Skip to main content

The Rise of Data-Driven Models in Presentation Attack Detection

  • Chapter
  • First Online:
Book cover Deep Biometrics

Abstract

Biometric systems are prevalent in access control but are vulnerable to frauds. A typical attempt of violating them is through presentation attacks, in which synthetic data is directly presented to an acquisition sensor to deceive these systems. A well-designed biometric system should have a presentation attack detection (PAD) module. A fruitful way to perform PAD is to model properties of peculiar traits (artifacts) in synthetic data. Studies have been advocating for approaches that seek to model the artifacts automatically from data (data-driven), achieving state-of-the-art results in PAD. However, the following questions arise from this literature: Which approaches are the state of the art? When do these approaches fail? How can such approaches complement the proposed ones based on human knowledge on PAD? How robust are these approaches under cross-dataset scenarios? Are these approaches robust against new attack types (e.g., face morphing)? Do these methods provide other ways to perform PAD, for example, using open-set classifiers rather than the classical binary formulation? Are these methods applicable to the multi-biometric setting? In this chapter, we address these questions through a literature review, focusing on three biometric modalities: face, fingerprint, and iris.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    BBC News: https://www.bbc.com/news/world-latin-america-21756709.

References

  1. BBC News, Doctor ‘used silicone fingers’ to sign in for colleagues. BBC News. https://www.bbc.com/news/world-latin-america-21756709 (2013). Accessed 13 Jan 2019

  2. J. Bergstra, R. Bardenet, Y. Bengio, B. Kégl, Algorithms for hyper-parameter optimization, in Advances in Neural Information Processing Systems (2011), pp. 2546–2554

    Google Scholar 

  3. J. Bergstra, D. Yamins, D.D. Cox, Making a science of model search: hyperparameter optimization in hundreds of dimensions for vision architectures, in International Conference on Machine Learning (2013), pp. I-115–I-123

    Google Scholar 

  4. S. Bhattacharjee, A. Mohammadi, S. Marcel, Spoofing deep face recognition with custom silicone masks, in IEEE International Conference on Biometrics: Theory, Applications and Systems (2018)

    Google Scholar 

  5. Z. Boulkenafet, J. Komulainen, L. Li, X. Feng, A. Hadid, OULU-NPU: a mobile face presentation attack database with real-world variations, in IEEE International Conference on Automatic Face and Gesture Recognition (2017)

    Google Scholar 

  6. G. Cai, S. Su, C. Leng, J. Wu, Y. Wu, S. Li, Cover patches: a general feature extraction strategy for spoofing detection. Concurrency Comput. Pract. Exp. 31, e4641 (2018)

    Google Scholar 

  7. I. Chingovska, A. Anjos, S. Marcel, On the effectiveness of local binary patterns in face anti-spoofing, in International Conference of the Biometrics Special Interest Group (2012)

    Google Scholar 

  8. T. Chugh, K. Cao, A.K. Jain, Fingerprint spoof buster: use of minutiae-centered patches. IEEE Trans. Inf. Forensics Secur. 13(9), 2190–2202 (2018)

    Article  Google Scholar 

  9. G.B. de Souza, D.F. da Silva Santos, R.G. Pires, A.N. Marana, J.P. Papa, Deep features extraction for robust fingerprint spoofing attack detection. J. Artif. Intell. Soft Comput. Res. 9(1), 41–49 (2019)

    Article  Google Scholar 

  10. K. Delac, M. Grgic, A survey of biometric recognition methods, in International Symposium Electronics in Marine, vol. 46 (2004), pp. 16–18

    Google Scholar 

  11. J.S. Doyle, K.W. Bowyer, Robust detection of textured contact lenses in iris recognition using BSIF. IEEE Access 3, 1672–1683 (2015)

    Article  Google Scholar 

  12. N. Erdogmus, S. Marcel, Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect, in IEEE International Conference on Biometrics: Theory, Applications and Systems (2013)

