Face Spoofing and Counter-Spoofing: A Survey of State-of-the-art Algorithms


  • Dakshina Ranjan Kisku Department of Computer Science and Engineering, National Institute of Technology Durgapur, Mahatma Gandhi Avenue, Durgapur 713209, West Bengal, INDIA http://orcid.org/0000-0003-1116-2972
  • Rinku Datta Rakshit Department of Information Technology, Asansol Engineering College Asansol, West Bengal, India




Biometrics, Face biometric, Face spoofing, Face anti-spoofing, Printed photo attack, Replay video attack, 3D mask attack, Plastic surgery attack, Texture analysis, Motion analysis, Liveness detection, Image quality analysis


In the current scenario of biometric-based identity verification, a face is still being proved to be an essential physiological evidence for successful person identification without letting know the target. Nevertheless, repeated attacks of intruders can cause the face recognition system insecure because of easy availability of face images or pictures of a person in social networks or in other networked resources. Spoofing facial identity in a biometric system is not a difficult task for intruders. When an intruder presents a photograph or a video containing a face of a person in front of a networked camera which is integrated with a face biometric system, spoofing is referred to as presentation attack. Without anti-spoofing mechanisms, biometric systems are at high risk in case of susceptible attacks. Thus, detecting face spoof in a face biometric system is a challenging research field. The aim of this book is to summarize some of the most popular face spoof detection techniques which are proved to be beneficial for the researchers to make it an indispensable aspect.

Author Biography

Dakshina Ranjan Kisku, Department of Computer Science and Engineering, National Institute of Technology Durgapur, Mahatma Gandhi Avenue, Durgapur 713209, West Bengal, INDIA

Department of Computer Science and Engineering

Assistant Professor


(1) W. Bao, H. Li, N. Li, and W. Jiang. A liveness detection method for face recognition based on optical flow field. In 2009 International Conference on Image Analysis and Signal Processing, pages 233–236. IEEE, 2009.

(2) K. Kollreider, H. Fronthaler, and J. Bigun, “Non-intrusive liveness detection by face images," Image and Vision Computing, 27: 233–244, 2009.

(3) T. F. Pereira, A. Anjos, J. De Martino, and S. Marcel, “Can face anti-spoofing countermeasures work in a real world scenario?,” In Proc. ICB, pages 1–8, June 2013.

(4) M. De Marsico, M. Nappi, D. Riccio, and J. Dugelay, “Moving face spoofing detection via 3D projective invariants,” In International Conference on Biometrics, pages 73–78, 2012.

(5) J. Määttä, A. Hadid, and M. Pietikainen, “Face spoofing detection from single images using texture and local shape analysis,” IET Biometrics, 1(1):3–10, 2012.

(6) T. d. F. Pereira, A. Anjos, J. M. De Martino, and S. Marcel, “ LBP-TOP based countermeasure against facial spoofing attacks,” In ACCV Workshop on Computer Vision With Local Binary Pattern

Variants, 2012.

(7) Peixoto, C. Michelassi, and A. Rocha, “Face Liveness Detection under Bad Illumination Conditions,” in IEEE Intl. Conference on Image Processing, Sep. 2011, pp. 3557–3560.

(8) W. R. Schwartz, A. Rocha, and H. Pedrini, “Face Spoofing Detection through Partial Least Squares and Low-Level Descriptors,” in Intl. Joint Conference on Biometrics, Oct. 2011, pp.1–8

(9) Stauffer and W. Grimson, “Adaptive background mixture models for real-time tracking,” In Computer Vision and Pattern Recognition, 1999.

(10) G. Pan, L. Sun, Z. Wu, and Y. Wang, “Monocular Camera-based Face Liveness Detection by Combining Eye blink and Scene Context,” Telecommunication Systems, vol. 47, pp.

–225, 2011.

(11) J. M¨a¨atta, A. Hadid, and M. Pietik¨ainen, “Face spoofing detection from single images using micro-texture analysis,” In Proc. IJCB, pages 1–7, 2011.

(12) T. Ojala, M. Pietik¨ainen, and T. M¨aenp¨a¨a, “Multiresolution gray-scale and rotation invariant texture classification with local binary patterns,” IEEE Trans. Pattern Anal. Mach. Intell., 24:971–987, July 2002.

(13) T. Ahonen, A. Hadid, and M. Pietik¨ainen, “Face description

with local binary patterns: Application to face recognition,” IEEE Trans. Pattern Anal. Mach. Intell., 28:2037–2041, December 2006.

