Burger menu

Welcome to Antispoofing Wiki,

The Free Encyclopedia That Anyone Can Edit

Now in Antispoofing Wiki

64 Articles + Add Article

Welcome to Antispoofing Wiki,

The Free Encyclopedia That Anyone Can Edit

Now in Antispoofing Wiki

64 Articles + Add Article

Antispoofing — The Key to Safety in Digital and Real Worlds

Antispoofing is an amalgam of machine learning, anatomical studies, and behavioral psychology, which solves one essential issue: keeping people’s assets and private information safe in the era when biometric data can easily be peeped and replicated.

Our encyclopedia is dedicated to the Liveness detection, Spoofing attacks and Antispoofing measures. Spoofing is a set of malicious techniques, which allow an attacker to pose as someone else, fabricate liveness cues, or synthesize a completely falsified, non-existent person from scratch to gain access to sensitive data, target’s money, device or vehicle control, and so on. Spoofing attacks have become an especially common practice since the advent of mobile technology. Internet of Things, face recognition and other systems are also quite vulnerable in the light of this threat.

Our goal is to select, review and propose the most effective and promising remedies against liveness spoofing.

Liveness detection allows avoiding a vast scope of fraudulent techniques. Swindlers aim at a rich variety of targets: from mobile phones and smart domestic appliances to Automatic Border Control systems.

Spoofing attack is a malicious practice, in which a biometric trait of a real, living person — voice, fingerprint, face, or even heart rate — is replicated to fool a biometrics-based security system.

Remote identity proofing is especially vulnerable as it offers a client enrollment process performed at distance. Eventually, a number of simple manipulations can result in successful identity theft, reputation damage, loss of data or money, etc. Proliferation of easy-to-use deepfake tools further aggravates the issue. Regular people can produce falsified media of decent quality, such as face swaps, with just a few clicks. Neither special training/knowledge nor significant computing power are required for that task — plenty of such tools are available online, powered by the cloud technology (Deepfakes Web, SteosVoice).

The Criminal Methods

Together with that, professional culprits will adopt more sophisticated methods to bypass an antispoofing system. There’s a rich cornucopia of tactics, tools, and tricks to emulate liveness. A motivated fraudster is ready to invest months in social engineering, collecting training data to produce a high-quality deepfake, attempting reverse engineering or trying out novel attack methods.

These techniques at times show immense creativity. For example, liveness mimicry can be achieved with simple and easy-to-obtain components:

  • 1Playdough.
  • 2Body paint.
  • 3Gelatin-based candy.
  • 4Glue and construction paper.
  • 5Many other widespread items.

Even though being cheap to produce, they sometimes succeed at bypassing even advanced security systems.

In a more challenging scenario, fraudsters basically resort to extreme solutions. These can include applying advanced movie-level makeup, producing highly realistic 3D masks that emulate body heat, severing a deceased person’s finger/extracting an eye, and even undergoing a plastic surgery.

Importance of tackling fake media

Fake media detection is also an essential part of antispoofing. If not properly addressed and timely prevented, it can result in disastrous consequences: social instability, public opinion manipulation, defamation, etc. Plus, sociology experts indicate two negative phenomena induced by the rise of fake media: liar’s dividend and reality apathy.

Antispoofing techniques and liveness detection solutions are designed with all of these threats in mind. They encompass a wide range of concepts, ideas and visions. Voice, retina, iris, fingerprint, and facial recognition employ liveness parameters to tell a real person from a perpetrator, which is the main goal of antispoofing as such.

The antispoof checking analyzes the input data. Among which are

  • Pop noises.
  • Face coloring.
  • Light distribution.
  • Depth and geometry.
  • General liveness signals

They help spot fake body parts, facial alterations, replay attacks and synthesized audiovisuals. Detecting them is the main goal of antispoofing as such.

In our articles, we discuss the most successful methods and the best antispoofing tools, as well as liveness detection techniques. We also focus on the international antispoofing and liveness standards, attack types and their classification, terminology, and other aspects of the matter. To validate the data presented, we quote scientific publications, as well as popular media, and news dedicated to liveness security and antispoofing.

Opinions and additions made by the viewers with an appropriate degree of training, education and professional experience are welcome in our facial liveness Wiki

Everything you wanted to know about Biometric Security, Liveness Detection, Spoofing Attacks, and Antispoofing Measures.

Learn more about Access Control, Liveness Check, and Recognition Security Systems.

Contribute to Antispoofing Wiki

by Becoming an Author or Commenter

If you have a good knowledge of biometric security, we welcome you to take part in writing or editing articles for the Antispoofing Wiki and be among the project’s contributors. Details can be found at the link below.

If you have questions about the article topics or want to comment on them, you can use the quick registration form.

For authorsFor commentators