Computer Science ›› 2025, Vol. 52 ›› Issue (2): 323-335.doi: 10.11896/jsjkx.240200015

• Information Security • Previous Articles     Next Articles

Research Progress in Facial Presentation Attack Detection Methods Based on Deep Learning

SUN Rui, WANG Fei, FENG Huidong, ZHANG Xudong, GAO Jun   

  1. School of Computer Science and Information Engineering,Hefei University of Technology,Hefei 230601,China
    Anhui Key Laboratory of Industry Safety and Emergency Technology,Hefei University of Technology,Hefei 230009,China
  • Received:2024-02-02 Revised:2024-06-28 Online:2025-02-15 Published:2025-02-17
  • About author:SUN Rui,born in 1976,Ph.D,professor.His main research interests include computer vision and machine learning.
  • Supported by:
    General Project of National Natural Science Foundation of China(61876057),National Natural Science Foundation of Anhui Province,China(2208085MF158) and Key Research and Development Plan of Anhui Province-Special Project for Strengthening Police with Science and Technology(202004D07020012).

Abstract: With the widespread application of facial recognition technology in fields such as public security and financial payments,presentation attacks(PAs) pose a serious challenge to the security of facial recognition systems.Presentation attacks detection(PAD) technology aims to determine the authenticity of input faces and has important research significance for maintaining the security and robustness of recognition systems.Due to the continuous emergence of large-scale datasets in recent years,deep learning-based PAD methods have gradually become the mainstream in this field.This paper offers a survey of current face PAD techniques based on deep learning.Firstly,it provides an overview of the definition,implementation methods,and common types of attack for PAD.Secondly,from the perspectives of single modality and multimodality,a thorough study is performed on the development trends,technical principles,benefits,and drawbacks of deep learning methods in the field of PAD over the previous five years.Thirdly,the common datasets and their characteristics that are used in PAD research are presented,and the evaluation standards,protocols,and algorithm performance results are given.Finally,we summarize the main issues faced in current PAD research and look forward to future development trends.

Key words: Presentation attack detection, Single modal, Multi-modal, Facial presentation dataset, Deep learning

CLC Number: 

  • TP391
[1]BOULKENAFET Z,KOMULAINEN J,HADID A.Face anti-spoofing using speeded-up robust features and fisher vector encoding[J].IEEE Signal Processing Letters,2016,24(2):141-145.
[2]ISO/IEC 30107-3:2016.Information technology-Biometric pre-sentation attack detection-Part 1:Framework(First Edition) [S].Geneva:International Organization for Standardization/International Electrotechnical Commission(ISO/IEC),2016.
[3]GALBALLY J,MARCELS,FIERREZ J.Image quality assess-ment for fake biometric detection:Application to iris,fingerprint,and face recognition[J].IEEE Transactions on Image Processing,2013,23(2):710-724.
[4]HADID A.Face biometrics under spoofing attacks:Vulnerabilities,countermeasures,open issues,and research directions[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops.2014:113-118.
[5]YU Z,QIN Y,LI X,et al.Deep learning for face anti-spoofing:A survey[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2022,45(5):5609-5631.
[6]LU Z Q,LU Z M,SHEN F L,et al.Overview of face anti-spoofing live detection[J].Journal of Information Security,2020,5(2):18-27.
[7]ZHANG F,ZHAO S K,YUAN C,et al.Research progress on anti fraud in facial recognition [J].Journal of Software,2022,33(7):2411-2446.
[8]PINTO A,GOLDENSTEIN S,FERREIRA A,et al.Leveraging shape,reflectance and albedo from shading for face presentation attack detection[J].IEEE Transactions on Information Forensics and Security,2020,15:3347-3358.
[9]SHEN C,HE X P.Facial anti-counterfeiting algorithm based on texture feature enhancement and lightweight network [J].Computer Science,2022,49(6A):390-396.
[10]ZHANG P,ZOU F,WU Z,et al.FeatherNets:Convolutionalneural networks as light as feather for face anti-spoofing[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops.2019.
[11]CAI R,LI H,WANG S,et al.DRL-FAS:A novel frameworkbased on deep reinforcement learning for face anti-spoofing[J].IEEE Transactions on Information Forensics and Security,2020,16:937-951.
