Review on Methods of Antispoofing in Face Recognition System

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A challenge arises from the nature of the person. With the advent of the image handling technique, there has been a wonderful change in the method used to look for this physical highlight. Preventing false facial confirmation, which may be accomplished by using a picture, a video, a veil, or any other disguise to pass for another person's face, is the job of facial anti-spoofing. In terms of market share, face recognition is quickly overtaking fingerprint scanning as the most used biometric authentication technique worldwide. Apple's Face-ID technology and the use of eKYC agreements by financial institutions for the onboarding handle are just two examples of the growing number of companies that are sharing data on the prevalence of face recognition in their products. While most research into face recognition has focused on improving how well it performs at confirmation and distinguishing proof errands, the security vulnerabilities of face recognition frameworks have received comparatively little attention until recently. These vulnerabilities include not being able to tell whether a biometric trait was collected from a living or dead person, among other things.

Cite

CITATION STYLE

APA

Chakole, V. V., & Dixit, S. (2024). Review on Methods of Antispoofing in Face Recognition System. In AIP Conference Proceedings (Vol. 2974). American Institute of Physics Inc. https://doi.org/10.1063/5.0182463

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free