An Overview of Biometrics and Face Spoofing Detection

11Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Biometric systems have been using widely and these systems have improved substantially which are being used for persons Authentication and verification. This Biometrics is playing a key role in Personal, National and Global security. The main approach of this paper is to tell the importance of Biometric systems. Different types of biometric systems have been used these days. These biometric systems are iris recognition, palm vein biometrics, voice recognition, face recognition. The main threat to all these Biometric systems is Spoofing. Facial recognition biometric system is being widely used when compared to other biometric systems. Different types of facial spoofing include mask attack; photo attack & video attack and Different methods used to detect Face spoofing are discussed in this paper. These face spoofing detection techniques include the use of LBP, DMD, SVM, PReLU, IDA, LFHOG and CNN. The Other Techniques Include a Combination of LBP, CNN, and IDA. However, the results strongly prove that the Implementation of the above techniques will detect Face spoofing.

Cite

CITATION STYLE

APA

Sudeep, S. V. N. V. S., Venkata Kiran, S., Nandan, D., & Kumar, S. (2021). An Overview of Biometrics and Face Spoofing Detection. In Lecture Notes in Electrical Engineering (Vol. 698, pp. 871–881). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-7961-5_82

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free