Content Moderation

Biometric Spoofing Attack Simulation for Face Recognition Systems

Image

We supported a long-term biometric security project focused on testing and improving face recognition systems under real-world attack scenarios. We acted as the operational link connecting a large, diverse contributor base with the client’s anti-spoofing platform, resulting in realistic attack data and actionable performance insights.

The project was built around controlled print and replay attacks, where participants actively attempted to bypass the client’s system. This hands-on approach allowed the client to continuously evaluate system robustness and track improvements over time.

Industry Biometric Security
Timeline 2 years
Data Print attacks, replay attacks, multi-device testing
Image
Industry Biometric Security
Timeline 2 years
Data Print attacks, replay attacks, multi-device testing

Task:

The client needed real-world spoofing attempts to test and improve their face recognition and liveness detection system. Participants were invited to actively try to bypass the system, rather than simply submit passive data.

The main attack types included:

  • Print attacks using printed photos manipulated in different ways
  • Replay attacks attempting access via replayed visual material on devices

Each attack attempt was evaluated by the client’s system and assigned a score, reflecting how convincing and successful the attempt was.

Key challenges included:

  • Attracting and retaining participants willing to repeatedly test and “break” the system
  • Ensuring high variability across attacks (devices, print quality, lighting, backgrounds)
  • Coordinating technical integration between crowd platforms and the client’s interface
  • Capturing detailed behavioral data without direct access to the client’s internal system

Solution:

  • 01

    Preparation and technical setup

    • Integrated with the client’s platform through an external execution interface, redirecting participants from the crowd platform to the client’s system
    • Worked via an existing enterprise account to manage task launches and participant access
    • Designed task flows that encouraged experimentation rather than one-off submissions
  • 02

    Attack execution process

    • For print attacks, participants received a facial image, printed it, and physically manipulated it (bending, rotating, folding) while attempting to pass system checks
    • Successful or near-successful attempts unlocked the option to return and retry, motivating participants to improve their techniques
    • Replay attacks were collected in parallel and reached target volume faster, while print attacks required longer-term iteration
    • Ensured broad diversity across:
      • age groups
      • ethnic backgrounds
      • devices and cameras
      • print materials and presentation styles
  • 03

    Monitoring and reporting

    • Tracked participant behavior step by step: number of attempts, repeat participation, and attack outcomes
    • Delivered weekly reports to the client, including:
      • number of new attacks
      • print vs. replay breakdown
      • new vs. returning participants
      • system response trends
    • Held regular review calls to align on findings and system performance changes

Results:

  • Generated a large and diverse set of realistic spoofing attempts over a two-year period

  • Helped our client continuously refine and harden their biometric system

  • Observed measurable improvement in system resistance as attack strategies evolved

  • Built a sustainable feedback loop between real users and biometric security engineers

Similar Cases

  • Image
    Geospatial Annotation services

    Aerial Image Annotation for Urban Planning

    We annotated 132,000+ objects in 11,000 aerial images—streamlining urban planning data with scalable workflows and tailored class logic.

    Lean more
  • Image
    Audio Transcription

    Multi-Speaker Audio Annotation for Banking

    We handled complex, real-world audio by combining automation with expert oversight — capturing every voice, pause, and interruption.

    Lean more
  • Image
    Image Annotation

    Digital Tree Passport Annotation for Forest Mapping

    How do you annotate 200,000 trees with species, height, and crown data from aerial imagery to enable precise forest monitoring?

    Lean more
  • Image
    Data Collection

    Image Data Collection for Biometric System

    We built a reliable dataset for biometric system testing — fast, compliant, and ready for integration.

    Lean more
  • Image
    Video Annotation

    Surveillance Video Annotation for Entrance Monitoring

    We annotated 90 minutes of video footage from a factory entrance surveillance system, reducing the number of frames from 50-60 […]

    Lean more

Ready to get started?

Tell us what you need — we’ll reply within 24h with a free estimate

    What service are you looking for? *
    What service are you looking for?
    Data Labeling
    Data Collection
    Ready-made Datasets
    Human Moderation
    Medicine
    Other
    What's your budget range? *
    What's your budget range?
    < $1,000
    $1,000 – $5,000
    $5,000 – $10,000
    $10,000 – $50,000
    $50,000+
    Not sure yet
    Where did you hear about Unidata? *
    Where did you hear about Unidata?
    Head of Client Success
    Andrew
    Head of Client Success

    — I'll guide you through every step, from your first
    message to full project delivery

    Thank you for your
    message

    It has been successfully sent!

    We use cookies to enhance your experience, personalize content, ads, and analyze traffic. By clicking 'Accept All', you agree to our Cookie Policy.