What is liveness detection?
Liveness detection is a cutting-edge technology that ensures the authenticity and veracity of an individual in a digital environment. By using advanced algorithms and techniques, liveness detection distinguishes between a live person and an attempted fraud.
This innovative solution provides an additional layer of security in processes such as digital onboarding, ensuring the integrity of processes and trust in the digital world.
Nevertheless, one of the main obstacles facing biometric recognition systems is impersonation attacks. With liveness detection, companies can confidently protect against impersonation and ensure a seamless user experience.
In the middle of this growing fraud scenario, liveness detection is vital to ensure the security of biometric-based verification processes.
A look at the history of liveness detection
In 1950, renowned mathematician and computer scientist Alan Turing developed the famous Turing Test, a noteworthy milestone in the history of artificial intelligence. This test was designed to assess the ability of a computer to show intelligent human-like behaviour.
The idea behind the Turing Test was that if a machine could perform a talk convincingly enough to fool a human judge into believing it was interacting with another human being rather than a machine, then the machine could be considered human-like intelligence.
The Turing Test became a significant benchmark in artificial intelligence and stimulated the development of algorithms and systems capable of simulating human behaviour. Nevertheless, as technology advanced, it became clear that the Turing Test did not fully address the question of the authenticity of the interaction between a computer and a human.
When it was concluded, the concept of liveness detection came into play. Unlike the Turing Test, which assesses a machine’s ability to mimic human behaviour, liveness detection uses artificial intelligence algorithms to determine if a computer interacts with a real person rather than a simulation.
A pioneering view of liveness
Dorothy E. Denning became famous after Tuning when in 2001 published an article entitled “ It’s “liveness,” not secrecy, that counts” in Information Security magazine. Denning introduced the term liveness in the context of biometric authentication. Rather than focusing only on protecting secrecy, Denning argued that a good biometric system should not rely only on keeping the biometric information used for authentication secret.
Furthermore, she emphasised that the validation process should focus on verifying the liveness, i.e. ensuring that the sample came from a live person and not a fraud.
Denning’s view was revolutionary for its time. At a time when most biometric authentication systems focused on protecting the secrecy and privacy of biometric data, Denning understood the importance of liveness detection as a critical element of ensuring authenticity and security.
Her perspective laid the foundation for creating more secure and reliable identity protection and fraud prevention systems.
But then, what is liveness detection?
Liveness detection is the ability of a system to determine the authenticity of a face, voice or other biometric feature. In other words, the technique verifies if the characteristic presented to the camera in a verification process comes from a real person or is an artefact.
Therefore, the liveness technique confirms the authenticity of the individual performing the process and identifies spoofing attacks (presentation attacks).
Liveness detection uses advanced algorithms and machine learning models to analyse and process the captured information. These algorithms identify specific patterns and features that indicate the sample authenticity, enabling accurate and reliable detection.
What is the difference between facial recognition and liveness detection?
Firstly, we need to say that they are not the same.
The main difference is that facial recognition answers “Are they the right users” whereas liveness answers the question “Are they real individuals?”.
Both terms are connected and can work together, but they are different. Liveness only involves detecting a human face in a frame or video, not identifying the person. On the contrary, facial recognition goes beyond simple liveness detection, trying to determine who the person is in a verification or authentication process. In this sense:
How does liveness detection work??
As commented, liveness is responsible for determining if the captured biometric data is real or being imitated to gain unauthorised access to the biometric system.
Liveness works differently depending on whether an image or video is analysed.
When an image is analysed in the liveness process:
When a micro video is analysed in the liveness process:
领英推荐
In both cases, the purpose of liveness is to determine if the biometric sample presented is real or fake. If the sample is fake, it calls an impersonation or presentation attack.
Presentation attack detection (PAD)?
Presentation attacks (PA), or impersonation attacks, are purely biometric vulnerabilities not shared by other security solutions and require specific measures.
According to ISO/IEC 30107-1, the biometric feature used in an attack is a presentation attack instrument (PAI).
In these attacks, fraudsters use an artefact or instrument, usually artificial, such as a 2D facial impression, a video or a realistic 3D mask to gain access to the biometric system fraudulently.
Let’s review the most common classification:
Photo attacks?
In this kind of attack, a photo of the impersonated identity is displayed in front of the camera.
The photo can be printed or can be displayed on a screen. In the latter case, the attack is performed on a device’s screen, such as a mobile or tablet.
This type of attack also includes another more complex technique, photo masks. In this case, the instrument is a photo of the legitimate user with holes in the mouth, eyes and nose.
Video attacks
In?In this attack, the artefact presented to the sensor of the biometric recognition system is a video played on a mobile phone, tablet or laptop.
They are also known as replay attacks.
Mask attacks
In mask attacks, a 3D reconstruction of the face of the person to be impersonated is made.
The mask can be done in various ways. The most common are:
If you are interested in learning more about other attacks, such as synthetic theft and the famous deepfakes, you can read our article, Deepfakes: how to guarantee authenticity?
Liveness detection types?
Active liveness detection
Active liveness detection involves user collaboration to verify the authenticity of a facial sample in real time. This technique uses physical actions performed by the user to confirm that the sample is from a genuine person and not a static image, mask or pre-recorded video.
Some common methods used in active liveness detection include:
There are other methods, such as?3D properties,?that are not widely used but fall under this type of indicator.
?Passive liveness detection
Passive liveness detection is based on analysing visual and biometric features in the facial image without requiring the user’s collaboration. This technique uses algorithms and machine learning models to identify signals that indicate the authenticity of the sample. It occurs when the technology takes a selfie of the user
Some common methods used in passive liveness detection include: