A method and system to detect visual spoofing of a process of authenticating a person's identity employs computer vision techniques to define characteristics of different kinds of spoofing. Embodiments identify a foreground object within an image and by examining positions and/or orientations of that foreground object within the image, determine whether the presentation of the foreground object is an attempt to spoof the authentication process.
展开▼