Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Presentation attack detection methods for face recognition systems: a comprehensive survey
Ramachandra R., Busch C. ACM Computing Surveys50 (1):1-37,2017.Type:Article
Date Reviewed: May 30 2017

This paper deals in general with biometric technology and specifically with facial recognition. In this offering, the authors present an exhaustive review of all pioneering efforts on facial presentation attack detection (PAD) algorithms. According to the authors, this work complements existing surveys by detailing:

(1) A complete overview of recent research on face PAD techniques, publicly available databases, and the level of performance achieved by publicly organized competitions;
(2) Extensive analysis of 14 different state-of-the-art (SOTA) PAD techniques in a common evaluation framework;
(3) Extensive analysis on the vulnerability of the VeriLook face recognition system to three different face artifacts captured at various levels of image quality;
(4) A preliminary analysis of identical twins as a special case of face presentation attack; and
(5) The provision of insights into the relevant international standards of PAD (ISO/IEC 30107-1:2016 [ISO/IEC JTC1 SC37 Biometrics 2016] and ISO/IEC DIS 30107-3 [International Organization for Standardization 2016]).

The authors organize the rest of the paper as stated in their following narrative:

Section 2 presents the general concepts involved in the vulnerability of a face recognition system, Section 3 presents details of different types of face artifacts, and Section 4 presents and discusses the merits and drawbacks of existing presentation attack detection schemes. In Section 5, we provide an overview of all publicly available databases. Section 6 gives an overview of all face antispoofing competitions, Section 7 provides performance metrics according to ISO/IEC DIS 30107-3, and Section 8 presents the performance evaluation of 14 different static PAD techniques following a unifying framework. Section 9 presents the preliminary results on the identical twins as a possible presentation attack on the face recognition system. Section 10 delineates future perspectives and Section 11 presents the conclusion.

The paper is highly detailed and profusely peppered with carefully constructed diagrams. Of particular interest is the sophistication used by some for attempted manipulation of face recognition disguises.

This work is definitely not for those with only a casual curiosity in face recognition systems, but it should be a valuable addition to the libraries of professionals in the field who specialize in face recognition.

Reviewer:  James Van Speybroeck Review #: CR145305 (1708-0563)
Bookmark and Share
  Featured Reviewer  
 
Object Recognition (I.4.8 ... )
 
 
Feature Representation (I.4.7 ... )
 
 
Network Protocols (C.2.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Object Recognition": Date
On view likelihood and stability
Weinshall D., Werman M. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(2): 97-108, 1997. Type: Article
Feb 1 1999
Junctions
Parida L., Geiger D., Hummel R. IEEE Transactions on Pattern Analysis and Machine Intelligence 20(7): 687-698, 1998. Type: Article
Apr 1 1999
Topological recognition of polyhedral objects from multiple views
Laurentini A. Artificial Intelligence 127(1): 31-55, 2001. Type: Article
Apr 17 2002
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy