Attribution-NoDerivs 4.0 (CC BY-ND 4.0)https://creativecommons.org/licenses/by-nd/4.0/
License information was derived automatically
Face Anti Spoofing Dataset - 98 000+ files
Dataset features 98,000+ files of real photos and videos of people from 170+ countries, representing 70,000+ unique individuals. By leveraging this dataset, developers can enhance spoofing detection techniques, improve recognition systems, and deploy anti-spoofing algorithms capable of preventing fraud in deep learning-based solutions.- Get the data
Dataset characteristics:
Characteristic Data
Description
Live⦠See the full description on the dataset page: https://huggingface.co/datasets/ud-biometrics/Anti-Spoofing-Real-Videos.
Attribution-NonCommercial-NoDerivs 4.0 (CC BY-NC-ND 4.0)https://creativecommons.org/licenses/by-nc-nd/4.0/
License information was derived automatically
The biometric attack dataset is created for video classification of real videos and replay attacks on these videos. Replay attack involves presenting a pre-recorded video or previously captured footage as if it were occurring in real-time. The primary objective is to distinguish between genuine, real-time footage and manipulated recordings.
The videos were gathered by capturing faces of genuine individuals presenting spoofs, using facial presentations. Our dataset proposes a novel approach that learns and detects spoofing techniques, extracting features from the genuine facial images to prevent the capturing of such information by fake users.
The dataset contains images and videos of real humans with various resolutions, views, and colors, making it a comprehensive resource for researchers working on anti-spoofing technologies.
https://www.googleapis.com/download/storage/v1/b/kaggle-user-content/o/inbox%2F12421376%2F98ee9f9f7de3bc0abfee003525eee0cc%2FFrame%2040.png?generation=1698694139067531&alt=media" alt="">
The dataset provides data to combine and apply different techniques, approaches, and models to address the challenging task of distinguishing between genuine and spoofed inputs, providing effective anti-spoofing solutions in active authentication systems. These solutions are crucial as newer devices, such as phones, have become vulnerable to spoofing attacks due to the availability of technologies that can create replays, reflections, and depths, making them susceptible to spoofing and generalization.
Our dataset also explores the use of neural architectures, such as deep neural networks, to facilitate the identification of distinguishing patterns and textures in different regions of the face, increasing the accuracy and generalizability of the anti-spoofing models.
The dataset is split into train and test folders, each folder includes: - real_video - real videos of the people, - attack - real videos played on a phone and filmed on the other phone (replay attack)
*keywords: liveness detection systems, liveness detection dataset, biometric dataset, biometric data dataset, biometric system attacks, anti-spoofing datas...
Real photos and videos of people for anti-spoofing. The dataset can be used to distinguish real users from scammers
Attribution-NonCommercial-NoDerivs 4.0 (CC BY-NC-ND 4.0)https://creativecommons.org/licenses/by-nc-nd/4.0/
License information was derived automatically
The dataset consists of 98,000 videos and selfies from 170 countries, providing a foundation for developing robust security systems and facial recognition algorithms.
While the dataset itself doesn't contain spoofing attacks, it's a valuable resource for testing liveness detection system, allowing researchers to simulate attacks and evaluate how effectively their systems can distinguish between real faces and various forms of spoofing.
By utilizing this dataset, researchers can contribute to the development of advanced security solutions, enabling the safe and reliable use of biometric technologies for authentication and verification. - Get the data
https://www.googleapis.com/download/storage/v1/b/kaggle-user-content/o/inbox%2F22059654%2Fe46e401a5449bacce5f934aaea9bb06e%2FFrame%20155.png?generation=1730591437955112&alt=media" alt="">
The dataset offers a high-quality collection of videos and photos, including selfies taken with a range of popular smartphones, like iPhone, Xiaomi, Samsung, and more. The videos showcase individuals turning their heads in various directions, providing a natural range of movements for liveness detection training.
https://www.googleapis.com/download/storage/v1/b/kaggle-user-content/o/inbox%2F22059654%2F8350718e93ee92840995405815739c61%2FFrame%20136%20(1).png?generation=1730591760432249&alt=media" alt="">
Furthermore, the dataset provides detailed metadata for each set, including information like gender, age, ethnicity, video resolution, duration, and frames per second. This rich metadata provides crucial context for analysis and model development.
Researchers can develop more accurate liveness detection algorithms, which is crucial for achieving the iBeta Level 2 certification, a benchmark for robust and reliable biometric systems that prevent fraud.
Live Face Anti-Spoof Dataset
A live face dataset is crucial for advancing computer vision tasks such as face detection, anti-spoofing detection, and face recognition. The Live Face Anti-Spoof Dataset offered by Ainnotate is specifically designed to train algorithms for anti-spoofing purposes, ensuring that AI systems can accurately differentiate between real and fake faces in various scenarios.
Key Features:
Comprehensive Video Collection: The dataset features thousands of videos showcasing a diverse range of individuals, including males and females, with and without glasses. It also includes men with beards, mustaches, and clean-shaven faces. Lighting Conditions: Videos are captured in both indoor and outdoor environments, ensuring that the data covers a wide range of lighting conditions, making it highly applicable for real-world use. Data Collection Method: Our datasets are gathered through a community-driven approach, leveraging our extensive network of over 700k users across various Telegram apps. This method ensures that the data is not only diverse but also ethically sourced with full consent from participants, providing reliable and real-world applicable data for training AI models. Versatility: This dataset is ideal for training models in face detection, anti-spoofing, and face recognition tasks, offering robust support for these essential computer vision applications. In addition to the Live Face Anti-Spoof Dataset, FileMarket provides specialized datasets across various categories to support a wide range of AI and machine learning projects:
Object Detection Data: Perfect for training AI in image and video analysis. Machine Learning (ML) Data: Offers a broad spectrum of applications, from predictive analytics to natural language processing (NLP). Large Language Model (LLM) Data: Designed to support text generation, chatbots, and machine translation models. Deep Learning (DL) Data: Essential for developing complex neural networks and deep learning models. Biometric Data: Includes diverse datasets for facial recognition, fingerprint analysis, and other biometric applications. This live face dataset, alongside our other specialized data categories, empowers your AI projects by providing high-quality, diverse, and comprehensive datasets. Whether your focus is on anti-spoofing detection, face recognition, or other biometric and machine learning tasks, our data offerings are tailored to meet your specific needs.
Liveness Detection Video Dataset with videos and images of people for training anti-spoofing and biometric authentication
Replay-Attack is a dataset for face recognition and presentation attack detection (anti-spoofing). The dataset consists of 1300 video clips of photo and video presentation attack (spoofing attacks) to 50 clients, under different lighting conditions.
Spoofing Attacks Description
The 2D face spoofing attack database consists of 1,300 video clips of photo and video attack attempts of 50 clients, under different lighting conditions.
The data is split into 4 sub-groups comprising:
Training data ("train"), to be used for training your anti-spoof classifier;
Development data ("devel"), to be used for threshold estimation;
Test data ("test"), with which to report error figures;
Enrollment data ("enroll"), that can be used to verify spoofing sensitivity on face detection algorithms.
Clients that appear in one of the data sets (train, devel or test) do not appear in any other set.
Database Description
All videos are generated by either having a (real) client trying to access a laptop through a built-in webcam or by displaying a photo or a video recording of the same client for at least 9 seconds. The webcam produces colour videos with a resolution of 320 pixels (width) by 240 pixels (height). The movies were recorded on a Macbook laptop using the QuickTime framework (codec: Motion JPEG) and saved into ".mov" files. The frame rate is about 25 Hz. Besides the native support on Apple computers, these files are easily readable using mplayer, ffmpeg or any other video utilities available under Linux or MS Windows systems.