(14) X. Tan, Y. Li, J. Liu, and L. Jiang, “Face liveness detection from a single image with sparse low rank bilinear discriminative model,” In Proceedings of the 11th European conference on Computer vision: Part VI, ECCV’10, pages 504–517, Berlin,

Heidelberg, 2010. Springer-Verlag.

(15) V. N. Vapnik, “Statistical Learning Theory,”Wiley-Interscience, 1998.

(16) B. S.ManjunathandW. Y.Ma., “Texture features for browsing and retrieval of image data,” IEEE Trans. Pattern Anal. Mach.Intell., 18:837–842, August 1996.

(17) C.-C. Chang and C.-J. Lin., “LIBSVM: A library for support vector machines,” ACM Transactions on Intelligent Systems and Technology, 2:27:1–27:27, 2011. Software available at http://www.csie.ntu.edu.tw/˜cjlin/libsvm

(18) V. Ojansivu and J. Heikkil¨a., “Blur insensitive texture classification using local phase quantization,” In Proceedings of the3rd international conference on Image and Signal Processing,

ICISP ’08, pages 236–243, Berlin, Heidelberg, 2008. Springer-Verlag.

(19) J. Yang, Z. Lei, S. Liao, and S. Li., “Face liveness detection with component dependent descriptor,” In Proc. ICB, pages 1–6, June 2013.

(20) A. d. S. Pinto et al., “Video-based face spoofing detection through visual rhythm analysis,” in 25th Conference on Graphics, Patterns and Images, 2012.

(21) M.-G. Chung, J. Lee, H. Kim, S. M.-H. Song, and W.-M. Kim, “Automatic Video Segmentation based on Spatio – Temporal Features,” Korea Telecom, vol. 1, no. 4, pp. 4–14, 1999.

(22) A. Anjos and S. Marcel, “Counter-Measures to Photo Attacks in Face Recognition: A Public Database and A Baseline,” in Intl. Joint Conference on Biometrics, 2011, pp. 1–7.

(23) H. Wold, S. Kotz and N. Johnson, “Partial Least Squares,” in Encyclopedia of Statistical Sciences,” New York: Wiley, 1985, vol. 6, pp. 581–591.

(24) R. Haralick, K. Shanmugam, and I. Dinstein, “Texture Features for Image Classification,” IEEE Trans. on Systems, Man, and Cybernetics, vol. 3, no. 6, 1973.

(25) A. M. Eskicioglu and P. S. Fisher, “Image quality measures and their performance,” IEEE Trans. on Communications, vol. 43, pp. 2959–2965, 1995.

(26) S. Bharadwaj, T. I. Dhamecha, M. Vatsa, and R. Singh., “Computationally efficient face spoofing detection with motion magnification,” In Proc. CVPR Workshops, pages 105–110, 2013.

(27) R. Chaudhry, A. Ravichandran, G. Hager, and R. Vidal, “Histograms of oriented optical flow and Binet-Cauchy kernels on nonlinear dynamical systems for the recognition of human actions,” In Conference on Computer Vision and Pattern

Recognition, pages 1932–1939, 2009.

(28) I. Chingovska, A. Anjos, and S. Marcel, “On the effectiveness of local binary patterns in face anti-spoofing,” In International Conference of the Biometrics Special Interest Group, pages 1–7, 2012.

(29) H.-Y. Wu, M. Rubinstein, E. Shih, J. Guttag, F. Durand, and W. T. Freeman, “Eulerian video magnification for revealing subtle changes in the world,” ACM Transactions onGraphics,31(4),2012.

(30) M. Shreve, S. Godavarthy, D. Goldgof, and S. Sarkar, “Macro and micro-expression spotting in long videos using spatiotemporal strain,” In International Conference on Automatic

Face Gesture Recognition and Workshops, pages 51–56, 2011.

(31) Y. Altun, I. Tsochantaridis, and T. Hofmann, “Hidden markov support vector machines,” In International Conference on Machine Learning, 2003.

(32) M. G. Martini et al., “Image quality assessment based on

edge preservation,” Signal Processing: Image Communication, vol. 27, pp. 875–882, 2012.

(33) D. Wen, H. Han, and A. K. Jain, “Face Spoof Detection with Image Distortion Analysis,” IEEE Transactions on Information Forensics and Security, Vol. 10, No. 4, pp.746-761, April 2015.

(34) Pittsburgh Pattern Recognition (PittPatt), PittPatt Software Developer Kit (acquired by Google), http://www.pittpatt.com/.