[12]HUANG P K,CHIANG C H,CHONG J X,et al.LDCformer:Incorporating Learnable Descriptive Convolution to Vision Transformer for Face Anti-Spoofing[C]//2023 IEEE International Conference on Image Processing(ICIP).IEEE,2023:121-125.
[13]LEE Y,KWAK Y,SHIN J.Robust face anti-spoofing frame-work with Convolutional Vision Transformer[C]//2023 IEEE International Conference on Image Processing(ICIP).IEEE,2023:1015-1019.
[14]WANG Z,YU Z,ZHAO C,et al.Deep spatial gradient and temporal depth learning for face anti-spoofing[C]//IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:5042-5051.
[15]YU Z,WAN J,QIN Y,et al.NAS-FAS:Static-dynamic central difference network search for face anti-spoofing[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2020,43(9):3005-3023.
[16]YU Z,QIN Y,ZHAO H,et al.Dual-cross central difference network for face anti-spoofing[J].arXiv:2105.01290,2021.
[17]YU B,LU J,LI X,et al.Salience-aware face presentation attack detection via deep reinforcement learning[J].IEEE Transactions on Information Forensics and Security,2021,17:413-427.
[18]GEORGE A,MARCEL S.Deep pixel-wise binary supervisionfor face presentation attack detection[C]//2019 International Conference on Biometrics(ICB).IEEE,2019:1-8.
[19]YU Z,QIN Y,XU X,et al.Auto-fas:Searching lightweight networks for face anti-spoofing[C]//ICASSP 2020-2020 IEEE International Conference on Acoustics,Speech and Signal Proces-sing(ICASSP).IEEE,2020:996-1000.
[20]YU Z,LI X,SHI J,et al.Revisiting pixel-wise supervision for face anti-spoofing[J].IEEE Transactions on Biometrics,Beha-vior,and Identity Science,2021,3(3):285-295.
[21]QIN Y,YU Z,YAN L,et al.Meta-teacher for face anti-spoofing[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2021,44(10):6311-6326.
[22]YU Z,LI X,NIU X,et al.Face anti-spoofing with human material perception[C]//Computer Vision-ECCV 2020:16th European Conference,Glasgow,UK,August 23-28,2020,Procee-dings,Part VII 16.Springer International Publishing,2020:557-575.
[23]SUN W,SONG Y,CHEN C,et al.Face spoofing detection based on local ternary label supervision in fully convolutional networks[J].IEEE Transactions on Information Forensics and Security,2020,15:3181-3196.
[24]LI X,WAN J,JIN Y,et al.3DPC-Net:3D point cloud network for face anti-spoofing[C]//2020 IEEE International Joint Conference on Biometrics(IJCB).IEEE,2020:1-8.
[25]ZHENG W,YUE M,ZHAO S,et al.Attention-based spatial-temporal multi-scale network for face anti-spoofing[J].IEEE Transactions on Biometrics,Behavior,and Identity Science,2021,3(3):296-307.
[26]MING Z,YU Z,AL-GHADI M,et al.Vitranspad:video transformer using convolution and self-attention for face presentation attack detection[C]//2022 IEEE International Conference on Image Processing(ICIP).IEEE,2022:4248-4252.
[27]CHEN H,HU G,LEI Z,et al.Attention-based two-stream convolutional networks for face spoofing detection[J].IEEE Tran-sactions on Information Forensics and Security,2019,15:578-593.
[28]JIA S,LI X,HU C,et al.3D face anti-spoofing with factorized bi-linear coding[J].IEEE Transactions on Circuits and Systems for Video Technology,2020,31(10):4031-4045.
[29]LI H,LI W,CAO H,et al.Unsupervised domain adaptation for face anti-spoofing[J].IEEE Transactions on Information Forensics and Security,2018,13(7):1794-1809.
[30]TU X,ZHANG H,XIE M,et al.Deep transfer across domains for face anti-spoofing[J].Journal of Electronic Imaging,2019,28(4):043001.
[31]WANG G,HAN H,SHAN S,et al.Unsupervised adversarial domain adaptation for cross-domain face presentation attack detection[J].IEEE Transactions on Information Forensics and Security,2020,16:56-69.
