ing and validation sets, whereas the samples gener-
ated using all the frames increased the similarity. We
found high variability beneficial for unknown presen-
tation attack detection and high similarity beneficial
for unknown presentation attacks of the same kind.
We explored face anti-spoofing performance using
image-based and video-based classification methods.
We found the first few frames more effective for de-
tecting face spoofing attacks than using each frame
independently. The keyframe data augmentation ap-
proach using the first 15 frames achieved the top per-
formance for Spoof in the Wild protocols 2 and 3.
The SiW and CASIA-FASD results proved
keyframe data augmentation to be the most effective
approach. Furthermore, we suspect augmenting train-
ing sets with generated spoof images can make deep
learning models more robust against DeepFake at-
tacks. We will investigate this in future work, along
with more advanced GAN image generation tech-
niques.
ACKNOWLEDGEMENTS
The support and resources from the South African
Lengau cluster at the Centre for High-Performance
Computing (CHPC) are gratefully acknowledged.
REFERENCES
Ali, A., Deravi, F., and Hoque, S. (2013). Directional
sensitivity of gaze-collinearity features in liveness de-
tection. In 2013 Fourth International Conference on
Emerging Security Technologies, pages 8–11.
Bao, W., Li, H., Li, N., and Jiang, W. (2009). A liveness
detection method for face recognition based on optical
flow field. In 2009 International Conference on Image
Analysis and Signal Processing, pages 233–236.
Ben Mabrouk, A. and Zagrouba, E. (2018). Abnormal be-
havior recognition for intelligent video surveillance
systems: A review. Expert Systems with Applications,
91:480–491.
Bischoff, P. (2021). Facial recognition technology (frt): 100
countries analyzed - comparitech.
Boulkenafet, Z., Komulainen, J., and Hadid, A. (2016).
Face spoofing detection using colour texture analysis.
IEEE Transactions on Information Forensics and Se-
curity, 11(8):1818–1830.
Boulkenafet, Z., Komulainen, J., and Hadid, A. (2017).
Face antispoofing using speeded-up robust features
and fisher vector encoding. IEEE Signal Processing
Letters, 24(2):141–145.
Cao, Q., Shen, L., Xie, W., Parkhi, O. M., and Zisserman,
A. (2018). Vggface2: A dataset for recognising faces
across pose and age. In 2018 13th IEEE International
Conference on Automatic Face & Gesture Recognition
(FG 2018), pages 67–74.
Chen, H., Hu, G., Lei, Z., Chen, Y., Robertson, N. M., and
Li, S. Z. (2020). Attention-based two-stream convo-
lutional networks for face spoofing detection. IEEE
Transactions on Information Forensics and Security,
15:578–593.
Daniel, N. and Anitha, A. (2018). A study on recent trends
in face spoofing detection techniques. In 2018 3rd
International Conference on Inventive Computation
Technologies (ICICT), pages 583–586.
George, A. and Marcel, S. (2021). On the effectiveness of
vision transformers for zero-shot face anti-spoofing.
In 2021 IEEE International Joint Conference on Bio-
metrics (IJCB), pages 1–8.
Han, K., Wang, Y., Chen, H., Chen, X., Guo, J., Liu, Z.,
Tang, Y., Xiao, A., Xu, C., Xu, Y., Yang, Z., Zhang, Y.,
and Tao, D. (2022). A survey on vision transformer.
IEEE Transactions on Pattern Analysis and Machine
Intelligence, pages 1–1.
Hernandez-Ortega, J., Fierrez, J., Morales, A., and Galbally,
J. (2021). Introduction to presentation attack detection
in face biometrics and recent advances.
Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., and
Hochreiter, S. (2017). Gans trained by a two time-
scale update rule converge to a local nash equilibrium.
ISO/IEC (2017). International Organization for Standard-
ization. Information technology - Biometric presenta-
tion attack detection - Part 3: Testing and reporting.
Technical Report ISO/IEC FDIS 30107-3:2017(E),
Geneva, CH.
Jain, A. K., Flynn, P., and Ross, A. A. (2007). Handbook of
biometrics. Springer Science & Business Media.
Johnson, J., Douze, M., and J
´
egou, H. (2019). Billion-scale
similarity search with GPUs. IEEE Transactions on
Big Data, 7(3):535–547.
Karras, T., Aittala, M., Hellsten, J., Laine, S., Lehtinen, J.,
and Aila, T. (2020). Training generative adversarial
networks with limited data. In Proc. NeurIPS.
Karras, T., Aittala, M., Laine, S., H
¨
ark
¨
onen, E., Hellsten, J.,
Lehtinen, J., and Aila, T. (2021). Alias-free generative
adversarial networks. In Proc. NeurIPS.
Kingma, D. P. and Ba, J. (2014). Adam: A method for
stochastic optimization.
Kolesnikov, A., Dosovitskiy, A., Weissenborn, D., Heigold,
G., Uszkoreit, J., Beyer, L., Minderer, M., Dehghani,
M., Houlsby, N., Gelly, S., Unterthiner, T., and Zhai,
X. (2021). An image is worth 16x16 words: Trans-
formers for image recognition at scale.
Krishnan, K. S. and Krishnan, K. S. (2021). Vision trans-
former based covid-19 detection using chest x-rays. In
2021 6th International Conference on Signal Process-
ing, Computing and Control (ISPCC), pages 644–648.
Li, J.-W. (2008). Eye blink detection based on multiple
gabor response waves. In 2008 International Con-
ference on Machine Learning and Cybernetics, vol-
ume 5, pages 2852–2856.
Li, L., Feng, X., Jiang, X., Xia, Z., and Hadid, A. (2017a).
Face anti-spoofing via deep local binary patterns. In
Keyframe and GAN-Based Data Augmentation for Face Anti-Spoofing
639