(35) R. Tan and K. Ikeuchi, “Separating reflection components of textured surfaces using a single image,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 2, pp. 178–193, Feb. 2005.

(36) F. Crete, T. Dolmiere, P. Ladret, and M. Nicolas, “The blur effect: perception and estimation with a new no-reference perceptual blur metric,” in Proc. SPIE: Human Vision and Electronic Imaging XII, 2007.

(37) P. Marziliano, F. Dufaux, S. Winkler, and T. Ebrahimi, “A no-reference perceptual blur metric,” in Proc. ICIP, vol. 3, 2002, pp. 57–60.

(38) Y. Chen, Z. Li, M. Li, and W.-Y. Ma, “Automatic classification of photographs and graphics,” in Proc. ICME, 2006, pp. 973–976.

(39) G. Pan, L. Sun, Z. Wu, and S. Lao, “Eyeblink-based

Anti-Spoofing in Face Recognition from a Generic Web camera,” in IEEE Intl. Conference on Computer Vision, 2007, pp. 1–8.

(40) Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, and S. Z. Li, “A face anti spoofing database with diverse attacks,” in Proc. ICB, 2012, pp. 26–31.

(41) D. Lowe, “Object recognition from local scale-invariant features,” In Proc. ICCV, pages 1150–1157, 1999.

(42) N. Kose and J.-l. Dugelay, “Classification of captured and recaptured images to detect photograph spoofing,” in Proc. ICIEV, 2012, pp. 1027–1032.

(43) J. Galbally, S. Marcel, and J. Fierrez, “Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition,” IEEE Trans. Image Process., vol. 23, no. 2, pp. 710–724, 2014.

(44) K. Patel, H. Han, and A. K. Jain, “Live Face Video vs. Spoof Face Video: Use of Moire Patterns to Detect Replay Video Attacks,” ICB, Phuket, Thailand, May 19-22, 2015.

(45) A. Amidror, “The Theory of the Moir´e Phenomenon Volume I: Periodic Layers,” 2nd ed. Springer, 2009.

(46) https://www.IDIAP.ch/dataset

(47) Dalal, N., Triggs, B., “Histograms of oriented gradients for human detection,” Int. Conf. on Computer Vision & Pattern Recognition, 2005, vol. 2, pp. 886–893

(48) Vedaldi, A., Zisserman, A., “Efficient additive kernels via explicit feature maps,” Proc. IEEE Conf. on Computer Vision and Pattern Recognition, 2010

(49) A. Chingovska, J. Yang, Z. Lei, D. Yi, S. Z. Li, O. Kähm, C. Glaser, N. Damer, A. Kuijper, A. Nouak, J. Komulainen, T. Pereira, A. Anjos, S. Gupta, S. Khandelwal, S. Bansal, A. Rai, T. Krishna, D. Goyal, M.-A. Waris, H. Zhang, I. Ahmad, S. Kiranyaz,

M. Gabbouj, R. Tronci, M. Pili, N. Sirena, F. Roli, J. Galbally, J.

Fierrez, A. Pinto, H. Pedrini, W. S. Schwartz, A. Rocha, and S. Marcel, “The 2nd competition on counter measures to 2d face spoofing attacks,” In IAPR International Conference on Biometrics (ICB), 2013.

(50) S. de Jong., “SIMPLS: an alternative approach to partial least squares regression,” Chemometrics and Intelligent Laboratory Systems, 18(3):251–263, 1993.

(51) Viola, P.A., Jones, M.J., “Rapid object detection using a boosted cascade of simple features,” Proc. IEEE Conf. on Computer Vision and Pattern Recognition, 2001, pp. 511–518.

(52) Niu, Z., Shan, S., Yan, S., Chen, X., Gao,W., “2D cascaded adaboost for eye localization,” Proc. 18th Int. Conf. on Pattern Recognition, 2006.

(53) Chakka, M.M., Anjos, A., Marcel, S., et al., “Competition on counter measures to 2-d facial spoofing attacks,” Proc. IAPR IEEE Int. Joint Conf. on Biometrics (IJCB), Washington, DC, USA,

(54) Fan, R.E., Chang, K.W., Hsieh, C.J., Wang, X.R., Lin, C.J., “LIBLINEAR: a library for large linear classification,” J. Mach. Learn. Res., 2008, 9, pp. 1871–1874.

