Keywords: face liveness detection; dynamic local ternary pattern (DLTP); skin texture analysis 1. Introduction Spoofing attacks upon face recognition systems involve presenting artificial facial replicas of authorized users to falsely infer their presence in order to bypass the biometric security measures...