Enhancing Face Liveness Detection: Novel Deep CNN Architectures for Anti-Spoofing
Received: 29 May 2025 | Revised: 7 July 2025, 20 July 2025, and 24 July 2025 | Accepted: 27 July 2025 | Online: 6 October 2025
Corresponding author: Anupkumar M. Bongale
Abstract
In today's technologically advanced environment, security is of paramount importance, and various methods are employed to ensure robust protection and implement strong security measures. Biometric security can be achieved using various means such as strong keys, efficient key-value pair challenges, etc. Biometric authentication systems use physiological or behavioral mechanisms to offer robustness in identity verification. In terms of physical aspects of authentication security, faces, fingerprints, palms, etc. are used as primary modalities. Face is the most widely used modality due to its ease of availability, but it is easily susceptible to spoof attacks. Attacks on face systems are broadly categorized into 2D and 3D attacks. Leveraging deep learning methods with CNN architectures has shown efficacy in detecting spoofing attempts. However, since pre-trained models have complex architecture and involve large training times, there is a need for simple and efficient architectures with lower computational cost for face liveness detection. This paper introduces two novel deep CNN architectures that have fewer parameters, require less computational resources for execution, and achieve improved results. A comparative analysis with existing methods was conducted using the NUAA Imposter Database and the 3D MAD dataset on RGB and YCBCR color spaces. One proposed architecture achieved an impressive accuracy of 99.87% in detecting 3D face spoofing attacks, with a Half Total Error Rate (HTER) of just 0.19%, outperforming existing methods. The proposed CNN architectures exhibit promising outcomes in enhancing the generalization of attack detection systems with lower computational cost.
Keywords:
biometric security, Convolutional Neural Network (CNN), face spoofing, HTER, pre-trained architectureDownloads
References
S. Bhattacharjee and S. Marcel, "What You Can’t See Can Help You - Extended-Range Imaging for 3D-Mask Presentation Attack Detection," in 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, Sep. 2017, pp. 1–7.
Z. Boulkenafet, J. Komulainen, and A. Hadid, "Face Spoofing Detection Using Colour Texture Analysis," IEEE Transactions on Information Forensics and Security, vol. 11, no. 8, pp. 1818–1830, Dec. 2016.
A. B. S. Salamh and H. I. Akyüz, "A Novel Feature Extraction Descriptor for Face Recognition," Engineering, Technology & Applied Science Research, vol. 12, no. 1, pp. 8033–8038, Feb. 2022.
N. Erdogmus and S. Marcel, "Spoofing Face Recognition With 3D Masks," IEEE Transactions on Information Forensics and Security, vol. 9, no. 7, pp. 1084–1097, Jul. 2014.
T. Edmunds and A. Caplier, "Motion-based countermeasure against photo and video spoofing attacks in face recognition," Journal of Visual Communication and Image Representation, vol. 50, pp. 314–332, Jan. 2018.
A. Mahore and M. Tripathi, "Detection of 3D Mask in 2D Face Recognition System Using DWT and LBP," in 2018 IEEE 3rd International Conference on Communication and Information Systems (ICCIS), Singapore, Dec. 2018, pp. 18–22.
S. Hashemifard and M. Akbari, "A Compact Deep Learning Model for Face Spoofing Detection." arXiv, Jan. 12, 2021.
K. Balamurali, S. Chandru, M. S. Razvi, and V. Sathiesh Kumar, "Face Spoof Detection Using VGG-Face Architecture," Journal of Physics: Conference Series, vol. 1917, no. 1, Mar. 2021, Art. no. 012010.
V. P. Vishwakarma, R. Gupta, and A. K. Yadav, "A Novel Non-Iterative Deep Convolutional Neural Network with Kernelized Classification for Robust Face Recognition," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16460–16465, Oct. 2024.
M. Pei, B. Yan, H. Hao, and M. Zhao, "Person-Specific Face Spoofing Detection Based on a Siamese Network," Pattern Recognition, vol. 135, Mar. 2023, Art. no. 109148.
