spectrum systems (VIS), as well as Near Infrared (NIR) and multispectral systems. We cover the existing types of spoofing attacks and report on their success to bypass several state-of-the-art face verification systems. The results on two different face spoofing databases with VIS attacks and one newly developed face spoofing database with VIS and NIR attacks, show that spoofing attacks present a significant security threat for face verification systems in any part of the spectrum. The risk is partially reduced when using mul- tispectral systems. We also give a systematic overview of the existing anti-spoofing techniques, with an analysis of their advantages and limitations and prospectives for future work.