A Literature Review of 2D Face Recognition Systems: Attacks and Defenses
Muhammad Shairoze Malik
In a world where biometric identification and authentication is increasingly growing, it is critical for IT Security personnel to have an understanding of how these systems they use work, and weaknesses that lay with them. Face recognition is a very common form of biometric identification and authentication, where the face of the user is used to both identify and authenticate the user. This paper serves as a literature review for a preliminary understanding of face recognition systems. First the basics of how a facial recognition system works is reviewed. After this, selected articles demonstrating a variety of facial recognition spoofing attacks are summarized to demonstrate the attack surface. This is then followed by a review of studies conducted for defenses against these attacks, focusing primarily on the key concepts used to help identify spoofing attempts. This paper then concludes by summarizing the findings, and explaining the importance of understanding these different aspects of facial recognition from a business perspective.