Technologies to overcome spoofing attack in facial recognition

1Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The identification technologies used nowadays consists of biometrics as an essential component. The basic use of a conventional biometric system is to identify the authenticity of an individual through its physical as well as behavioral attributes, which is considered as one of the most suitable method to secure confidentiality of data. Though the security of these systems is stringent to breach, still it does consists of vulnerabilities due to various reasons. One of the major threats the current biometric system possess are the spoofing attacks. Spoofing attacks are difficult to conquer due to the fact that a person tries to masquerade as others in order to gain unauthorized access to the security systems. This is one of the biggest problem concerning the integrity of the biometric system. The study of spoofing attacks has gained interest of various researchers in the field of computer science, still there are aspects which needs greater attention in order to achieve a plausible solution. The study is based on the current biometric systems in order to compare and contrast the existing technology used in facial recognition. A detailed review of the existing anti – spoofing methods will be taken into account to discuss the future research directions. Thus, the work will focus on threats to the current security systems, with an aim to analyse the possible countermeasures, and its applications in real life scenarios.

Cite

CITATION STYLE

APA

Pratap, K., Priya, A., & Mani, G. (2019). Technologies to overcome spoofing attack in facial recognition. International Journal of Recent Technology and Engineering, 8(2 Special Issue 4), 36–41. https://doi.org/10.35940/ijrte.B1007.0782S419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free