Real client accesses as well as data collected for the attacks are taken under two different lighting conditions:
To produce the attacks, high-resolution photos and videos from each client were taken under the same conditions as in their authentication sessions, using a Canon PowerShot SX150 IS camera, which records both 12.1 Mpixel photographs and 720p high-definition video clips. The way to perform the attacks can be divided into two subsets: the first subset is composed of videos generated using a stand to hold the client biometry ("fixed"). For the second set, the attacker holds the device used for the attack with their own hands. In total, 20 attack videos were registered for each client, 10 for each of the attacking modes just described:
4 x mobile attacks using an iPhone 3GS screen (with resolution 480x320 pixels) displaying:
1 x mobile photo/controlled
1 x mobile photo/adverse
1 x mobile video/controlled
1 x mobile video/adverse
4 x high-resolution screen attacks using an iPad (first generation, with a screen resolution of 1024x768 pixels) displaying:
1 x high-resolution photo/controlled
1 x high-resolution photo/adverse
1 x high-resolution video/controlled
1 x high-resolution video/adverse
2 x hard-copy print attacks (produced on a Triumph-Adler DCC 2520 color laser printer) occupying the whole available printing surface on A4 paper for the following samples:
1 x high-resolution print of photo/controlled
1 x high-resolution print of photo/adverse
The 1300 real-accesses and attacks videos were then divided in the following way:
Training set: contains 60 real-accesses and 300 attacks under different lighting conditions;
Development set: contains 60 real-accesses and 300 attacks under different lighting conditions;
Test set: contains 80 real-accesses and 400 attacks under different lighting conditions;
Face Locations
We also provide face locations automatically annotated by a cascade of classifiers based on a variant of Local Binary Patterns (LBP) referred as Modified Census Transform (MCT) [Face Detection with the Modified Census Transform, Froba, B. and Ernst, A., 2004, IEEE International Conference on Automatic Face and Gesture Recognition, pp. 91-96]. The automatic face localisation procedure works in more than 99% of the total number of frames acquired. This means that less than 1% of the total set of frames for all videos do not possess annotated faces. User algorithms must account for this fact.
Protocol for Licit Biometric Transactions
It is possible to measure the performance of baseline face recognition systems on the 2D Face spoofing database and evaluate how well the attacks pass such systems or how, otherwise robust they are to attacks. Here we describe how to use the available data at the enrolment set to create a background model, client models and how to perform scoring using the available data.
Universal Background Model (UBM): To generate the UBM, subselect the training-set client videos from the enrollment videos. There should be 2 per client, which means you get 30 videos, each with 375 frames to create the model;
Client models: To generate client models, use the enrollment data for clients at the development and test groups. There should be 2 videos per client (one for each light condition) once more. At the end of the enrollment procedure, the development set must have 1 model for each of the 15 clients available in that set. Similarly, for the test set, 1 model for each of the 20 clients available;
For a simple baseline verification, generate scores exhaustively for all videos from the development and test real-accesses respectively, but without intermixing accross development and test sets. The scores generated against matched client videos and models (within the subset, i.e. development or test) should be considered true client accesses, while all others impostors;
If you are looking for a single number to report on the performance do the following: exclusively using the scores from the development set, tune your baseline face recognition system on the EER of the development set and use this threshold to find the HTER on the test set scores.
Protocols for Spoofing Attacks
Attack protocols are used to evaluate the (binary classification) performance of counter-measures to spoof attacks. The database can be split into 6 different protocols according to the type of device used to generate the attack: print, mobile (phone), high-definition (tablet), photo, video or grand test (all types). Furthermore, subsetting can be achieved on the top of the previous 6 groups by classifying attacks as performed by the attacker bare hands or using a fixed support. This classification scheme makes-up a total of 18 protocols that can be used for studying the performance of counter-measures to 2D face spoofing attacks. The table bellow details the amount of video clips in each protocol.
Acknowledgements
If you use this database, please cite the following publication:
I. Chingovska, A. Anjos, S. Marcel,"On the Effectiveness of Local Binary Patterns in Face Anti-spoofing"; IEEE BIOSIG, 2012. https://ieeexplore.ieee.org/document/6313548 http://publications.idiap.ch/index.php/publications/show/2447
Attribution-NonCommercial-NoDerivs 4.0 (CC BY-NC-ND 4.0)https://creativecommons.org/licenses/by-nc-nd/4.0/
License information was derived automatically
Biometric Attack Dataset, Black People
The similar dataset that includes all ethnicities - Anti Spoofing Real Dataset
The dataset for face anti spoofing and face recognition includes images and videos of black people. The dataset helps in enchancing the performance of the model by providing wider range of data for a specific ethnic group. The videos were gathered by capturing faces of genuine individuals presenting spoofs, using facial presentations. Our dataset proposes⦠See the full description on the dataset page: https://huggingface.co/datasets/UniqueData/black-people-liveness-detection-video-dataset.
