Author :
Galbally, Javier ; Marcel, Sebastien ; Fierrez, Julian
Author_Institution :
Inst. for the Protection & Security of the Citizen, Joint Res. Centre of the Eur. Comm., Ispra, Italy
Abstract :
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering works in face and voice recognition to the current state of development wherein a wide spectrum of highly accurate systems may be found, ranging from largely deployed modalities, such as fingerprint, face, or iris, to more marginal ones, such as signature or hand. This path of technological evolution has naturally led to a critical issue that has only started to be addressed recently: the resistance of this rapidly emerging technology to external attacks and, in particular, to spoofing. Spoofing, referred to by the term presentation attack in current standards, is a purely biometric vulnerability that is not shared with other IT security solutions. It refers to the ability to fool a biometric system into recognizing an illegitimate user as a genuine one by means of presenting a synthetic forged version of the original biometric trait to the sensor. The entire biometric community, including researchers, developers, standardizing bodies, and vendors, has thrown itself into the challenging task of proposing and developing efficient protection methods against this threat. The goal of this paper is to provide a comprehensive overview on the work that has been carried out over the last decade in the emerging field of antispoofing, with special attention to the mature and largely deployed face modality. The work covers theories, methodologies, state-of-the-art techniques, and evaluation databases and also aims at providing an outlook into the future of this very active field of research.
Keywords :
biometrics (access control); face recognition; security of data; biometric antispoofing methods; biometric community; biometric technology; biometric vulnerability; face recognition; presentation attack; synthetic forged version; technological evolution; voice recognition; Access control; Authentication; Biomedical monitoring; Biometrics; Computer security; Distance measurement; Fingerprint recognition; Immune system; Iris recognition; Speech recognition; Anti-Spoofing; Biometrics; Security; anti-spoofing; face; security;