    Google Scholar 

  13. N. Erdoğmuş, S. Marcel, Introduction, in Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks (Springer, London, 2014), pp. 1–11

    Google Scholar 

  14. L. Ghiani, D. Yambay, V. Mura, S. Tocco, G.L. Marcialis, F. Roli, S. Schuckcrs, LivDet 2013 fingerprint liveness detection competition 2013, in IAPR International Conference on Biometrics (2013), pp. 1–6

    Google Scholar 

  15. D. Gragnaniello, C. Sansone, G. Poggi, L. Verdoliva, Biometric spoofing detection by a domain-aware convolutional neural network, in International Conference on Signal Image Technology and Internet-Based Systems (2017), pp. 193–198

    Google Scholar 

  16. P. Gupta, S. Behera, M. Vatsa, R. Singh, On iris spoofing using print attack, in International Conference on Pattern Recognition (2014), pp. 1681–1686

    Google Scholar 

  17. L. He, H. Li, F. Liu, N. Liu, Z. Sun, Z. He, Multi-patch convolution neural network for iris liveness detection, in IEEE International Conference on Biometrics: Theory, Applications and Systems (2016), pp. 1–7

    Google Scholar 

  18. K. Ito, T. Okano, T. Aoki, Recent advances in biometric security: A case study of liveness detection in face recognition, in Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (2017), pp. 220–227

    Google Scholar 

  19. A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)

    Article  Google Scholar 

  20. N. Kohli, D. Yadav, M. Vatsa, R. Singh, A. Noore, Synthetic iris presentation attack using iDCGAN, in IEEE International Joint Conference on Biometrics (2018), pp. 674–680

    Google Scholar 

  21. A. Krizhevsky, I. Sutskever, G. Hinton, ImageNet classification with deep convolutional neural networks, in Advances in Neural Information Processing Systems (2012), pp. 1097–1105

    Google Scholar 

  22. A. Kuehlkamp, A. Pinto, A. Rocha, K.W. Bowyer, A. Czajka, Ensemble of multi-view learning classifiers for cross-domain iris presentation attack detection. IEEE Trans. Inf. Forensics Secur. 4(6), 1419–1431 (2019)

    Article  Google Scholar 

  23. A. Kumar, A. Passi, Comparison and combination of iris matchers for reliable personal authentication. Pattern Recogn. 43(3), 1016–1026 (2010)

    Article  Google Scholar 

  24. X. Li, J. Komulainen, G. Zhao, P.C. Yuen, M. Pietikäinen, Generalized face anti-spoofing by detecting pulse from face videos, in International Conference on Pattern Recognition (2016), pp. 4244–4249

    Google Scholar 

  25. H. Li, P. He, S. Wang, A. Rocha, X. Jiang, A.C. Kot, Learning generalized deep feature representation for face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 13(10), 2639–2652 (2018)

    Article  Google Scholar 

  26. I. Manjani, S. Tariyal, M. Vatsa, R. Singh, A. Majumdar, Detecting silicone mask-based presentation attack via deep dictionary learning. IEEE Trans. Inf. Forensics Secur. 12(7), 1713–1723 (2017)

    Article  Google Scholar 

  27. G.L. Marcialis, A. Lewicke, B. Tan, P. Coli, D. Grimberg, A. Congiu, A. Tidu, F. Roli, S. Schuckers, First international fingerprint liveness detection competition – LivDet 2009, in International Conference on Image Analysis and Processing (2009), pp. 12–23

    Google Scholar 

  28. D. Menotti, G. Chiachia, A. Pinto, W.R. Schwartz, H. Pedrini, A.X. Falcao, A. Rocha, Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 864–879 (2015)

    Article  Google Scholar 

  29. R.F. Nogueira, R. de Alencar Lotufo, R.C. Machado, Fingerprint liveness detection using convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 11(6), 1206–1213 (2016)

    Article  Google Scholar 

  30. F. Pala, B. Bhanu, Iris liveness detection by relative distance comparisons, in IEEE Conference on Computer Vision and Pattern Recognition Workshops (2017)

