“…However, a large body of research has demonstrated the vulnerability of face recognition systems against presentation attacks, where an adversary attempts to subvert a recognition system by presenting a facial artefact, which mimics facial biometric features of a legitimate user [8,24,27,28]. Based on the artefact used, typical 2D facial presentation attacks involve three categories: printed photo attacks, electronic facial image attacks, and facial video attacks [7,11,17,19,33].…”