Attribution-NonCommercial-NoDerivs 4.0 (CC BY-NC-ND 4.0)https://creativecommons.org/licenses/by-nc-nd/4.0/
License information was derived automatically
Anti Spoofing Real - Liveness Detection dataset
The Biometric Attack dataset consists of 98,000 videos and selfies from people from 170 countries. The videos were gathered by capturing faces of genuine individuals presenting spoofs, using facial presentations. Our dataset proposes a novel approach that learns and detects spoofing techniques, extracting features from the genuine facial images to prevent the capturing of such information by fake users. The dataset contains images and⦠See the full description on the dataset page: https://huggingface.co/datasets/UniqueData/anti-spoofing_Real.
Population distribution : race distribution: Asians, Caucasians, black people; gender distribution: gender balance; age distribution: from child to the elderly, the young people and the middle aged are the majorities
Collection environment : indoor scenes, outdoor scenes
Collection diversity : various postures, expressions, light condition, scenes, time periods and distances
Collection device : iPhone, android phone, iPad
Collection time : daytime,night
Image Parameter : the video format is .mov or .mp4, the image format is .jpg
Accuracy : the accuracy of actions exceeds 97%
Attribution-NonCommercial-NoDerivs 4.0 (CC BY-NC-ND 4.0)https://creativecommons.org/licenses/by-nc-nd/4.0/
License information was derived automatically
The dataset consists of more than 42,000 video attacks of 7 different types specifically curated for evaluating liveness detection algorithms. The dataset aims to incorporate different scenarios and challenges to enable robust assessment and comparison of liveness detection systems.
The iBeta Liveness Detection Level 1 dataset serves as a benchmark for the development and assessment of liveness detection systems and for evaluating and improving the performance of algorithms.
https://www.googleapis.com/download/storage/v1/b/kaggle-user-content/o/inbox%2F12421376%2F72c514066335ed6b6d1d273d1c4198ef%2FMASK_TYPES.png?generation=1678913343424357&alt=media" alt="">
Each attack was filmed on an Apple iPhone and Google Pixel. The videos were filmed on various backgrounds and using additional accessories such as faked facial hair, scarves, hats, and others.
The dataset comprises videos of genuine facial presentations using various methods, including 3D masks and photos, as well as real and spoof faces. It proposes a novel approach that learns and extracts facial features to prevent spoofing attacks, based on deep neural networks and advanced biometric techniques.
Our results show that this technology works effectively in securing most applications and prevents unauthorized access by distinguishing between genuine and spoofed inputs. Additionally, it addresses the challenging task of identifying unseen spoofing cues, making it one of the most effective techniques in the field of anti-spoofing research.
keywords: ibeta level 1, ibeta level 2, liveness detection systems, liveness detection dataset, biometric dataset, biometric data dataset, replay attack dataset, biometric system attacks, anti-spoofing dataset, face liveness detection, deep learning dataset, face spoofing database, face anti-spoofing, presentation attack detection, presentation attack dataset, 2D print attacks, 3D print attacks, phone attack dataset, face anti spoofing, large-scale face anti spoofing, rich annotations anti spoofing dataset, cut prints spoof attack
Attribution-NonCommercial-NoDerivs 4.0 (CC BY-NC-ND 4.0)https://creativecommons.org/licenses/by-nc-nd/4.0/
License information was derived automatically
The dataset consists of waist-high selfies and video of real people. The dataset solves tasks in the field of anti-spoofing and it is useful for buisness and safety systems.
Off-the-shelf face anti-spoofing data covers 2D/3D liveness detection, infrared face, gait recognition and re-id. All the anti-spoofing data is collected with consent and has obtained Level 2 iBeta certificate.
