scispace - formally typeset
Journal ArticleDOI

Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey

TLDR
This paper describes the various aspects of face presentation attacks, including different types of face artifacts, state-of-the-art PAD algorithms and an overview of the respective research labs working in this domain, vulnerability assessments and performance evaluation metrics, the outcomes of competitions, the availability of public databases for benchmarking new P AD algorithms in a reproducible manner, and a summary of the relevant international standardization in this field.
Abstract
The vulnerability of face recognition systems to presentation attacks (also known as direct attacks or spoof attacks) has received a great deal of interest from the biometric community. The rapid evolution of face recognition systems into real-time applications has raised new concerns about their ability to resist presentation attacks, particularly in unattended application scenarios such as automated border control. The goal of a presentation attack is to subvert the face recognition system by presenting a facial biometric artifact. Popular face biometric artifacts include a printed photo, the electronic display of a facial photo, replaying video using an electronic display, and 3D face masks. These have demonstrated a high security risk for state-of-the-art face recognition systems. However, several presentation attack detection (PAD) algorithms (also known as countermeasures or antispoofing methods) have been proposed that can automatically detect and mitigate such targeted attacks. The goal of this survey is to present a systematic overview of the existing work on face presentation attack detection that has been carried out. This paper describes the various aspects of face presentation attacks, including different types of face artifacts, state-of-the-art PAD algorithms and an overview of the respective research labs working in this domain, vulnerability assessments and performance evaluation metrics, the outcomes of competitions, the availability of public databases for benchmarking new PAD algorithms in a reproducible manner, and finally a summary of the relevant international standardization in this field. Furthermore, we discuss the open challenges and future work that need to be addressed in this evolving field of biometrics.

read more

Citations
More filters
Journal ArticleDOI

Deep face recognition: A survey

TL;DR: A comprehensive review of the recent developments on deep face recognition can be found in this paper, covering broad topics on algorithm designs, databases, protocols, and application scenes, as well as the technical challenges and several promising directions.
Journal ArticleDOI

Empowering Things With Intelligence: A Survey of the Progress, Challenges, and Opportunities in Artificial Intelligence of Things

TL;DR: In this article, the authors present a comprehensive survey on AIoT to show how AI can empower the IoT to make it faster, smarter, greener, and safer, and highlight the challenges facing AI-oT and some potential research opportunities.
Proceedings ArticleDOI

Deep Pixel-wise Binary Supervision for Face Presentation Attack Detection

TL;DR: A Convolutional Neural Network (CNN) based framework for presentation attack detection, with deep pixel-wise supervision, suitable for deployment in smart devices with minimal computational and time overhead is introduced.
Posted Content

Empowering Things with Intelligence: A Survey of the Progress, Challenges, and Opportunities in Artificial Intelligence of Things

TL;DR: It is shown how AI can empower the IoT to make it faster, smarter, greener, and safer, and some promising applications of AIoT that are likely to profoundly reshape the authors' world are summarized.
References
More filters
Book ChapterDOI

International Organization for Standardization

Anne Marsden, +1 more
TL;DR: An overview of the International Organization for Standardization (ISO) can be found in this paper, where the authors describe the ISO standards most relevant in a clinical laboratory service setting, as well as the process for obtaining and maintaining ISO certification.
Journal ArticleDOI

A Completed Modeling of Local Binary Pattern Operator for Texture Classification

TL;DR: It is shown that CLBP_S preserves more information of the local structure thanCLBP_M, which explains why the simple LBP operator can extract the texture features reasonably well and can be made for rotation invariant texture classification.
Journal ArticleDOI

Eulerian video magnification for revealing subtle changes in the world

TL;DR: Using the Eulerian Video Magnification method, the flow of blood as it fills the face is able to be visualize and the resulting signal is amplified to reveal hidden information.
Related Papers (5)