Content Moderation

Biometric Spoofing Attack Simulation for Face Recognition Systems

Image

We supported a long-term biometric security project focused on testing and improving face recognition systems under real-world attack scenarios. We acted as the operational link connecting a large, diverse contributor base with the client’s anti-spoofing platform, resulting in realistic attack data and actionable performance insights.

The project was built around controlled print and replay attacks, where participants actively attempted to bypass the client’s system. This hands-on approach allowed the client to continuously evaluate system robustness and track improvements over time.

Image

Task

The client needed real-world spoofing attempts to test and improve their face recognition and liveness detection system. Participants were invited to actively try to bypass the system, rather than simply submit passive data.

The main attack types included:

  • Print attacks using printed photos manipulated in different ways
  • Replay attacks attempting access via replayed visual material on devices

Each attack attempt was evaluated by the client’s system and assigned a score, reflecting how convincing and successful the attempt was.

Key challenges included:

  • Attracting and retaining participants willing to repeatedly test and “break” the system
  • Ensuring high variability across attacks (devices, print quality, lighting, backgrounds)
  • Coordinating technical integration between crowd platforms and the client’s interface
  • Capturing detailed behavioral data without direct access to the client’s internal system

Solution

Preparation and technical setup

  • Integrated with the client’s platform through an external execution interface, redirecting participants from the crowd platform to the client’s system
  • Worked via an existing enterprise account to manage task launches and participant access
  • Designed task flows that encouraged experimentation rather than one-off submissions

Attack execution process

  • For print attacks, participants received a facial image, printed it, and physically manipulated it (bending, rotating, folding) while attempting to pass system checks
  • Successful or near-successful attempts unlocked the option to return and retry, motivating participants to improve their techniques
  • Replay attacks were collected in parallel and reached target volume faster, while print attacks required longer-term iteration
  • Ensured broad diversity across:
    • age groups
    • ethnic backgrounds
    • devices and cameras
    • print materials and presentation styles

Monitoring and reporting

  • Tracked participant behavior step by step: number of attempts, repeat participation, and attack outcomes
  • Delivered weekly reports to the client, including:
    • number of new attacks
    • print vs. replay breakdown
    • new vs. returning participants
    • system response trends
  • Held regular review calls to align on findings and system performance changes

Result

  • Generated a large and diverse set of realistic spoofing attempts over a two-year period
  • Helped our client continuously refine and harden their biometric system
  • Observed measurable improvement in system resistance as attack strategies evolved
  • Built a sustainable feedback loop between real users and biometric security engineers

Similar Cases

  • Image
    Image Annotation

    Digital Tree Passport Annotation for Forest Mapping

    How do you annotate 200,000 trees with species, height, and crown data from aerial imagery to enable precise forest monitoring?

    Lean more
  • Image
    Image Annotation

    Image Annotation for Strawberry Ripeness Detection

    Our custom dataset powered the transition from manual picking to AI-assisted harvesting — optimizing yield through data-driven ripeness detection.

    Lean more
  • Image
    NLP Annotation services

    Intent Annotation for E-commerce

    We transformed frequent buyer questions into structured intent data, enabling an AI assistant that improves response quality and user satisfaction across the marketplace.

    Lean more
  • Image
    Data Collection

    Fight Detection for Surveillance Systems

    From scenario planning to annotation, we supported a full-cycle dataset build for a CV model trained to detect physical aggression in public spaces.

    Lean more
  • Image
    NLP Annotation services

    Arabic Language Data Annotation for LLM Evaluation

    Task The client needed real-world spoofing attempts to test and improve their face recognition and liveness detection system. Participants were […]

    Lean more

Ready to get started?

Tell us what you need — we’ll reply within 24h with a free estimate

    What service are you looking for? *
    What service are you looking for?
    Data Labeling
    Data Collection
    Ready-made Datasets
    Human Moderation
    Medicine
    Other
    What's your budget range? *
    What's your budget range?
    < $1,000
    $1,000 – $5,000
    $5,000 – $10,000
    $10,000 – $50,000
    $50,000+
    Not sure yet
    Where did you hear about Unidata? *
    Where did you hear about Unidata?
    Head of Client Success
    Andrew
    Head of Client Success

    — I'll guide you through every step, from your first
    message to full project delivery

    Thank you for your
    message

    It has been successfully sent!

    We use cookies to enhance your experience, personalize content, ads, and analyze traffic. By clicking 'Accept All', you agree to our Cookie Policy.