CFP last date
20 December 2024
Reseach Article

A Study on Face Recognition and Face Spoofing Detection Techniques

by Khyati Jash Desai, Sunil Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 14
Year of Publication: 2023
Authors: Khyati Jash Desai, Sunil Kumar
10.5120/ijca2023922823

Khyati Jash Desai, Sunil Kumar . A Study on Face Recognition and Face Spoofing Detection Techniques. International Journal of Computer Applications. 185, 14 ( Jun 2023), 24-29. DOI=10.5120/ijca2023922823

@article{ 10.5120/ijca2023922823,
author = { Khyati Jash Desai, Sunil Kumar },
title = { A Study on Face Recognition and Face Spoofing Detection Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2023 },
volume = { 185 },
number = { 14 },
month = { Jun },
year = { 2023 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number14/32764-2023922823/ },
doi = { 10.5120/ijca2023922823 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:26:03.773474+05:30
%A Khyati Jash Desai
%A Sunil Kumar
%T A Study on Face Recognition and Face Spoofing Detection Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 14
%P 24-29
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security has become major concern in early years. For security purpose, Face recognition is used. The security of this technique can be compromised by various attacks. “Face spoofing is one of the attacks where non-original image of valid user’s face presented to the camera to access the system [15]” So the present study attempts to explore the face spoofing detection techniques through a comparative analysis. The present study has three main objectives. 1. To identify and explain the component of face spoofing techniques. 2. To do the comparative analysis on different face spoofing techniques. 3. To develop or modify an efficient technique to find face spoofing. This study is quantitative in nature. This study aims to discover the best method for detecting face spoofing. Identify component like face recognition, effective factors etc. from different techniques. Also this study aims to identify best dataset for detecting face spoofing. This study presents one comparative analyses. It helps one to select a technique for their future work based on its advantages and disadvantages and the dataset used, which helps one to identify the most suitable dataset. At the end this study reviewd some effective techniques for someone who wants to use that technique into their study or work.

References
  1. Electronic IDentification. (2021, July 5). Retrieved from electronicid: https://www.electronicid.eu/en/blog/post/facial-spoofing-what-it-is-how-to-prevent-it-and-spoofing-detection-solutions/en
  2. Almabdy, S., & & Elrefaei, L. (2019, October 17). Deep Convolutional Neural Network-Based Approaches for Face Recognition. Applied Science, 9(20), 1-21.
  3. Daniel N., A. A. (2018). A Study on Recent Trends in Face Spoofing Detection Techniques. nternational Conference on Inventive Computation Technologies (ICICT) (pp. 583-586). Coimbatore, India: IEEE.
  4. Edmunds, T. &., & Caplier, A. (2018). Face Spoofing detection based on colour distortions. IET biometrics, 7(1), 27-38.
  5. Gustavo, B., Daniel, F., Rafael, G., Aparecido, N., & João, P. (2017, October 20). Deep Texture Features for Robust Face Spoofing Detection. IEEE Transactions on Circuits and Systems II: Express Briefs, 64(12), 1397-1401.
  6. Haoliang, L., Wen, L., Hong, C., Shiqi, W., Feiyue, H., & Alex, K. (2018, February 02). Unsupervised Domain Adaptation for Face Anti-Spoofing. IEEE Transactions on Information Forensics and Security, 13(7), 1794-1809.
  7. Jun, Y., Kejia, S., Fei, G., & Suguo, Z. (2018, May 3). Face Biometric Quality Assessment via Light CNN. Pettern Recognition Letters, 107, 25-32.
  8. Kanika kalihal, J. K. (2019, Mar-Apr). A Review on Different Face Spoof Detection Techniques. International Journal of Scientific Research & Engineering Trends , 5(2), 609-611.
  9. Määttä J., H. A. (2012, March). Face spoofing detection from single images using texture and local shape analysis. IET biometrics, 1(1), 3-10.
  10. Nader, E., Mustafa, A., & Banu, A. (2022, Jun 7). Liveness control in face recognition with deep learning methods. The European Journal of Research and Development(Vol. 2 No. 2 (2022): The European Journal of Research and Development), 92-101.
  11. Patrick, C., Weiwen, L., Daniel, Y., Fei, Z., Xizhao, W., & Chien, H. (2017, October 02). Face Liveness Detection Using a Flash Against 2D Spoofing Attack. IEEE Transactions on Information Forensics and Security, 13(2), 521-534.
  12. Rehman, Y. A. (September, 2017). Deep learning for face anti-spoofing: An end-to-end approach. Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA) (pp. 195-200). Poland: IEEE.
  13. Sandeep, K., Sukhwinder, S., & Jagdish, K. (2017). A comparative study on face spoofing attacks. 2017 International Conference on Computing, Communication and Automation (ICCCA) (pp. 1104-1108). Greater Noida: IEEE.
  14. Saumya, S., Jitendra, M., & Poonam, S. (2020). Securing Face Recognition System Using Blockchain Technology. Second International Conference, MIND. 2, pp. 449-460. Silchar,India: Springer.
  15. Shatish, B., & Kumar, S. (May 2019). FACE-SPOOF DETECTION SYSTEM USING CONVOLUTIONAL NEURAL. nternational Conference on Recent trends in Electronics, Computing and Communication Engineering (p. 6). chennai: Conference.
  16. Shervin, R., Josef, K., & William, C. (2017, July 19). An Anomaly Detection Approach to Face Spoofing Detection: A New Formulation and Evaluation Protocol. IEEE Access, 5, 13868 - 13882.
  17. Xiaochao, Z., Yaping, L., & Janne, H. (2017, September 08). Dynamic Texture Recognition Using Volume Local Binary Count Patterns With an Application to 2D Face Spoofing Detection. IEEE Transactions on Multimedia , 20(3), 552-566.
  18. Yang, J., Lei, Z., & Li, S. Z. (2014, Aug). Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv, 2, 1-8.
  19. Zinelabidine Boulkenafet, Z. A. (2016, December 24). Springer Link. Retrieved February 2, 2022, from springer.com: https://link.springer.com/chapter/10.1007/978-3-319-47301-7_13
Index Terms

Computer Science
Information Sciences

Keywords

Face Recognition Face Spoofing Face Spoofing Techniques Comparative Analysis