I. Introduction
Nowadays, it is known that most of existing face recognition systems are vulnerable to spoofing attacks. A spoofing attack occurs when someone tries to bypass a face biometric system by presenting a fake face in front of the camera. For instance, in [1], researchers inspected the threat of the online social networks based facial disclosure against the latest version of six commercial face authentication systems (Face Unlock, Facelock Pro, Visidon, Veriface, Luxand Blink and FastAccess). While on average only 39% of the images published on social networks can be successfully used for spoofing, the relatively small number of usable images was enough to fool face authentication software of 77% of the 74 users. Also, in a live demonstration during the International Conference on Biometric (ICB 2013), a female intruder with a specific make-up succeeded in fooling a face recognition system. These two examples among many others highlight the vulnerability of face recognition systems to spoofing attacks.
https://www.tabularasa-euproject.org/evaluations/tabula-rasa-spoofing-challenge-2013