Identity Card Presentation Attack Detection: A Systematic Review

📅 2025-11-08
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This study systematically reviews AI-driven Presentation Attack Detection (AI-PAD) research from 2020–2025, identifying two critical challenges: (1) data scarcity severely limits model generalizability across diverse identity documents and emerging attack modalities; and (2) a “reality gap” (performance discrepancies between private and public benchmark evaluations) and a “synthetic utility gap” (synthetic data failing to capture real-world forensic utility, leading to artifact overfitting). Adopting the PRISMA framework, we classify and evaluate methods spanning deep learning, fine-grained forgery trace analysis, and foundation models. We formally define and empirically validate these dual gaps for the first time. Our work establishes a reproducible, generalizable PAD research paradigm, clarifies the technical evolution trajectory, identifies key research gaps, and proposes a forward-looking roadmap toward secure, robust, and globally applicable AI-PAD systems.

Technology Category

Application Category

📝 Abstract
Remote identity verification is essential for modern digital security; however, it remains highly vulnerable to sophisticated Presentation Attacks (PAs) that utilise forged or manipulated identity documents. Although Deep Learning (DL) has driven advances in Presentation Attack Detection (PAD), the field is fundamentally limited by a lack of data and the poor generalisation of models across various document types and new attack methods. This article presents a systematic literature review (SLR) conducted in accordance with the PRISMA methodology, aiming to analyse and synthesise the current state of AI-based PAD for identity documents from 2020 to 2025 comprehensively. Our analysis reveals a significant methodological evolution: a transition from standard Convolutional Neural Networks (CNNs) to specialised forensic micro-artefact analysis, and more recently, the adoption of large-scale Foundation Models (FMs), marking a substantial shift in the field. We identify a central paradox that hinders progress: a critical"Reality Gap"exists between models validated on extensive, private datasets and those assessed using limited public datasets, which typically consist of mock-ups or synthetic data. This gap limits the reproducibility of research results. Additionally, we highlight a"Synthetic Utility Gap,"where synthetic data generation the primary academic response to data scarcity often fails to predict forensic utility. This can lead to model overfitting to generation artefacts instead of the actual attack. This review consolidates our findings, identifies critical research gaps, and provides a definitive reference framework that outlines a prescriptive roadmap for future research aimed at developing secure, robust, and globally generalizable PAD systems.
Problem

Research questions and friction points this paper is trying to address.

Detecting presentation attacks using forged identity documents for remote verification
Addressing limited data availability and poor model generalization across document types
Bridging the reality gap between private and public dataset validation results
Innovation

Methods, ideas, or system contributions that make the work stand out.

Systematic review of AI-based attack detection methods
Transition from CNNs to forensic micro-artifact analysis
Adoption of large-scale Foundation Models for detection
🔎 Similar Papers
No similar papers found.
E
Esteban M. Ruiz
Universidad Autónoma de Manizales
J
Juan E. Tapia
da/sec-Biometrics and Internet Security Research Group, Hochschule Darmstadt, Germany
R
Reinel T. Soto
Universidad Autónoma de Manizales and Universidad de Caldas
Christoph Busch
Christoph Busch
Professor for Biometrics, Norwegian University of Science and Technology (NTNU)
Biometrics