Attribution-NonCommercial 4.0 (CC BY-NC 4.0)https://creativecommons.org/licenses/by-nc/4.0/
License information was derived automatically
This dataset delivers a single, end-to-end resource for training and benchmarking facial liveness-detection systems. By aggregating live sessions and eleven realistic presentation-attack classes into one collection, it accelerates development toward iBeta Level 1/2 compliance and strengthens model robustness against the full spectrum of spoofing tactics
https://www.googleapis.com/download/storage/v1/b/kaggle-user-content/o/inbox%2F20109613%2F6432e95d7b7fef1d271457f172e11e0c%2FFrame%20103-3.png?generation=1753867895186569&alt=media" alt="">
Modern certification pipelines demand proof that a system resists all common attack vectorsānot just prints or replays. This dataset delivers those vectors in one place, allowing you to: - Benchmark a modelās true generalisation - Fine-tune against rare but high-impact threats (e.g., silicone or textile masks) - Streamline audits by demonstrating coverage of every ISO 30107-3 attack category
Ideal for companies pursuing or maintaining iBeta Level 1/2 certification, research groups exploring new PAD architectures, and vendors stress-testing production face-verification pipelines
This datasetās scale, breadth of attack types, and real-world capture conditions make it indispensable for anyone building or evaluating biometric anti-spoofing solutions. Deploy it to harden your systems against todayāsāand tomorrowāsāmost sophisticated presentation attacks
Attribution-NonCommercial-NoDerivs 4.0 (CC BY-NC-ND 4.0)https://creativecommons.org/licenses/by-nc-nd/4.0/
License information was derived automatically
Biometric Attack Dataset, Hispanic People
The similar dataset that includes all ethnicities - Anti Spoofing Real Dataset
The dataset for face anti spoofing and face recognition includes images and videos of hispanic people. 32,600+ photos & video of 16,300 people from 20 countries. The dataset helps in enchancing the performance of the model by providing wider range of data for a specific ethnic group. The videos were gathered by capturing faces of genuine individuals⦠See the full description on the dataset page: https://huggingface.co/datasets/UniqueData/hispanic-people-liveness-detection-video-dataset.
Replay-Mobile is a dataset for face recognition and presentation attack detection (anti-spoofing). The dataset consists of 1190 video clips of photo and video presentation attacks (spoofing attacks) to 40 clients, under different lighting conditions. These videos were recorded with an iPad Mini2 (running iOS) and a LG-G4 smartphone (running Android).
Database Description
All videos have been captured using the front-camera of the mobile device (tablet or phone). The front-camera produces colour videos with a resolution of 720 pixels (width) by 1280 pixels (height) and saved in ".mov" file-format. The frame rate is about 25 Hz. Real-accesses have been performed by the genuine user (presenting one's true face to the device). Attack-accesses have been performed by displaying a photo or a video recording of the attacked client, for at least 10 seconds.
Real client accesses have been recorded under five different lighting conditions (controlled, adverse, direct, lateral and diffuse). In addition, to produce the attacks, high-resolution photos and videos from each client were taken under conditions similar to those in their authentication sessions (lighton, lightoff).
The 1190 real-accesses and attacks videos were then grouped in the following way:
Training set: contains 120 real-accesses and 192 attacks under different lighting conditions;
Development set: contains 160 real-accesses and 256 attacks under different lighting conditions;
Test set: contains 110 real-accesses and 192 attacks under different lighting conditions;
Enrollment set: contains 160 real-accesses under different lighting conditions, to be used exclusively for studying the baseline performance of face recognition systems. (This set is again partitioned into 'Training', 'Development' and 'Test' sets.)
Attacks
For photos attacks a Nikon coolix P520 camera, which records 18Mpixel photographs, has been used. Video attacks were captured using the back-camera of a smartphone LG-G4, which records 1080p FHD video clips using its 16 Mpixel camera.
Attacks have been performed in two ways:
A matte-screen was used to perform the attacks (i.e., to display the digital photo or video of the attacked identity). For all such (matte-screen) attacks, a stand was used to hold capturing devices.
Print attacks. For "fixed" attacks, both capturing devices were supported on a stand (as for matte-screen attacks). For "hand" attacks, the spoofer held the capturing device in his/her own hands while the spoof-resource (printed photo) was stationary.
