Deep Residual Learning for Face Anti-Spoofing: A Mathematical Framework for Optimized Skip Connections
Abstract
1. Introduction
2. Related Work
2.1. Traditional Anti-Spoofing Methods
2.2. Deep Learning Approaches
2.3. Datasets and Evaluation Protocols
2.4. Architecture Design Principles
- Kuznetsov et al. [13] conducted initial explorations of deep learning methods for face liveness detection, focusing on basic CNN architectures and their performance across different datasets. This work established fundamental deep learning approaches but employed standard architectures without specialized design considerations for anti-spoofing tasks.
- Kuznetsov et al. [12] performed a comprehensive cross-database evaluation for liveness detection, revealing critical generalization challenges when models trained on one dataset are tested on others. This study illuminated domain adaptation issues and highlighted the need for more robust architectural designs that could generalize across different attack scenarios and acquisition conditions.
- Kuznetsov et al. [11] introduced the initial AttackNet concept as a custom CNN architecture for biometric security, demonstrating the advantages of task-specific designs over general-purpose architectures. However, this preliminary work lacked a systematic exploration of architectural components and a mathematical formalization of design choices.
3. Methodology
3.1. Analysis and Preparation of Datasets
3.2. Evolution of Model Architecture
3.2.1. Baseline Architecture: LivenessNet
3.2.2. AttackNet v1: Enhanced Depth
3.2.3. AttackNet v2.1: Activation Function Optimization
3.2.4. AttackNet v2.2: Efficient Skip Connections
4. Experimental Setup
4.1. Hardware and Software Configuration
4.2. Dataset Configuration and Preprocessing
4.3. Model Architecture Implementation
4.4. Training Protocol and Hyperparameter Configuration
4.5. Evaluation Metrics and Statistical Analysis
4.6. Experimental Design and Validation Protocol
5. Results and Analysis
5.1. Dataset-Specific Performance Analysis
5.2. Comparing and Analyzing the Architecture
5.3. Computational Complexity
5.4. Training Dynamics and Convergence Analysis
5.5. Error Analysis and Failure Cases
5.6. Ablation Study Results
5.7. Cross-Dataset Evaluation and Generalization Analysis
- MSSpoof → Others: Models trained on MSSpoof showed poor generalization, with accuracy dropping to 43–66% on target datasets. AttackNetV1 achieved the best cross-dataset performance (66% accuracy on CSMAD), while simpler architectures performed better than complex variants in cross-domain scenarios.
- 3DMAD → Others: Models trained on 3DMAD demonstrated moderate generalization, achieving 48–74% accuracy across target datasets. Performance was highest when testing on CSMAD (74% for AttackNetV1), indicating some similarity between 3D-based attack patterns.
- CSMAD → Others: Training on CSMAD yielded the most consistent cross-dataset performance, with accuracy ranging from 48 to 70% across targets. This suggests that high-quality silicone mask features provide more generalizable representations.
- Replay-Attack → Others: Models trained on Replay-Attack showed variable generalization, performing best on 3DMAD (72% for AttackNetV1) but struggling with multispectral data (48–57% on MSSpoof).
