Face Analysis Technology Evaluation (FATE) PAD
FATE PAD Art
Credit: Natasha Hanacek/NIST

Report | Participation Agreement | API | Validation | Encryption

Status

This track is currently closed, and NIST is not accepting PAD submissions for evaluation at this time. An announcement will be made on this website and to our mailing list when this track reopens.

[2023-09-20] We have released NISTIR 8491 - Face Analysis Technology Evaluation (FATE) Part 10: Performance of Passive, Software-based Presentation Attack Detection (PAD) Algorithms. As described in this press release, the report quantifies the accuracy of 82 passive face PAD algorithms (software only, no hardware solutions) operating on conventional 2D imagery of various presentation attack instruments.

Status
[2023-08-18] FRVT was split and renamed to FRTE and FATE.

Motivation

A presentation attack (PA), as defined by the ISO/IEC 30107 standard on biometric presentation attack detection, is “the presentation of an artefact or of human characteristics to a biometric capture subsystem in a fashion intended to interfere with system policy”. A presentation attack is often launched with the intent of impersonation (the user is trying to authenticate as a target identity) or evasion (the user is trying to fool the biometric system into not recognizing their true identity). The goals of impersonation include trying to gain positive access privilege as someone else, for example, trying to unlock someone’s cell phone or gain access to a facility. The goals of evasion are typically to conceal one’s true identity to evade recognition from say a watchlist, or to create a separate enrollment under a different name. Biometric systems can potentially be attacked by an unknown number of presentation attack instruments, and the number or type of attack instruments in existence is not well-known. Some examples of known presentation attack instruments include artificial “gummy” fingers, “replay” attacks where the attacker is holding a photo or video of someone’s face to the camera, and iris photo and contact lens attacks. Presentation attack of face recognition systems (and the ability to detect it) is an area of high interest given the widespread deployment of face recognition systems, particularly in unmanned/unsupervised and remote enrollment and authentication scenarios.

How to Participate (this track is currently CLOSED)

To participate in this evaluation, developers need to submit a participation agreement to NIST, wrap their software behind the published C++ API, run their libraries through the provided validation package (which creates a submission package), encrypt the package, and provide a download link for the encrypted submission package. More details are provided below.

Participation Agreement

FATE is conducted by NIST, an agency of the United States Government. Participation is free of charge. FATE is open to a global audience of face recognition developers. All organizations who seek to participate in FATE must sign all pages of this Participation Agreement and submit it with their algorithm submission using the Submission Form. [last update: 2023-07-03]

[NOTE:] Organizations that have already submitted a participation agreement for FRTE Ongoing 1:1 do not need to send in a new participation agreement UNLESS the organization updates their cryptographic signing key.

API Document

A definitive API document has been published. All algorithms submitted must adhere to the published C++ API. [last update: 2022-10-04]

Validation

A validation package has been published. All participants must run their software through the validation package prior to submission. The purpose of validation is to ensure consistent algorithm output between your execution and NIST’s execution. [last update: 2023-04-28]

Encryption

All submissions must be properly encrypted and signed before transmission to NIST. This must be done according to these instructions using the FRTE Ongoing public key linked from this page. Participants must email their public key to NIST. The participant’s public key must correspond to the participant’s public-key fingerprint provided on the signed Participation Application. [last update: 2022-08-22]

Submission

All algorithm submissions must be submitted through the Submission Form, which requires encrypted files be provided as a download link from a generic http server (e.g., Google Drive). We cannot accept Dropbox links. NIST will not register, or establish any kind of membership, on the provided website. Participants can submit their algorithm(s), participation agreement, and GPG key at the same time via the submission form. [last update: 2023-07-03]

Participants must subscribe to the FATE mailing list to receive emails when new reports are published or announcements are made.


Contact Information

Inquiries and comments may be submitted to frvt@nist.gov.

Subscribe to the evaluation mailing list to receive emails when announcements or updates are made.

Related NIST Projects

Ongoing Face Evaluations

FRTE Projects

FRTE 1:1 Verification
FRTE 1:N Identification
FRTE Demographic Effects
FRTE Face Mask Effects
FRTE Paperless Travel
FRTE Twins Demonstration
FRTE FIVE

FATE Projects

FATE MORPH
FATE Quality
FATE PAD
FATE Age Estimation & Verification