In total, 16 attack videos were registered for each client, 8 for each of the attacking modes described above.
4 x mobile attacks using an Philips 227ELH screen (with resolution 1920x1080 pixels)
4 x tablet attacks using an Philips 227ELH screen (with resolution 1920x1080 pixels)
2 x mobile attacks using hard-copy print attacks fixed (produced on a Konica Minolta ineo+ 224e color laser printer) occupying the whole available printing surface on A4 paper
2 x mobile attacks using hard-copy print attacks fixed (produced on a Konica Minolta ineo+ 224e color laser printer) occupying the whole available printing surface on A4 paper
2 x mobile attacks using hard-copy print attacks hand (produced on a Konica Minolta ineo+ 224e color laser printer) occupying the whole available printing surface on A4 paper
2 x mobile attacks using hard-copy print attacks hand (produced on a Konica Minolta ineo+ 224e color laser printer) occupying the whole available printing surface on A4 paper
Reference
If you use this database, please cite the following publication:
Artur Costa-Pazo, Sushil Bhattacharjee, Esteban Vazquez-Fernandez and SƩbastien Marcel,"The REPLAY-MOBILE Face Presentation-Attack Database", IEEE BIOSIG 2016. 10.1109/BIOSIG.2016.7736936 http://publications.idiap.ch/index.php/publications/show/3477
Attribution-NonCommercial-NoDerivs 4.0 (CC BY-NC-ND 4.0)https://creativecommons.org/licenses/by-nc-nd/4.0/
License information was derived automatically
Biometric Attack Dataset, Asian People
The similar dataset that includes all ethnicities - Anti Spoofing Real Dataset
The dataset for face anti spoofing and face recognition includes images and videos of asian people. 30,600+ photos & video of 15,300 people from 32 countries. All people presented in the dataset are South Asian, East Asian or Middle Asian. The dataset helps in enchancing the performance of the model by providing wider range of data for a specific ethnic⦠See the full description on the dataset page: https://huggingface.co/datasets/UniqueData/asian-people-liveness-detection-video-dataset.
Dataset with phone and webcam videos for anti-spoofing, biometric verification, facial recognition, and access control security
Attribution-NonCommercial 4.0 (CC BY-NC 4.0)https://creativecommons.org/licenses/by-nc/4.0/
License information was derived automatically
Liveness Detection Dataset: iBeta level 2 advanced mask attacks (5 K videos)
Anti-Spoofing Paper Attacks iBeta 2 - 5,000 videos 4 different attack types, advanced paper attacks for Liveness Detection
Full version of dataset is availible for commercial usage - leave a request on our website Axonlabs to purchase the dataset š°
Types of Presentation Attacks (paper masks)
Attribution-NonCommercial-NoDerivs 4.0 (CC BY-NC-ND 4.0)https://creativecommons.org/licenses/by-nc-nd/4.0/
License information was derived automatically
Biometric Attack Dataset, Caucasian People
The similar dataset that includes all ethnicities - Anti Spoofing Real Dataset
The dataset for face anti spoofing and face recognition includes images and videos of Ńaucasian people. The dataset helps in enchancing the performance of the model by providing wider range of data for a specific ethnic group. The videos were gathered by capturing faces of genuine individuals presenting spoofs, using facial presentations. Our dataset⦠See the full description on the dataset page: https://huggingface.co/datasets/UniqueData/caucasian-people-liveness-detection-dataset.
Attribution-NoDerivs 4.0 (CC BY-ND 4.0)https://creativecommons.org/licenses/by-nd/4.0/
License information was derived automatically
Face Anti Spoofing Dataset - 98 000+ files
Dataset features 98,000+ files of real photos and videos of people from 170+ countries, representing 70,000+ unique individuals. By leveraging this dataset, developers can enhance spoofing detection techniques, improve recognition systems, and deploy anti-spoofing algorithms capable of preventing fraud in deep learning-based solutions.- Get the data
Dataset characteristics:
Characteristic Data
Description
Live⦠See the full description on the dataset page: https://huggingface.co/datasets/ud-biometrics/Anti-Spoofing-Real-Videos.