{"id":"https://openalex.org/W4401691684","doi":"https://doi.org/10.1109/tdsc.2024.3445570","title":"Multi-Modal Spoofing Attacks on 3D Face Liveness Detection via a Single 2D Photo","display_name":"Multi-Modal Spoofing Attacks on 3D Face Liveness Detection via a Single 2D Photo","publication_year":2024,"publication_date":"2024-08-19","ids":{"openalex":"https://openalex.org/W4401691684","doi":"https://doi.org/10.1109/tdsc.2024.3445570"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3445570","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3445570","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074339847","display_name":"Zhihao Wu","orcid":"https://orcid.org/0009-0007-1009-5583"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhihao Wu","raw_affiliation_strings":["Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063893376","display_name":"Yushi Cheng","orcid":"https://orcid.org/0000-0002-0888-2322"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yushi Cheng","raw_affiliation_strings":["Ubiquitous System Security Lab (USSLAB), ZJU-UIUC Institute, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ubiquitous System Security Lab (USSLAB), ZJU-UIUC Institute, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017116027","display_name":"Xiaoyu Ji","orcid":"https://orcid.org/0000-0002-1101-0007"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyu Ji","raw_affiliation_strings":["Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060351020","display_name":"Wenyuan Xu","orcid":"https://orcid.org/0000-0002-5043-9148"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyuan Xu","raw_affiliation_strings":["Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5074339847"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.3422,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53396566,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"22","issue":"2","first_page":"1551","last_page":"1566"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.8620473146438599},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7559816241264343},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7247036099433899},{"id":"https://openalex.org/keywords/modal","display_name":"Modal","score":0.5537400245666504},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.5192844271659851},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.43154746294021606},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4282303750514984},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4113847315311432},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3852822780609131},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.2635277807712555},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.11167886853218079}],"concepts":[{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.8620473146438599},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7559816241264343},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7247036099433899},{"id":"https://openalex.org/C71139939","wikidata":"https://www.wikidata.org/wiki/Q910194","display_name":"Modal","level":2,"score":0.5537400245666504},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.5192844271659851},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.43154746294021606},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4282303750514984},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4113847315311432},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3852822780609131},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2635277807712555},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.11167886853218079},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C188027245","wikidata":"https://www.wikidata.org/wiki/Q750446","display_name":"Polymer chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3445570","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3445570","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2461859056","display_name":null,"funder_award_id":"62071428","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2509534683","display_name":null,"funder_award_id":"62222114","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4914349744","display_name":null,"funder_award_id":"62271280","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W119805225","https://openalex.org/W1770095230","https://openalex.org/W1901129140","https://openalex.org/W1979339361","https://openalex.org/W2062399388","https://openalex.org/W2073942619","https://openalex.org/W2095252718","https://openalex.org/W2096733369","https://openalex.org/W2102605133","https://openalex.org/W2109741874","https://openalex.org/W2125320497","https://openalex.org/W2131338307","https://openalex.org/W2133131023","https://openalex.org/W2165646023