6. Discussion
6.1. Key Findings
6.2. Comparison with State-of-the-Art
6.3. Analysis of Architecture Components
6.4. Computational Efficiency Analysis
6.5. Generalization Cap
6.6. Restrictions and Hindernisse
6.7. Future Development Directions
6.8. Practical Implications
6.9. Comprehensive Limitations Analysis
7. Conclusions
7.1. Significant Achievements
7.2. Theoretical Contributions
7.3. Practical Conclusions
7.4. Future Research Directions
7.5. Limits and Future Work
7.6. Conclusion Remarks
8. Patents
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Alrawili, R.; AlQahtani, A.A.S.; Khan, M.K. Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion. Comput. Electr. Eng. 2024, 119, 109485. [Google Scholar] [CrossRef]
- Coelho, K.K.; Tristão, E.T.; Nogueira, M.; Vieira, A.B.; Nacif, J.A.M. Multimodal Biometric Authentication Method by Federated Learning. Biomed. Signal. Proces. 2023, 85, 105022. [Google Scholar] [CrossRef]
- Ahmed, T.; Das, P.; Ali, M.F.; Mahmud, M.-F. A Comparative Study on Convolutional Neural Network Based Face Recognition. In Proceedings of the 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India, 1–3 July 2020; pp. 1–5. [Google Scholar]
- Algarni, A.D.; El Banby, G.; Ismail, S.; El-Shafai, W.; El-Samie, F.E.A.; F. Soliman, N. Discrete Transforms and Matrix Rotation Based Cancelable Face and Fingerprint Recognition for Biometric Security Applications. Entropy 2020, 22, 1361. [Google Scholar] [CrossRef] [PubMed]
- Lucia, C.; Zhiwei, G.; Michele, N. Biometrics for Industry 4.0: A Survey of Recent Applications. J. Amb. Intel. Hum. Comp. 2023, 14, 11239–11261. [Google Scholar] [CrossRef]
- Jia, S.; Guo, G.; Xu, Z. A Survey on 3D Mask Presentation Attack Detection and Countermeasures. Pattern. Recogn. 2020, 98, 107032. [Google Scholar] [CrossRef]
- Hernandez-Ortega, J.; Fierrez, J.; Morales, A.; Galbally, J. Introduction to Presentation Attack Detection in Face Biometrics and Recent Advances. In Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment; Marcel, S., Fierrez, J., Evans, N., Eds.; Advances in Computer Vision and Pattern Recognition; Springer Nature: Singapore, 2023; pp. 203–230. ISBN 978-981-19-5288-3. [Google Scholar]
- Chingovska, I.; Anjos, A.; Marcel, S. On the Effectiveness of Local Binary Patterns in Face Anti-Spoofing. In Proceedings of the 2012 BIOSIG—Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 6–7 September 2012; pp. 1–7. [Google Scholar]
- Arora, S.; Bhatia, M.P.S.; Mittal, V. A Robust Framework for Spoofing Detection in Faces Using Deep Learning. Visual. Comput. 2022, 38, 2461–2472. [Google Scholar] [CrossRef]
- George, A.; Marcel, S. Robust Face Presentation Attack Detection with Multi-Channel Neural Networks. In Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment; Marcel, S., Fierrez, J., Evans, N., Eds.; Advances in Computer Vision and Pattern Recognition; Springer Nature: Singapore, 2023; pp. 261–286. ISBN 978-981-19-5288-3. [Google Scholar]
- Kuznetsov, A.; Kvaratskheliia, D.; Maranesi, A.; Romeo, L.; Muscatello, A.; Rosati, R. Deep Learning Based Face Liveliness Detection. In Proceedings of the 2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T), Kharkiv, Ukraine, 11–13 October 2022; pp. 427–432. [Google Scholar]
- Kuznetsov, O.; Zakharov, D.; Frontoni, E.; Maranesi, A.; Bohucharskyi, S. Cross-Database Liveness Detection: Insights from Comparative Biometric Analysis. In Proceedings of the 2nd International Workshop on Social Communication and Information Activity in Digital Humanities (SCIA 2023), Lviv, Ukraine, 9 November 2023; Volume 3608, pp. 250–263. [Google Scholar]
- Kuznetsov, O.; Zakharov, D.; Frontoni, E.; Maranesi, A. AttackNet: Enhancing Biometric Security via Tailored Convolutional Neural Network Architectures for Liveness Detection. Comput. Secur. 2024, 141, 103828. [Google Scholar] [CrossRef]
- Erdogmus, N.; Marcel, S. Spoofing in 2D Face Recognition with 3D Masks and Anti-Spoofing with Kinect. In Proceedings of the 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), Arlington, VA, USA, 29 September–2 October 2013; pp. 1–6. [Google Scholar]
- Siddiqui, T.A.; Bharadwaj, S.; Dhamecha, T.I.; Agarwal, A.; Vatsa, M.; Singh, R.; Ratha, N. Face Anti-Spoofing with Multifeature Videolet Aggregation. In Proceedings of the 2016 23rd International Conference on Pattern Recognition (ICPR), Cancun, Mexico, 4–8 December 2016; pp. 1035–1040. [Google Scholar]
- Rattani, A.; Scheirer, W.J.; Ross, A. Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2447–2460. [Google Scholar] [CrossRef]
- Wen, D.; Han, H.; Jain, A.K. Face Spoof Detection With Image Distortion Analysis. IEEE Trans. Inf. Forensics Secur. 2015, 10, 746–761. [Google Scholar] [CrossRef]
- Patel, K.; Han, H.; Jain, A.K. Secure Face Unlock: Spoof Detection on Smartphones. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2268–2283. [Google Scholar] [CrossRef]
- Li, C.; Li, Z.; Sun, J.; Li, R. Middle-Shallow Feature Aggregation in Multimodality for Face Anti-Spoofing. Sci. Rep.-UK. 2023, 13, 9870. [Google Scholar] [CrossRef]
- Wang, G.; Wang, Z.; Jiang, K.; Huang, B.; He, Z.; Hu, R. Silicone Mask Face Anti-Spoofing Detection Based on Visual Saliency and Facial Motion. Neurocomputing. 2021, 458, 416–427. [Google Scholar] [CrossRef]
- Chingovska, I.; Erdogmus, N.; Anjos, A.; Marcel, S. Face Recognition Systems Under Spoofing Attacks. In Face Recognition Across the Imaging Spectrum; Bourlai, T., Ed.; Springer International Publishing: Cham, Switzerland, 2016; pp. 165–194. ISBN 978-3-319-28501-6. [Google Scholar]
- Steiner, H.; Kolb, A.; Jung, N. Reliable Face Anti-Spoofing Using Multispectral SWIR Imaging. In Proceedings of the 2016 International Conference on Biometrics (ICB), Halmstad, Sweden, 13–16 June 2016; pp. 1–8. [Google Scholar]
- Kotwal, K.; Marcel, S. CNN Patch Pooling for Detecting 3D Mask Presentation Attacks in NIR. In Proceedings of the 2020 IEEE International Conference on Image Processing (ICIP), Virtual Conference, 25–28 October 2020; pp. 1336–1340. [Google Scholar]
- Edwards, T.; Hossain, M.S. Effectiveness of Deep Learning on Serial Fusion Based Biometric Systems. IEEE Trans. Artif. Intell. 2021, 2, 28–41. [Google Scholar] [CrossRef]
- Matthew, P.; Anderson, M. Developing Coercion Detection Solutions for Biometrie Security. In Proceedings of the 2016 SAI Computing Conference (SAI), London, UK, 13–15 July 2016; pp. 1123–1130. [Google Scholar]
- Alotaibi, A.; Mahmood, A. Enhancing Computer Vision to Detect Face Spoofing Attack Utilizing a Single Frame from a Replay Video Attack Using Deep Learning. In Proceedings of the 2016 International Conference on Optoelectronics and Image Processing (ICOIP), Warsaw, Poland, 10–12 June 2016; pp. 1–5. [Google Scholar]
- Nagpal, C.; Dubey, S.R. A Performance Evaluation of Convolutional Neural Networks for Face Anti Spoofing. In Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN), Budapest, Hungary, 14-19 July 2019; pp. 1–8. [Google Scholar]
- Sun, T.C.K.S. Artificial General Intelligence: Executive Briefing on Facial Recognition Technology; Kindle Direct Publishing: Seattle, WA, USA, 2017; Volume B077RCTMTM, Available online: https://www.amazon.com.au/Artificial-General-Intelligence-Recognition-Technology-ebook/dp/B077RCTMTM (accessed on 21 July 2025).
- Khairnar, S.; Gite, S.; Pradhan, B.; Thepade, S.; Alamri, A. Optimizing CNN Architectures for Face Liveness Detection: Performance, Efficiency, and Generalization across Datasets. CMES-Comp. Model. Eng. 2025, 143, 3677–3707. [Google Scholar] [CrossRef]
- Mallat, K.; Dugelay, J.-L. Indirect Synthetic Attack on Thermal Face Biometric Systems via Visible-to-Thermal Spectrum Conversion. In Proceedings of the 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Virtual Conference, 19–25 June 2021; pp. 1435–1443. [Google Scholar]
- Mishra, S.; Thamaraiselvi, D.; Dhariwal, S.; Aggarwal, D.; Ramesh, J.V.N. LSCO: Light Spectrum Chimp Optimization Based Spinalnet for Live Face Detection and Recognition. Expert. Syst. Appl. 2024, 250, 123585. [Google Scholar] [CrossRef]
- Shinde, S.R.; Bongale, A.M.; Dharrao, D.; Thepade, S.D. An Enhanced Light Weight Face Liveness Detection Method Using Deep Convolutional Neural Network. MethodsX 2025, 14, 103229. [Google Scholar] [CrossRef] [PubMed]
- Replay-Attack. Available online: https://www.idiap.ch:/en/dataset/replayattack/index_html (accessed on 11 August 2025).
- Sun, W.; Song, Y.; Chen, C.; Huang, J.; Kot, A.C. Face Spoofing Detection Based on Local Ternary Label Supervision in Fully Convolutional Networks. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3181–3196. [Google Scholar] [CrossRef]
- Ur Rehman, Y.A.; Po, L.M.; Liu, M. Deep Learning for Face Anti-Spoofing: An End-to-End Approach. In Proceedings of the 2017 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA), Poznan, Poland, 20–22 September 2017; pp. 195–200. [Google Scholar]
- 3DMAD. Available online: https://www.idiap.ch:/en/dataset/3dmad/index_html (accessed on 11 August 2025).
- Custom Silicone Mask Attack Dataset (CSMAD). Available online: https://www.idiap.ch:/en/dataset/csmad/index_html (accessed on 11 August 2025).
- Bhattacharjee, S.; Mohammadi, A.; Marcel, S. Spoofing Deep Face Recognition with Custom Silicone Masks. In Proceedings of the 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), Redondo Beach, CA, USA, 22–25 October 2018; pp. 1–7. [Google Scholar]
- Multispectral-Spoof (MSSpoof). Available online: https://www.idiap.ch:/en/dataset/msspoof/index_html (accessed on 11 August 2025).
- Jiang, F.; Liu, P.; Zhou, X. Multilevel Fusing Paired Visible Light and Near-Infrared Spectral Images for Face Anti-Spoofing. Pattern Recognit. Lett. 2019, 128, 30–37. [Google Scholar] [CrossRef]
- Yu, Z.; Zhao, C.; Wang, Z.; Qin, Y.; Su, Z.; Li, X.; Zhou, F.; Zhao, G. Searching Central Difference Convolutional Networks for Face Anti-Spoofing. In Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Virtual Conference, 14–19 June 2020; pp. 5294–5304. [Google Scholar]
- Boulkenafet, Z.; Komulainen, J.; Hadid, A. Face Spoofing Detection Using Colour Texture Analysis. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1818–1830. [Google Scholar] [CrossRef]
- Liu, Y.; Jourabloo, A.; Liu, X. Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision. In Proceedings of the 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 18–23 June 2018. [Google Scholar]
- Li, C.; Tang, X.; Shi, L.; Peng, Y.; Zhou, T. An Efficient Joint Framework Assisted by Embedded Feature Smoother and Sparse Skip Connection for Hyperspectral Image Classification. Infrared Phys. Technol. 2023, 135, 104985. [Google Scholar] [CrossRef]
- Chacon-Chamorro, M.; Gallego, F.A.; Riano-Rojas, J.C. Reducing Overfitting in ResNet with Adaptive Lipschitz Regularization. J. Comput. Appl. Math. 2026, 471, 116747. [Google Scholar] [CrossRef]
- Siddiqui, F.; Yang, J.; Xiao, S.; Fahad, M. Enhanced Deepfake Detection with DenseNet and Cross-ViT. Expert. Syst. Appl. 2025, 267, 126150. [Google Scholar] [CrossRef]
- Prasad, P.; Lakshmi, A.; Kautish, S.; Singh, S.; Shrivastava, R.; Almazyad, A.; Zawbaa, H.; Mohamed, A. Robust Facial Biometric Authentication System Using Pupillary Light Reflex for Liveness Detection of Facial Images. CMES-Comp. Model. Eng. 2023, 139, 725–739. [Google Scholar] [CrossRef]
- Tran, C.N.; Nguyen, M.S.; Castells-Rufas, D.; Carrabina, J. A Fast Iris Liveness Detection for Embedded Systems Using Textural Feature Level Fusion Algorithm. Procedia Comput. Sci. 2024, 237, 858–865. [Google Scholar] [CrossRef]
- Ben Atitallah, S.; Ben Rabah, C.; Driss, M.; Boulila, W.; Koubaa, A. Self-Supervised Learning for Graph-Structured Data in Healthcare Applications: A Comprehensive Review. Comput. Biol. Med. 2025, 188, 109874. [Google Scholar] [CrossRef]
- Amin, R.; Gaber, T.; ElTaweel, G.; Hassanien, A.E. Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues. In Bio-Inspiring Cyber Security and Cloud Services: Trends and Innovations; Hassanien, A.E., Kim, T.-H., Kacprzyk, J., Awad, A.I., Eds.; Intelligent Systems Reference Library; Springer: Berlin/Heidelberg, Germany, 2014; pp. 423–446. ISBN 978-3-662-43616-5. [Google Scholar]
- Wang, Y.; Wang, Z.; Liu, X. Key Security Measurement Method of Authentication Based on Mobile Edge Computing in Urban Rail Transit Communication Network. Comput. Commun. 2024, 215, 140–149. [Google Scholar] [CrossRef]
- Mutalova, Z.S.; Nurpeisova, A.A.; Shaushenova, A.G.; Ispussinov, A.M.; Zhumaliyeva, L.D. Face Recognition System Based on Neural Network. 2024, KZ Patent No. 9870. Kazakhstan. Available online: https://gosreestr.kazpatent.kz/Utilitymodel/Details?docNumber=409046 (accessed on 21 July 2025).
Dataset | Train Samples | Test Samples | Image Shape | Train Balance | Test Balance | Enhanced Quality | Resolution |
---|---|---|---|---|---|---|---|
MSSpoof [39] | 988 | 248 | (128, 128, 3) | 0.500 | 0.500 | True | 128 × 128 |
3DMAD [36] | 2752 | 688 | (128, 128, 3) | 0.500 | 0.500 | True | 128 × 128 |
CSMAD [37] | 1152 | 288 | (128, 128, 3) | 0.500 | 0.500 | True | 128 × 128 |
Replay Attack [33] | 4000 | 1000 | (128, 128, 3) | 0.500 | 0.500 | True | 128 × 128 |
Model | 3DMAD | CSMAD | MSSpoof | Replay Attack |
---|---|---|---|---|
Accuracy | ||||
AttackNetV1 | ≈1.0000 | ≈1.0000 | 0.9960 | ≈1.0000 |
AttackNetV2.1 | ≈1.0000 | ≈1.0000 | 0.9359 | 0.9990 |
AttackNetV2.2 | ≈1.0000 | ≈1.0000 | 0.9637 | 0.9970 |
LivenessNet | ≈1.0000 | ≈1.0000 | 0.9435 | 0.9950 |
HTER | ||||
AttackNetV1 | ≈0.0000 | ≈0.0000 | 0.00432 | ≈0.0000 |
AttackNetV2.1 | ≈0.0000 | ≈0.0000 | 0.01613 | ≈0.0000 |
AttackNetV2.2 | ≈0.0000 | ≈0.0000 | 0.03626 | ≈0.0000 |
LivenessNet | ≈0.0000 | ≈0.0000 | 0.05642 | ≈0.0000 |
EER | ||||
AttackNetV1 | ≈0.0000 | ≈0.0000 | 0.00404 | ≈0.0000 |
AttackNetV2.1 | ≈0.0000 | ≈0.0000 | 0.02826 | ≈0.0000 |
AttackNetV2.2 | ≈0.0000 | ≈0.0000 | 0.04023 | ≈0.0000 |
LivenessNet | ≈0.0000 | ≈0.0000 | 0.04023 | ≈0.0000 |
Training Time (seconds) | ||||
AttackNetV1 | 5026.3 | 124.7 | 662.1 | 546.9 |
AttackNetV2.1 | 245.0 | 147.7 | 184.1 | 581.0 |
AttackNetV2.2 | 205.6 | 105.0 | 129.6 | 479.9 |
LivenessNet | 179.6 | 78.6 | 60.8 | 438.8 |
Method | Dataset | HTER (%) | Type of Approach |
---|---|---|---|
LBP + LDA, Chingovska et al. [8] | Replay Attack | 17.0 | Handcrafted features |
LBP + SVM, Chingovska et al. [8] | Replay Attack | 15.0 | Handcrafted features |
Specialized CNN, Alotaibi & Mahmood [26] | Replay Attack | 10.0 | Deep learning |
FCN, Sun et al. [28] | Replay Attack | 30.0 | Deep learning |
LwFLNeT, Shinde et al. [32] | Replay Attack | 2.12 | Lightweight CNN |
Pupillary Light Reflex, Prasad et al. [47] | Replay Attack | 7.9 (EER) | Physiological + SIFT |
DenseNet201 + TL, Khairnar et al. [29] | Replay Attack | 1.2 | Transfer learning |
MobileNetV2 + TL, Khairnar et al. [29] | Replay Attack | 1.8 | Transfer learning |
Our AttackNetV1 | Replay Attack | ≈0.0 | Deep learning |
Our AttackNetV2.2 | Replay Attack | 0.1 | Deep learning |
Our AttackNetV2.2 | Replay Attack | 0.5 | Deep learning |
LBP + LDA, Erdogmus & Marcel [14] | 3DMAD | 18.0 | Handcrafted features |
LBP + SVM, Erdogmus & Marcel [14] | 3DMAD | 23.0 | Handcrafted features |
CNN, Arora et al. [9] | 3DMAD | ≈0.0 | Deep learning |
LwFLNeT, Shinde et al. [32] | 3DMAD | 0.3 | Lightweight CNN |
Fine-tuned VGG-16, Khairnar et al. [29] | 3DMAD | 4.82 | Transfer learning |
Fine-tuned ResNet-50, Khairnar et al. [29] | 3DMAD | 3.52 | Transfer learning |
Our AttackNetV1 | 3DMAD | ≈0.0 | Deep learning |
Our AttackNetV2.1 | 3DMAD | ≈0.0 | Deep learning |
Our AttackNetV2.2 | 3DMAD | ≈0.0 | Deep learning |
LightCNN, Bhattacharjee et al. [38] | CSMAD | 3.3 | Deep learning |
VGG-Face, Bhattacharjee et al. [38] | CSMAD | 3.9 | Deep learning |
Our AttackNetV1 | CSMAD | ≈0.00 | Deep learning |
Our AttackNetV2.1 | CSMAD | ≈0.00 | Deep learning |
Our AttackNetV2.2 | CSMAD | ≈0.00 | Deep learning |
Multispectral PLR, Chingovska et al. [21] | MSSpoof | 5.0 | Multispectral |
Multispectral SUM, Chingovska et al. [21] | MSSpoof | 5.6 | Multispectral |
Our AttackNetV1 | MSSpoof | 0.4 | Deep learning |
Our AttackNetV2.1 | MSSpoof | 1.6 | Deep learning |
Our AttackNetV2.2 | MSSpoof | 3.6 | Deep learning |
LBP+GLCM+SVM, Tran et al. [48] | LivDet-2015 | 7.9 (ACER) | Textural features |
LBP+GLCM+SVM, Tran et al. [48] | LivDet-2017 | 0.87 (ACER) | Textural features |
LBP+GLCM+SVM, Tran et al. [48] | Selected | 1.53 (ACER) | Textural features |
BSIF Baseline, Tran et al. [48] | LivDet-2015 | 7.9 (ACER) | Textural features |
BSIF Baseline, Tran et al. [48] | LivDet-2017 | 0.87 (ACER) | Textural features |
BSIF Baseline, Tran et al. [48] | Selected | 20.1 (ACER) | Textural features |
LwFLNeT, Shinde et al. [32] | NUAA | 1.24 | Lightweight CNN |
Pupillary Light Reflex, Prasad et al. [47] | CASIA-SURF | 10.1 (EER) | Physiological + SIFT |
DenseNet201 + TL, Khairnar et al. [29] | NUAA | 1.5 | Transfer learning |
MobileNetV2 + TL, Khairnar et al. [29] | NUAA | 2.0 | Transfer learning |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nurpeisova, A.; Shaushenova, A.; Kuznetsov, O.; Ispussinov, A.; Mutalova, Z.; Kassymova, A. Deep Residual Learning for Face Anti-Spoofing: A Mathematical Framework for Optimized Skip Connections. Technologies 2025, 13, 413. https://doi.org/10.3390/technologies13090413
Nurpeisova A, Shaushenova A, Kuznetsov O, Ispussinov A, Mutalova Z, Kassymova A. Deep Residual Learning for Face Anti-Spoofing: A Mathematical Framework for Optimized Skip Connections. Technologies. 2025; 13(9):413. https://doi.org/10.3390/technologies13090413
Chicago/Turabian StyleNurpeisova, Ardak, Anargul Shaushenova, Oleksandr Kuznetsov, Aidar Ispussinov, Zhazira Mutalova, and Akmaral Kassymova. 2025. "Deep Residual Learning for Face Anti-Spoofing: A Mathematical Framework for Optimized Skip Connections" Technologies 13, no. 9: 413. https://doi.org/10.3390/technologies13090413
APA StyleNurpeisova, A., Shaushenova, A., Kuznetsov, O., Ispussinov, A., Mutalova, Z., & Kassymova, A. (2025). Deep Residual Learning for Face Anti-Spoofing: A Mathematical Framework for Optimized Skip Connections. Technologies, 13(9), 413. https://doi.org/10.3390/technologies13090413