[32]ZHOU L,LUO J,GAO X,et al.Selective domain-invariant feature alignment network for face anti-spoofing[J].IEEE Tran-sactions on Information Forensics and Security,2021,16:5352-5365.
[33]FENG Y,SHI Y C,GAO Y H,et al.Domain adaptive facial anti fraud based on quadratic decoupling and progressive alignment of live features [J].Computer Research and Development,2023,60(8):1727-1739.
[34]JIA Y,ZHANG J,SHAN S,et al.Single-side domain generalization for face anti-spoofing[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:8484-8493.
[35]HONG Z W,LIN Y C,LIU H T,et al.Domain-Generalized FaceAnti-Spoofing with Unknown Attacks[C]//2023 IEEE International Conference on Image Processing(ICIP).IEEE,2023:820-824.
[36]LIAO C H,CHEN W C,LIU H T,et al.Domain Invariant Vision Transformer Learning for Face Anti-spoofing[C]//Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision.2023:6098-6107.
[37]LI D,YANG Y,SONG Y Z,et al.Learning to generalize:Meta-learning for domain generalization [C]//Proceedings of the AAAI Conference on Artificial Intelligence.2018.
[38]LIN J D,LIN H H,DY J,et al.Lightweight face anti-spoofing network for telehealth applications[J].IEEE Journal of Biome-dical and Health Informatics,2021,26(5):1987-1996.
[39]CHEN Z,YAO T,SHENG K,et al.Generalizable representation learning for mixture domain face anti-spoofing[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2021:1132-1139.
[40]QIN Y,ZHAO C,ZHU X,et al.Learning meta model for zero-and few-shot face anti-spoofing[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2020:11916-11923.
[41]PÉREZ-CABO D,JIMÉNEZ-CABELLO D,COSTA-PAZO A,et al.Learning to Learn Face-PAD:a lifelong learning approach[C]//2020 IEEE International Joint Conference on Biometrics(IJCB).IEEE,2020:1-9.
[42]WANG C Y,LU Y D,YANG S T,et al.Patchnet:A simple face anti-spoofing framework via fine-grained patch recognition[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2022:20281-20290.
[43]XIONG F,ABDALMAGEED W,Unknown presentation attack detection with face rgb images[C]//2018 IEEE 9th Interna-tional Conference on Biometrics Theory,Applications and Systems(BTAS).IEEE,2018:1-9.
[44]FATEMIFAR S,AWAIS M,AKBARI A,et al.A stacking ensemble for anomaly based client-specific face spoofing detection[C]//2020 IEEE International Conference on Image Processing(ICIP).IEEE,2020:1371-1375.
[45]FATEMIFAR S,ARASHLOO S R,AWAIS M,et al.Client-specific anomaly detection for face presentation attack detection[J].Pattern Recognition,2021,112:107696.
[46]PÉREZ-CABO D,JIMÉNEZ-CABELLO D,COSTA-PAZO A,et al.Deep anomaly detection for generalized face anti-spoofing[C]//Proceedings of the IEEE/CVF Conferenceon Computer Vision and Pattern Recognition Workshops.2019.
[47]GEORGE A,MARCEL S.Learning one class representations for face presentation attack detection using multi-channel con-volutional neural networks[J].IEEE Transactions on Information Forensicsand Security,2020,16:361-375.
[48]JIANG F,LIU P,SHAO X,et al.Face anti-spoofing with gene-rated near-infrared images[J].Multimedia Tools and Applications,2020,79:21299-21323.
[49]LIU A,TAN Z,WAN J,et al.Face anti-spoofing via adversarialcross-modality translation[J].IEEE Transactions on Information Forensics and Security,2021,16:2759-2772.
[50]KOTWAL K,MARCEL S.CNN patch pooling for detecting 3D mask presentation attacks in NIR[C]//2020 IEEE International Conference on Image Processing(ICIP).IEEE,2020:1336-1340.
[51]DENG P,GE C,WEI H,et al.Attention-aware dual-stream network for multimodal face anti-spoofing[J].IEEE Transactions on In-formation Forensics and Security,2023,18:4258-4271.
[52]WANG Y,SONG X,XU T,et al.From RGB to depth:domain transfer network for face anti-spoofing[J].IEEE Transactions on Information Forensics and Security,2021,16:4280-4290.