","https://openalex.org/W2174309130","https://openalex.org/W2194775991","https://openalex.org/W2341528187","https://openalex.org/W2418633638","https://openalex.org/W2535873859","https://openalex.org/W2551249768","https://openalex.org/W2611033519","https://openalex.org/W2782847759","https://openalex.org/W2887396754","https://openalex.org/W2903298537","https://openalex.org/W2959364614","https://openalex.org/W2963384482","https://openalex.org/W2964014798","https://openalex.org/W2969664989","https://openalex.org/W2971810730","https://openalex.org/W2972986629","https://openalex.org/W2973021304","https://openalex.org/W2982317202","https://openalex.org/W3015646845","https://openalex.org/W3034455297","https://openalex.org/W3034823537","https://openalex.org/W3035240864","https://openalex.org/W3080290137","https://openalex.org/W3104733252","https://openalex.org/W3107235539","https://openalex.org/W3110620523","https://openalex.org/W3157352951","https://openalex.org/W3175196926","https://openalex.org/W3183943918","https://openalex.org/W4213360524","https://openalex.org/W4282936640","https://openalex.org/W4320729489","https://openalex.org/W4327652423","https://openalex.org/W4384948616","https://openalex.org/W6637339757","https://openalex.org/W6677618333","https://openalex.org/W6747819456","https://openalex.org/W6749162425","https://openalex.org/W6759580348","https://openalex.org/W6780439892","https://openalex.org/W6793874848","https://openalex.org/W6801300740","https://openalex.org/W6803376173"],"related_works":["https://openalex.org/W2533239677","https://openalex.org/W2140593870","https://openalex.org/W4389545061","https://openalex.org/W3126377002","https://openalex.org/W2903861076","https://openalex.org/W2604576816","https://openalex.org/W4319078075","https://openalex.org/W2729608596","https://openalex.org/W2913345013","https://openalex.org/W2900020547"],"abstract_inverted_index":{"Face":[0],"authentication":[1,19,75,101,152,202],"technology":[2],"has":[3,21],"been":[4,22,36],"widely":[5],"used":[6],"in":[7,143,190,258],"physical":[8],"access":[9,217],"control":[10,218],"to":[11,38,55,145],"critical":[12],"infrastructures.":[13],"The":[14,220],"security":[15,52],"of":[16,50,119,158,181,237,243,249,256],"a":[17,47,68,93,104,133,156],"face":[18,74,100,122,140,182,201],"system":[20],"threatened":[23],"by":[24],"photo":[25,149],"replay":[26],"attacks":[27],"and":[28,66,84,184,212,214,251],"thus":[29],"the":[30,51,88,116,120,139,147,259],"3D":[31,56,73,99,151],"liveness":[32,57],"detection":[33,58],"techniques":[34,170],"have":[35],"deployed":[37],"safeguard":[39],"such":[40,80],"systems.":[41],"In":[42],"this":[43],"paper,":[44],"we":[45],"conduct":[46],"comprehensive":[48],"analysis":[49],"aspects":[53],"pertaining":[54],"systems":[59,76,203],"that":[60,226],"employ":[61],"structured":[62,173],"light":[63],"depth":[64,117,141,163,167],"camera,":[65],"propose":[67,87],"novel":[69],"attack":[70,96,234,240,246,253],"surface":[71],"targeting":[72],"involving":[77],"multiple":[78],"modalities":[79,180],"as":[81],"Depth,":[82],"RGB":[83],"IR.":[85],"We":[86,154,193],"<monospace":[89,111,128,187,195,227],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[90,112,129,188,196,228],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">DepthFake</monospace>":[91,113,130,189,197,229],"attack,":[92],"multi-modal":[94],"spoofing":[95],"against":[97],"real-world":[98],"using":[102],"only":[103],"single":[105],"2D":[106,125,148],"photo.":[107,126],"To":[108],"achieve":[109],"it,":[110],"first":[114],"reconstruct":[115],"information":[118],"victim's":[121],"from":[123],"his":[124],"Then,":[127],"actively":[131],"projects":[132],"carefully-crafted":[134],"scatter":[135],"patterns":[136],"embedded":[137],"with":[138,150],"information,":[142],"order":[144],"empower":[146],"properties.":[153],"address":[155],"range":[157],"practical":[159],"challenges,":[160],"including":[161],"mitigating":[162],"estimation":[164],"errors,":[165],"achieving":[166],"images":[168],"forgery":[169],"based":[171],"on":[172,198],"light,":[174],"ensuring":[175],"accurate":[176],"alignment":[177],"between":[178],"various":[179],"images,":[183],"effectively":[185],"implementing":[186],"real":[191,260],"world.":[192,261],"validated":[194],"5":[199],"commercial":[200,216],"(i.e.,":[204],"Tencent":[205],"Cloud,":[206,208],"Baidu":[207],"3DiVi,":[209],"Ali":[210],"Cloud":[211],"ArcSoft)":[213],"two":[215],"devices.":[219],"results":[221],"over":[222],"50":[223],"users":[224],"demonstrate":[225],"achieves":[230],"an":[231],"overall":[232],"Depth":[233],"success":[235,241,247,254],"rate":[236,242,248,255],"79.4%,":[238,250],"RGB-D":[239],"59.4%,":[244],"IR-D":[245],"RGB-IR":[252],"83.8%":[257]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