    Google Scholar 

  31. F. Pala, B. Bhanu, On the accuracy and robustness of deep triplet embedding for fingerprint liveness detection, in IEEE International Conference on Image Processing (2017), pp. 116–120

    Google Scholar 

  32. E. Park, W. Kim, Q. Li, J. Kim, H. Kim, Fingerprint liveness detection using CNN features of random sample patches, in International Conference of the Biometrics Special Interest Group (2016), pp. 1–4

    Google Scholar 

  33. K. Patel, H. Han, A.K. Jain, Secure face unlock: spoof detection on smartphones. IEEE Trans. Inf. Forensics Secur. 11(10), 2268–2283 (2016)

    Article  Google Scholar 

  34. N. Pinto, D. Doukhan, J. DiCarlo, D. Cox, A high-throughput screening approach to discovering good forms of biologically inspired visual representation. PLoS Comput. Biol. 5(11), e1000579 (2009)

    Article  MathSciNet  Google Scholar 

  35. A. Pinto, W.R. Schwartz, H. Pedrini, A. de Rezende Rocha, Using visual rhythms for detecting video-based facial spoof attacks. IEEE Trans. Inf. Forensics Secur. 10(5), 1025–1038 (2015)

    Article  Google Scholar 

  36. A. Pinto, H. Pedrini, M. Krumdick, B. Becker, A. Czajka, K.W. Bowyer, A. Rocha, Counteracting presentation attacks in face fingerprint and iris recognition, in Deep Learning in Biometrics (Taylor and Francis, Boca Raton, 2018)

    Google Scholar 

  37. R. Raghavendra, K.B. Raja, C. Busch, ContlensNet: robust iris contact lens detection using deep convolutional neural networks, in IEEE Winter Conference on Applications of Computer Vision (2017), pp. 1160–1167

    Google Scholar 

  38. A. Rattani, W. Scheirer, A. Ross, Open set fingerprint spoof detection across novel fabrication materials. IEEE Trans. Inf. Forensics Secur. 10(11), 2447–2460 (2015)

    Article  Google Scholar 

  39. Y.A.U. Rehman, L.M. Po, M. Liu, LiveNet: improving features generalization for face liveness detection using convolution neural networks. Expert Syst. Appl. 108, 159–169 (2018)

    Article  Google Scholar 

  40. P. Silva, E. Luz, R. Baeta, H. Pedrini, A. Falcao, D. Menotti, An approach to iris contact lens detection based on deep image representations, in Conference on Graphics, Patterns and Images (2015), pp. 157–164

    Google Scholar 

  41. K. Simonyan, A. Zisserman, Very deep convolutional networks for large-scale image recognition (2014), arXiv preprint arXiv:1409.1556

    Google Scholar 

  42. G.B. Souza, D.F. Santos, R.G. Pires, A.N. Marana, J.P. Papa, Deep Boltzmann machines for robust fingerprint spoofing attack detection, in International Joint Conference on Neural Networks (2017), pp. 1863–1870

    Google Scholar 

  43. Z. Sun, T. Tan, Iris anti-spoofing, in Handbook of Biometric Anti-spoofing: Trusted Biometrics under Spoofing Attacks (Springer, London, 2014), pp. 103–123

    Google Scholar 

  44. Z. Sun, H. Zhang, T. Tan, J. Wang, Iris image classification based on hierarchical visual codebook. IEEE Trans. Pattern Anal. Mach. Intell. 36(6), 1120–1133 (2014)

    Article  Google Scholar 

  45. S. Sundaran, J.K. Antony, K. Vipin, Biometrie liveness authentication detection, in International Conference on Innovations in Information, Embedded and Communication Systems (2017), pp. 1–3

    Google Scholar 

  46. C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, A. Rabinovich, Going deeper with convolutions, in IEEE Conference on Computer Vision and Pattern Recognition (2015), pp. 1–9