[53]SUN X,HUANG L,LIU C.Multimodal face spoofing detection via RGB-D images[C]//2018 24th International Conference on Pattern Recognition(ICPR).IEEE,2018:2221-2226.
[54]CHEN S,LI W,YANG H,et al.3d face mask anti-spoofing via deep fusion of dynamic texture and shape clues[C]//2020 15th IEEE International Conference on Automatic Face and Gesture Recognition(FG 2020).IEEE,2020:314-321.
[55]GEORGE A,MARCEL S,Cross modal focal loss for rgbd face anti-spoofing[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:7882-7891.
[56]JIA Y,ZHANG J,SHAN S.Dual-branch meta-learning network with distribution alignment for face anti-spoofing[J].IEEE Transactions on Information Forensics and Security,2021,17:138-151.
[57]CHUANG C C,WANG C Y,LAI S H.Generalized Face Anti-Spoofing via Multi-Task Learning and One-Side Meta Triplet Loss[C]//2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition(FG).IEEE,2023:1-8.
[58]ZHANG S,WANG X,LIU A,et al.A dataset and benchmark for large-scale multi-modal face anti-spoofing[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2019:919-928.
[59]ZHANG S,LIU A,WAN J,et al.Casia-surf:A large-scalemulti-modal benchmark for face anti-spoofing[J].IEEE Tran-sactions on Biometrics,Behavior,and Identity Science,2020,2(2):182-193.
[60]PARKIN A,GRINCHUK O.Recognizing multi-modal facespoofing with face recognition networks[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops.2019.
[61]SHEN T,HUANG Y,TONG Z.FaceBagNet:Bag-of-local-features model for multi-modal face anti-spoofing[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops.2019.
[62]ZHOU Q,YANG M,CHEN S,et al.Multi-modal Face Anti-spoofing Using Multi-fusion Network and Global Depth-wise Convolution[C]//2022 International Joint Conference on Neural Networks(IJCNN).IEEE,2022:1-8.
[63]LIU W,WEI X,LEI T,et al.Data-fusion-based two-stage cascade framework for multimodality face anti-spoofing[J].IEEE Transactions on Cognitive and Developmental Systems,2021,14(2):672-683.
[64]LIU A,TAN Z,YU Z,et al.Fm-vit:Flexible modal vision trans-formers for face anti-spoofing[J].arXiv:2305.03277,2023.
[65]GEORGE A,MOSTAANI Z,GEISSENBUHLER D,et al.Biometric face presentation attack detection with multi-channel convolutional neural network[J].IEEE Transactions on Information Forensics and Security,2019,15:42-55.
[66]WANG W,WEN F,ZHENG H,et al.Conv-mlp:A convolution and mlp mixed model for multimodal face anti-spoofing[J].IEEE Transactions on Information Forensics and Security,2022,17:2284-2297.
[67]JI Q,XU S,CHEN X,et al.A cross domain multi-modal dataset for robust face anti-spoofing[C]//2020 25th International Conference on Pattern Recognition(ICPR).IEEE,2021:4309-4316.
[68]LIU A,TAN Z,WAN J,et al.Casia-surf cefa:A benchmark for multi-modal cross-ethnicity face anti-spoofing[C]//Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision.2021:1179-1187.
[69]CHEN X,XU S,JI Q,et al.A dataset and benchmark towards multi-modal face anti-spoofing under surveillance scenarios[J].IEEE Access,2021,9:28140-28155.
[70]CHINGOVSKA I,ANJOS A,MARCEL S.On the effectiveness of local binary patterns in face anti-spoofing[C]//Proceedings of the International Conference of Biometrics Special Interest Group(BIOSIG).IEEE,2012:1-7.
[71]BOULKENAFET Z,KOMULAINEN J,LI L,et al.OULU-NPU:A mobile face presentation attack database with real-world variations[C]//2017 12th IEEE International Conference on Automatic Face & Gesture Recognition.IEEE,2017:612-618.
[72]LIU Y,JOURABLOO A,LIU X.Learning deep models for face anti-spoofing:Binary or auxiliary supervision[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2018:389-398.
[73]ERDOGMUS N,MARCEL S.Spoofing face recognition with 3D masks[J].IEEE Transactions on Information Forensics and Security,2014,9(7):1084-1097.
