Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

An Analytical Study on the Face Anti-Spoofing

Author : Indu 1

Date of Publication :25th January 2017

Abstract: Client verification is a significant advancement to secure data and in this respect face biometrics is beneficial. Face biometrics is characteristic, simple to utilize, less human-intrusive. Tragically, ongoing work uncovered that face biometrics is not very helpful against parodying attacks. This part displays the various modalities of attacks to visual range face recognition system. Datasets are opened for the assessment of weakness of recognition system and execution of counter-measures. At long last, a complete perspective was assembled for visual range face recognition and give a viewpoint of issues that stay unaddressed. Biometric parodying is a developing concern as biometric attributes are defenceless against attacks. Biometric parodying is the capacity to trick a biometric system into perceiving a phony client as a certifiable client by methods for showing a synthetically forged version of the first biometric attribute to the sensor. Explicit countermeasures that permit biometric system to identify counterfeit leftovers and to dismiss them should be created. This current paper's principle objective is to give a review of various anti-spoofing systems utilized in the now rising field of anti-spoofing with unique thoughtfulness regarding face methodology

Reference :

    1. Biometric System and Data Analysis. 2009
    2. M. Siegel, T. H. Donner, and A. K. Engel, “Spectral fingerprints of large-scale neuronal interactions,” Nature Reviews Neuroscience. 2012, doi: 10.1038/nrn3137.
    3. R. Sanchez-Reillo, “Hand Geometry,” in Encyclopedia of Biometrics, 2014.
    4. N. Evans, T. Kinnunen, J. Yamagishi, Z. Wu, F. Alegre, and P. De Leon, “Handbook of Biometric Anti-Spoofing,” Handb. Biometric Anti-Spoofing, 2014, doi: 10.1007/978-1-4471-6524-8
    5. A. Hadid, “Face biometrics under spoofing attacks: Vulnerabilities, countermeasures, open issues, and research directions,” 2014, doi: 10.1109/CVPRW.2014.22.
    6. Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, and S. Z. Li, “A face antispoofing database with diverse attacks,” 2012, doi: 10.1109/ICB.2012.6199754.
    7. S. Liu, P. C. Yuen, S. Zhang, and G. Zhao, “3d mask face anti-spoofing with remote photoplethysmography,” 2016, doi: 10.1007/978-3-319-46478-7_6.
    8. F. Alegre, N. Evans, T. Kinnunen, Z. Wu, and J. Yamagishi, “Anti-Spoofing: Voice Databases,” in Encyclopedia of Biometrics, 2014.
    9. Z. Boulkenafet, J. Komulainen, and A. Hadid, “Face Spoofing Detection Using Colour Texture Analysis,” IEEE Trans. Inf. Forensics Secur., 2016, doi: 10.1109/TIFS.2016.2555286.
    10. Vishal Jain, Dr. Mayank Singh, “Ontology Based Web Crawler to Search Documents in the Semantic Web”, “Wilkes100 - Second International Conference on Computing Sciences”, in association with International Neural Network Society and Advanced Computing Research Society, held on 15th and 16th November, 2013 organized by Lovely Professional University, Phagwara, Punjab, India and proceeding published by Elsevier Science
    11. Vishal Jain, Dr. Mayank Singh, “Ontology Development and Query Retrieval using Protégé Tool”, International Journal of Intelligent Systems and Applications (IJISA), Hongkong, Vol. 5, No. 9, August 2013, page no. 67-75, having ISSN No. 2074-9058, DOI: 10.5815/ijisa.2013.09.08
    12. Vishal Jain, Dr. S. V. A. V. Prasad, “Ontology Based Information Retrieval Model in Semantic Web: A Review”, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Volume 4, Issue 8, August 2014, page no. 837 to 842 having ISSN No. 2277- 128X.
    13. V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Certain Investigations on Strategies for Protecting Medical Data in Cloud", International Journal of Innovative Research in Computer and Communication Engineering Vol 2, Issue 10, October 2014
    14. V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Investigations on Remote Virtual Machine to Secure Lifetime PHR in Cloud ", International Journal of Innovative Research in Computer and Communication Engineering Vol 2, Issue 10, October 2014
    15. V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Privacy Preserving Personal Health Care Data in Cloud”, International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014

    1. Biometric System and Data Analysis. 2009.
    2. M. Siegel, T. H. Donner, and A. K. Engel, ‘Spectral fingerprints of large-scale neuronal interactions’, Nature Reviews Neuroscience. 2012
    3. R. Sanchez-Reillo, ‘Hand Geometry’, in Encyclopedia of Biometrics, 2014.
    4. Y. Liu, A. Jourabloo, and X. Liu, ‘Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision’, in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2018.
    5. N. Erdogmus and S. Marcel, ‘Spoofing face recognition with 3D masks’, IEEE Trans. Inf. Forensics Secur., 2014.
    6. N. Evans, T. Kinnunen, J. Yamagishi, Z. Wu, F. Alegre, and P. De Leon, ‘Handbook of Biometric Anti-Spoofing’, Handb. Biometric Anti-Spoofing, 2014.
    7. A. Hadid, ‘Face biometrics under spoofing attacks: Vulnerabilities, countermeasures, open issues, and research directions’, in IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 2014.
    8. Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, and S. Z. Li, ‘A face antispoofing database with diverse attacks’, in Proceedings - 2012 5th IAPR International Conference on Biometrics, ICB 2012, 2012.
    9. S. Liu, P. C. Yuen, S. Zhang, and G. Zhao, ‘3d mask face anti-spoofing with remote photoplethysmography’, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016.
    10. F. Alegre, N. Evans, T. Kinnunen, Z. Wu, and J. Yamagishi, ‘Anti-Spoofing: Voice Databases’, in Encyclopedia of Biometrics, 2014.
    11. Z. Boulkenafet, J. Komulainen, and A. Hadid, ‘Face Spoofing Detection Using Colour Texture Analysis’, IEEE Trans. Inf. Forensics Secur., 2016.
    12. Vishal Jain, Dr. Mayank Singh, “Ontology Based Web Crawler to Search Documents in the Semantic Web”, “Wilkes100 - Second International Conference on Computing Sciences”, in association with International Neural Network Society and Advanced Computing Research Society, held on 15th and 16th November, 2013 organized by Lovely Professional University, Phagwara, Punjab, India and proceeding published by Elsevier Science
    13. Vishal Jain, Dr. Mayank Singh, “Ontology Development and Query Retrieval using Protégé Tool”, International Journal of Intelligent Systems and Applications (IJISA), Hongkong, Vol. 5, No. 9, August 2013, page no. 67-75, having ISSN No. 2074-9058, DOI: 10.5815/ijisa.2013.09.08
    14. Vishal Jain, Dr. S. V. A. V. Prasad, “Ontology Based Information Retrieval Model in Semantic Web: A Review”, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Volume 4, Issue 8, August 2014, page no. 837 to 842 having ISSN No. 2277- 128X
    15. V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Certain Investigations on Strategies for Protecting Medical Data in Cloud", International Journal of Innovative Research in Computer and Communication Engineering Vol 2, Issue 10, October 2014
    16. V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Investigations on Remote Virtual Machine to Secure Lifetime PHR in Cloud ", International Journal of Innovative Research in Computer and Communication Engineering Vol 2, Issue 10, October 2014
    17. V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Privacy Preserving Personal Health Care Data in Cloud”, International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014

Recent Article