S. M. Ibrahim, M. S. Ibrahim, S. Khan, Y. W. Ko, and J. G. Lee, "Improving Face Presentation Attack Detection Through Deformable Convolution and Transfer Learning," IEEE Access, vol. 13, pp. 31228–31238, 2025.
A. George, Z. Mostaani, D. Geissenbuhler, O. Nikisins, A. Anjos, and S. Marcel, "Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 42–55, 2020.
H. Chen, G. Hu, Z. Lei, Y. Chen, N. M. Robertson, and S. Z. Li, "Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 578–593, 2020.
F. M. Chen, C. Wen, K. Xie, F. Q. Wen, G. Q. Sheng, and X. G. Tang, "Face liveness detection: fusing colour texture feature and deep feature," IET Biometrics, vol. 8, no. 6, pp. 369–377, 2019.
N. Erdogmus and S. Marcel, "Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect," in 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), Arlington, VA, USA, Sep. 2013, pp. 1–6.
N. Erdoğmuş and S. Marcel, "3D Mask Attack Dataset (3DMAD)." Zenodo, Apr. 23, 2013, [Online]. Available: https://zenodo.org/records/4068477.
X. Tan, Y. Li, J. Liu, and L. Jiang, "Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model," in Computer Vision – ECCV 2010, 2010, pp. 504–517.
"NUAA Imposter Database." [Online]. Available: https://parnec.nuaa.edu.cn/_upload/tpl/02/db/731/template731/pages/xtan/NUAAImposterDB_download.html.
P. Jaswanth, P. Y. Chowdary, and M. V. S. Ramprasad, "Deep learning based intelligent system for robust face spoofing detection using texture feature measurement," Measurement: Sensors, vol. 29, Oct. 2023, Art. no. 100868, https://doi.org/10.1016/j.measen.2023.100868.
D. Menotti et al., "Deep Representations for Iris, Face, and Fingerprint Spoofing Detection," IEEE Transactions on Information Forensics and Security, vol. 10, no. 4, pp. 864–879, Apr. 2015.
P. K. Das, B. Hu, C. Liu, K. Cui, P. Ranjan, and G. Xiong, "A New Approach for Face Anti-Spoofing Using Handcrafted and Deep Network Features," in 2019 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Zhengzhou, China, Nov. 2019, pp. 33–38.
F. Abdullakutty, E. Elyan, P. Johnston, and A. Ali-Gombe, "Deep Transfer Learning on the Aggregated Dataset for Face Presentation Attack Detection," Cognitive Computation, vol. 14, no. 6, pp. 2223–2233, Nov. 2022.
S. D. Thepade, M. Dindorkar, P. Chaudhari, and S. Bang, "Face presentation attack identification optimization with adjusting convolution blocks in VGG networks," Intelligent Systems with Applications, vol. 16, Nov. 2022, Art. no. 200107.
R. Sun, X. Yu, H. Feng, F. Wang, and X. Zhang, "Motion-robust mask face presentation attack detection via dual-stream texture-rPPG network," The Visual Computer, vol. 41, no. 7, pp. 4517–4532, May 2025.
S. Q. Liu, X. Lan, and P. C. Yuen, "Learning Temporal Similarity of Remote Photoplethysmography for Fast 3D Mask Face Presentation Attack Detection," IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3195–3210, 2022.
O. Lucena, A. Junior, V. Moia, R. Souza, E. Valle, and R. Lotufo, "Transfer Learning Using Convolutional Neural Networks for Face Anti-spoofing," in Image Analysis and Recognition, vol. 10317, F. Karray, A. Campilho, and F. Cheriet, Eds. Springer International Publishing, 2017, pp. 27–34.
Downloads
How to Cite
License
Copyright (c) 2025 Swapnil R. Shinde, Anupkumar M. Bongale, Deepak Dharrao, Dipti Jadhav, Nilesh Yadav

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.