(55) Vedaldi, A., Fulkerson, B., “VLFeat: an open and portable library of computer vision algorithms,” 2008, http://www.vlfeat.org/

(56) Javier Galbally, Sébastien Marcel, “Face Anti-Spoofing Based on General Image Quality Assessment,” Pattern Recognition (ICPR), 2014 22nd International Conference, pp.

-1178, 2014.

(57) Junyan Peng, Patrick P.K. Chan, “Face Liveness Detection For Combating The Spoofing Attack in Face Recognition,”2014 International Conference on Wavelet Analysis and Pattern Recognition, pp. 176-181, 2014.

(58) S. Yao et al., “Contrast signal-to-noise ratio for image quality assessment,” in Proc. Int. Conf. on Image Processing, 2005, pp. 397–400.

(59) Kollreider, Klaus, Hartwig Fronthaler, and Josef Bigun."Verifying liveness by multiple experts in face biometrics," In Computer Vision and Pattern Recognition Workshops, 2008. CVPRW'08. IEEE Computer Society Conference on, pp. 1-6. Ieee,

(60) André Anjos, Murali Mohan Chakka , Sébastien Marcel, “Motion-based counter-measures to photo attacks in face recognition”, IET Biometrics, vol. 3, pp. 147-158, 2014.

(61) C. Liu, Ed., “Beyond Pixels: Exploring New Representations and Applications for Motion Analysis,” Doctoral Thesis. Massachusetts Institute of Technology, May 2009.

(62) A. Bruhn, J. Weickert, and C. Schn¨orr, “Lucas/kanade meets horn/schunck: Combining local and global optic flow methods,” International Journal of Computer Vision, vol. 61, pp. 211–231, 2005.

(63) T. Brox, A. Bruhn, N. Papenberg, and J. Weickert, “High accuracy optical flow estimation based on a theory for warping,” in European Conference on Computer Vision (ECCV). Springer, 2004, pp. 25–36.

(64) R. Tronci, G. Giacinto, and F. Roli, “Dynamic score combination: A supervised and unsupervised score combination method,” In Machine Learning and Data Mining in Pattern Recognition, volume 5632 of Lecture Notes in Computer Science, pages 163-177. Springer Berlin / Heidelberg, 2009.

(65) Y. Peng, A. Ganesh, J. Wright, W. Xu, and Y. Ma., “RASL: Robust Alignment by Sparse and Low-rank Decomposition for Linearly Correlated Images,” In IEEE Conference on Computer Vision and Pattern Recognition, pages 763-770, 2010.

(66) D. Donoho, “De-noising by Soft-thresholding,” IEEE Trans. on Information Theory, 41(3):613-627, 1995.

(67) D. Donoho and I. Johnstone, “Ideal Spatial Adaptation via Wavelet Shrinkage,” Biometrika, 81(3):425-455, 1994.

(68) W. R. Schwartz, R. D. da Silva, L. S. Davis, and H. Pedrini, “A Novel Feature Descriptor Based on the Shearlet Transform,” In IEEE Intl. Conference on Image Processing, 2011.

(69) Q. Huynh-Thu and M. Ghanbari, “Scope of validity of PSNR in image/video quality assessment,” Electronics Letters, vol. 44, pp. 800–801, 2008.

(70) C. Chow and C.N.Liu, “Approximating Discrete Probability Distributions with Dependence Trees,” IEEE Trans. on Information Theory, 14:426-467, 1968.

(71) J. Pearl and S. Russell, “Handbook of Brain Theory and Neural Networks,” chapter Bayesian Networks. Cambridge, 2002.

(72) M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, “The WEKA Data Mining Software: An Update,” SIGKDD Explorations, 11(1), 2009.

(73) G. Farneb¨ack, “Two-frame motion estimation based on polynomial expansion,” In SCIA, pages 363–370, 2003.

(74) Avcibas et al., “Statistical evaluation of image quality measures,” Journal of Electronic Imaging, vol. 11, pp. 206–223, 2002.

(75) G. Zhao and M. Pietik¨ainen, “Dynamic texture recognition using local binary patterns with an application to facial expressions,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(6):915–928, 2007.

Yan, Z. Zhang, Z. Lei, D. Yi, and S. Li., “Face liveness detection by exploring multiple scenic clues,” In 12th International Conference on Control, Automation, Robotics and Vision, 2012.




How to Cite

Kisku, D. R., & Datta Rakshit, R. (2017). Face Spoofing and Counter-Spoofing: A Survey of State-of-the-art Algorithms. Transactions on Engineering and Computing Sciences, 5(2), 31. https://doi.org/10.14738/tmlai.52.3130