[74]VARETO R H,SALDANHA A M,SCHWARTZ W R.Theswax benchmark:attacking biometric systems with wax figures[C]//2020 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP).IEEE,2020:986-990.
[75]ISO/IE30107-3-2017.Information technology-Biometric presentation attack detection-Part 3:Testing and reporting(First Edition)[S].Geneva:International Organization for Standardization,2017.
[76]LIU Y,STEHOUWER J,JOURABLOO A,et al.Deep treelearning for zero-shot face anti-spoofing[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2019:4680-4689.
[1] WANG Jiamin, WU Wenhong, NIU Hengmao, SHI Bao, WU Nier, HAO Xu, ZHANG Chao, FU Rongsheng. Review of Concrete Defect Detection Methods Based on Deep Learning [J]. Computer Science, 2025, 52(6A): 240900137-12.
[2] HAO Xu, WU Wenhong, NIU Hengmao, SHI Bao, WU Nier, WANG Jiamin, CHU Hongkun. Survey of Man-Machine Distance Detection Method in Construction Site [J]. Computer Science, 2025, 52(6A): 240700098-10.
[3] CHEN Shijia, YE Jianyuan, GONG Xuan, ZENG Kang, NI Pengcheng. Aircraft Landing Gear Safety Pin Detection Algorithm Based on Improved YOlOv5s [J]. Computer Science, 2025, 52(6A): 240400189-7.
[4] GAO Junyi, ZHANG Wei, LI Zelin. YOLO-BFEPS:Efficient Attention-enhanced Cross-scale YOLOv10 Fire Detection Model [J]. Computer Science, 2025, 52(6A): 240800134-9.
[5] ZHANG Hang, WEI Shoulin, YIN Jibin. TalentDepth:A Monocular Depth Estimation Model for Complex Weather Scenarios Based onMultiscale Attention Mechanism [J]. Computer Science, 2025, 52(6A): 240900126-7.
[6] HUANG Hong, SU Han, MIN Peng. Small Target Detection Algorithm in UAV Images Integrating Multi-scale Features [J]. Computer Science, 2025, 52(6A): 240700097-5.
[7] WANG Chanfei, YANG Jing, XU Yamei, HE Jiai. OFDM Index Modulation Signal Detection Based on Deep Learning [J]. Computer Science, 2025, 52(6A): 240900122-6.
[8] ZOU Ling, ZHU Lei, DENG Yangjun, ZHANG Hongyan. Source Recording Device Verification Forensics of Digital Speech Based on End-to-End DeepLearning [J]. Computer Science, 2025, 52(6A): 240800028-7.
[9] WANG Baohui, GAO Zhan, XU Lin, TAN Yingjie. Research and Implementation of Mine Gas Concentration Prediction Algorithm Based on Deep Learning [J]. Computer Science, 2025, 52(6A): 240400188-7.
[10] LIU Chengming, LI Haixia, LI Shaochuan, LI Yinghao. Ensemble Learning Model for Stock Manipulation Detection Based on Multi-scale Data [J]. Computer Science, 2025, 52(6A): 240700108-8.
[11] ZHANG Yongyu, GUO Chenjuan, WEI Hanyue. Deep Learning Stock Price Probability Prediction Based on Multi-modal Feature Wavelet Decomposition [J]. Computer Science, 2025, 52(6A): 240600140-11.
[12] ZHOU Lei, SHI Huaifeng, YANG Kai, WANG Rui, LIU Chaofan. Intelligent Prediction of Network Traffic Based on Large Language Model [J]. Computer Science, 2025, 52(6A): 241100058-7.
[13] WANG Yicheng, NING Tai, LIU Xinyu, LUO Ye. Position-aware Based Multi-modality Lung Cancer Survival Prediction Method [J]. Computer Science, 2025, 52(6A): 240500089-8.
[14] GUAN Xin, YANG Xueyong, YANG Xiaolin, MENG Xiangfu. Tumor Mutation Prediction Model of Lung Adenocarcinoma Based on Pathological [J]. Computer Science, 2025, 52(6A): 240700010-8.
[15] TAN Jiahui, WEN Chenyan, HUANG Wei, HU Kai. CT Image Segmentation of Intracranial Hemorrhage Based on ESC-TransUNet Network [J]. Computer Science, 2025, 52(6A): 240700030-9.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!