Wrapped_3D_Attacks / README.md
AxonData's picture
Update README.md
6ff2e80 verified
---
license: cc-by-4.0
task_categories:
- image-feature-extraction
- image-classification
- video-classification
language:
- en
tags:
- liveness detection
- anti-spoofing
- biometrics
- facial recognition
- machine learning
- deep learning
- AI
- paper mask attack
- iBeta certification
- PAD attack
- security
- ibeta
- face recognition
- pad
- authentication
- fraud
size_categories:
- 1K<n<10K
---
# Wrapped 3D Attacks Dataset
## Full version of dataset is availible for commercial usage - leave a request on our website [Axon Labs](https://axonlabs.pro/?utm_source=hugging-face&utm_medium=cpc&utm_campaign=profile&utm_content=profile_link) to purchase the dataset 💰
## Introduction
This dataset is designed to enhance Liveness Detection models by simulating Wrapped 3D Attacks — a more advanced version of 3D Print Attacks, where facial prints include 3D elements and additional attributes. It is particularly useful for iBeta Level 2 certification and anti-spoofing model training
## Dataset summary
- Dataset Size: ~2k videos shoot on 20 IDs demonstrating various spoofing attacks
- Active Liveness Features: Includes zoom-in and zoom-out to enhance training scenarios
- Attributes: Different hairstyles, glasses, wigs and beards to enhance diversity
- Variability: 3 indoor locations with different types of lighting: from warm to cold
- Main Applications: Preparation for iBeta Level 2 certification, Active and passive liveness for anti spoofing systems
![](https://www.googleapis.com/download/storage/v1/b/kaggle-user-content/o/inbox%2F20109613%2Fc3ecd3043c4139ef185a461e47ba257c%2F2025-03-26%20%2022.44.44.png?generation=1743018625916049&alt=media)
## Source and collection methodology
The videos capture realistic spoofing conditions using different recording devices and variety of environments. Additionally, each attack video employs a zoom-in effect, adding to its effectiveness in active liveness detection. The videos were shot using a back-facing camera
## To create wrapped 3D attacks, we:
- Constructed 3D facial structures by cutting out A4-sized face prints, shaping volume for the nose, forehead, and chin, and mounting them on mannequin heads or cylindrical objects
- Added attributes, including wigs, beards, mustaches, glasses, hats, and hoods, to increase spoofing complexity
- Simulated a human torso using clothing on mannequins, chairs, or surface
![](https://www.googleapis.com/download/storage/v1/b/kaggle-user-content/o/inbox%2F20109613%2F6eda9058fdaf9ca0118e3fdceee02f30%2FFrame%2065.png?generation=1743018709824907&alt=media)
## Best Uses
- **iBeta Level 2 Certification Compliance:**
Helps to train the models for iBeta level 2 certification tests
Allows pre-certification testing to assess system performance before submission
- **Inhouse Liveness Detection Models:**
Used for training and validation of anti-spoofing models
Enables testing of existing algorithms and identification of their vulnerabilities against spoofing attacks
## Conclusion
With its comprehensive features and simulation of real attack scenarios, the Wrapped 3D Attack Dataset is indispensable for anyone involved in developing and certifying facial recognition and liveness detection technologies. Utilize this dataset to strengthen your systems against the most deceptive digital security threats.