    Google Scholar 

  47. X. Tan, Y. Li, J. Liu, L. Jiang, Face liveness detection from a single image with sparse low rank bilinear discriminative model, in European Conference on Computer Vision (2010), pp. 504–551

    Google Scholar 

  48. S. Tariyal, A. Majumdar, R. Singh, M. Vatsa, Deep dictionary learning. IEEE Access 4, 10096–10109 (2016)

    Article  Google Scholar 

  49. A. Toosi, A. Bottino, S. Cumani, P. Negri, P.L. Sottile, Feature fusion for fingerprint liveness detection: a comparative study. IEEE Access 5, 23695–23709 (2017)

    Article  Google Scholar 

  50. A. Toosi, S. Cumani, A. Bottino, CNN patch-based voting for fingerprint liveness detection, in International Joint Conference on Computational Intelligence (2017), pp. 158–165

    Google Scholar 

  51. C. Wang, K. Li, Z. Wu, Q. Zhao, A DCNN based fingerprint liveness detection algorithm with voting strategy, in Chinese Conference on Biometric Recognition (2015), pp. 241–249

    Google Scholar 

  52. L. Wu, Y. Xu, X. Xu, W. Qi, M. Jian, A face liveness detection scheme to combining static and dynamic features, in Chinese Conference on Biometric Recognition (2016), pp. 628–636

    Google Scholar 

  53. D. Yambay, L. Ghiani, P. Denti, G.L. Marcialis, F. Roli, S. Schuckers, LivDet 2011 – fingerprint liveness detection competition 2011, in IAPR International Conference on Biometrics (2012), pp. 208–215

    Google Scholar 

  54. D. Yambay, B. Becker, N. Kohli, D. Yadav, A. Czajka, K.W. Bowyer, S. Schuckers, R. Singh, M. Vatsa, A. Noore, et al., LivDet iris 2017 – iris liveness detection competition 2017, in IEEE International Joint Conference on Biometrics (2017), pp. 733–741

    Google Scholar 

  55. D. Yang, J. Lai, L. Mei, Deep representations based on sparse auto-encoder networks for face spoofing detection, in Chinese Conference on Biometric Recognition (2016), pp. 620–627

    Google Scholar 

  56. Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, S.Z. Li, A face antispoofing database with diverse attacks, in IAPR International Conference on Biometrics (2012), pp. 26–31

    Google Scholar 

  57. Y. Zhang, B. Zhou, X. Qiu, H. Wu, X. Zhan, 2D fake fingerprint detection for portable devices using improved light convolutional neural networks, in Chinese Conference on Biometric Recognition (2017), pp. 353–360

    Google Scholar 

Download references

Acknowledgements

The authors thank the financial support of the European Union through the Horizon 2020 Identity Project as well as the São Paulo Research Foundation—Fapesp, through the grant #2017/12646-3 (DéjàVu), and the Brazilian Coordination for the Improvement of Higher Education Personnel—Capes, through the DeepEyes grant.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anderson Rocha .

Editor information

Editors and Affiliations

Appendices

Appendix 1: Datasets and Research Work

See Table 4.

Appendix 2: List of Acronyms

BSIF:

Binary statistical image features

CNN:

Convolutional neural network

DBM:

Deep Boltzmann machine

DCNN:

Deep convolutional neural network

DNN:

Deep neural network

HTER:

Half total error rate

LBP:

Local binary pattern

MLP:

Multilayer perceptron

PA:

Presentation attack

PAD:

Presentation attack detection

SAE:

Sparse auto-encoder

SVM:

Support vector machines

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pereira, L.A.M. et al. (2020). The Rise of Data-Driven Models in Presentation Attack Detection. In: Jiang, R., Li, CT., Crookes, D., Meng, W., Rosenberger, C. (eds) Deep Biometrics. Unsupervised and Semi-Supervised Learning. Springer, Cham. https://doi.org/10.1007/978-3-030-32583-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-32583-1_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-32582-4

  • Online ISBN: 978-3-030-32583-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics