Content Moderation

Biometric Spoofing Attack Simulation for Face Recognition Systems

Image

We supported a long-term biometric security project focused on testing and improving face recognition systems under real-world attack scenarios. We acted as the operational link connecting a large, diverse contributor base with the client’s anti-spoofing platform, resulting in realistic attack data and actionable performance insights.

The project was built around controlled print and replay attacks, where participants actively attempted to bypass the client’s system. This hands-on approach allowed the client to continuously evaluate system robustness and track improvements over time.

Image

Task

The client needed real-world spoofing attempts to test and improve their face recognition and liveness detection system. Participants were invited to actively try to bypass the system, rather than simply submit passive data.

The main attack types included:

  • Print attacks using printed photos manipulated in different ways
  • Replay attacks attempting access via replayed visual material on devices

Each attack attempt was evaluated by the client’s system and assigned a score, reflecting how convincing and successful the attempt was.

Key challenges included:

  • Attracting and retaining participants willing to repeatedly test and “break” the system
  • Ensuring high variability across attacks (devices, print quality, lighting, backgrounds)
  • Coordinating technical integration between crowd platforms and the client’s interface
  • Capturing detailed behavioral data without direct access to the client’s internal system

Solution

Preparation and technical setup

  • Integrated with the client’s platform through an external execution interface, redirecting participants from the crowd platform to the client’s system
  • Worked via an existing enterprise account to manage task launches and participant access
  • Designed task flows that encouraged experimentation rather than one-off submissions

Attack execution process

  • For print attacks, participants received a facial image, printed it, and physically manipulated it (bending, rotating, folding) while attempting to pass system checks
  • Successful or near-successful attempts unlocked the option to return and retry, motivating participants to improve their techniques
  • Replay attacks were collected in parallel and reached target volume faster, while print attacks required longer-term iteration
  • Ensured broad diversity across:
    • age groups
    • ethnic backgrounds
    • devices and cameras
    • print materials and presentation styles

Monitoring and reporting

  • Tracked participant behavior step by step: number of attempts, repeat participation, and attack outcomes
  • Delivered weekly reports to the client, including:
    • number of new attacks
    • print vs. replay breakdown
    • new vs. returning participants
    • system response trends
  • Held regular review calls to align on findings and system performance changes

Result

  • Generated a large and diverse set of realistic spoofing attempts over a two-year period
  • Helped our client continuously refine and harden their biometric system
  • Observed measurable improvement in system resistance as attack strategies evolved
  • Built a sustainable feedback loop between real users and biometric security engineers

Similar Cases

  • Image
    Data Collection

    Alopecia Image Collection for Medical Research

    How do you capture subtle differences in male hair loss at scale? We collected 350 multi-angle photo sets, labeled with expert precision using the Norwood Scale.

    Lean more
  • Image
    Text Labeling

    Document Annotation for Financial Services

    From contracts to inheritance certificates, we annotated 6,000+ legal documents with high precision and custom validation logic.

    Lean more
  • Image
    Audio Annotation

    Audio Transcription for Finance Sector

    We completed 80 hours of high-complexity audio transcription without relying on pre-labeling — leveraging a scalable workflow designed for accuracy, consistency, and speed.

    Lean more
  • Image
    Image Annotation

    Image Segmentation for Retail Applications

    How do you segment every single object in a cluttered interior photo — 30+ classes per image? We designed a multi-step annotation pipeline to handle complexity without losing precision.

    Lean more
  • Image
    Data Collection

    Fabric Mask Dataset for Biometric Testing

    Testing biometrics with frontal-only masks hides real weaknesses. We developed fabric mask samples for true multi-angle evaluation.

    Lean more

Ready to get started?

Tell us what you need — we’ll reply within 24h with a free estimate

    What service are you looking for? *
    What service are you looking for?
    Data Labeling
    Data Collection
    Ready-made Datasets
    Human Moderation
    Medicine
    Other
    What's your budget range? *
    What's your budget range?
    < $1,000
    $1,000 – $5,000
    $5,000 – $10,000
    $10,000 – $50,000
    $50,000+
    Not sure yet
    Where did you hear about Unidata? *
    Where did you hear about Unidata?
    Head of Client Success
    Andrew
    Head of Client Success

    — I'll guide you through every step, from your first
    message to full project delivery

    Thank you for your
    message

    It has been successfully sent!

    We use cookies to enhance your experience, personalize content, ads, and analyze traffic. By clicking 'Accept All', you agree to our Cookie Policy.