Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
In this chapter we give an overview of spoofing attacks and spoofing counter-measures for face recognition systems, in particular in a verification sce- nario. We focus on 2D and 3D attacks to Visible Spectrum systems (VIS), as well as Near Infrared (NIR) and multispectral systems. We cover the existing types of spoofing attacks and report on their success to bypass several state-of-the-art face verification systems. The results on two different face spoofing databases with VIS attacks and one newly developed face spoofing database with VIS and NIR attacks, show that spoofing attacks present a significant security threat for face verification systems in any part of the spectrum. The risk is partially reduced when using mul- tispectral systems. We also give a systematic overview of the existing anti-spoofing techniques, with an analysis of their advantages and limitations and prospectives for future work.
Touradj Ebrahimi, Yuhang Lu, Zewei Xu