Fusion of Multiple Biometric For Photo-Attack Detection in Face Recognition Systems

نویسنده

  • Vanita Mane
چکیده

A spoofing attack is a situation in which one person successfully masquerades as another by falsifying data and gaining illegitimate access. Spoofing attacks are of several types such as photograph, video or mask. Biometrics are playing the role of a password which cannot be replaced if stolen, so there is the necessity of counter-measures to biometric spoofing attacks. Face biometric systems are vulnerable to spoofing attack. Regardless of the biometric mode, the typical approach of anti-spoofing systems is to classify the biometric evidence which are based on features discriminating between real accesses and spoofing attacks. A number of biometric characteristics are in use in various applications. This system will be based on face recognition and lip movement recognition systems. This system will make use of client-specific information to build client-specific anti-spoofing solution, depending on a generative model. In this system, we will implement the client identity to detect spoofing attack. With this, it increases efficiency of authentication. The image will be captured and registered with its cli ent identity. When user has to be authenticated, the image will be captured with his identity manually entered. Now system will check the image with respect to client identity only. Lip movement recognition will be done at time of authentication to identify whether client is spoof or not. If client is authenticated, then it will check for captured image dimension using Gaussian Mixture Model (GMM). This system also encrypts and decrypts a file by extracting parameter values of a registered face. Keywords-Biometric system, Face recognition system, Spoofing, Anti-spoofing __________________________________________________*****_________________________________________________

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Face Recognition and Face Liveness

Spoofing attack is a threat for biometric authentication systems. Liveness detection aims at recognition of human physiological activities as the liveness indicator to prevent spoofing attack. Facial photograph of valid user is the most common way to spoof face recognition systems as photo attack is the cheapest and easiest spoofing approach. Antispoof problem is a challenging task before face ...

متن کامل

Hybrid Approach for Template Protection in Face Recognition System

Biometrics deals with identifying individuals with the help of their biological (physiological and behavioral) data. The security of biometric systems has however been questioned and previous studies have shown that they can be fooled with artificial artifacts. Also biometric recognition systems face challenges arising from intra-class variations and attacks upon template databases. To tackle s...

متن کامل

Robust multimodal face and fingerprint fusion in the presence of spoofing attacks

Anti-spoofing is attracting growing interest in biometrics, considering the variety of fake materials and new means to attack biometric recognition systems. New unseen materials continuously challenge state-of-the-art spoofing detectors, suggesting for additional systematic approaches to target anti-spoofing. By incorporating liveness scores into the biometric fusion process, recognition accura...

متن کامل

Presentation attack detection in voice biometrics

Recent years have shown an increase in both the accuracy of biometric systems and their practical use. The application of biometrics is becoming widespread with fingerprint sensors in smartphones, automatic face recognition in social networks and video-based applications, and speaker recognition in phone banking and other phone-based services. The popularization of the biometric systems, howeve...

متن کامل

A Study of Liveness Detection in Face Biometric Systems

“Biometrics” refers to the technologies that measure and analyze human body characteristics for security purposes. The need of privacy and security in our daily life leads to this new area. Biometric systems have more accuracy when compared to traditional methods (password, key etc). It identifies and verifies the identity of a person based on one or more physiological and behavioral characteri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016