Technologies to Overcome Spoofing Attack in Facial Recognition
Kriti Pratap1, Anjali Priya2, Gayathri Mani3
1Kriti Pratap, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
2Anjali Priya, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
3Gayathri Mani, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
Manuscript received on 02 July 2019 | Revised Manuscript received on 12 August 2019 | Manuscript Published on 27 August 2019 | PP: 36-41 | Volume-8 Issue-2S4 July 2019 | Retrieval Number: B10070782S419/2019©BEIESP | DOI: 10.35940/ijrte.B1007.0782S419
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The identification technologies used nowadays consists of biometrics as an essential component. The basic use of a conventional biometric system is to identify the authenticity of an individual through its physical as well as behavioral attributes, which is considered as one of the most suitable method to secure confidentiality of data. Though the security of these systems is stringent to breach, still it does consists of vulnerabilities due to various reasons. One of the major threats the current biometric system possess are the spoofing attacks. Spoofing attacks are difficult to conquer due to the fact that a person tries to masquerade as others in order to gain unauthorized access to the security systems. This is one of the biggest problem concerning the integrity of the biometric system. The study of spoofing attacks has gained interest of various researchers in the field of computer science, still there are aspects which needs greater attention in order to achieve a plausible solution. The study is based on the current biometric systems in order to compare and contrast the existing technology used in facial recognition. A detailed review of the existing anti – spoofing methods will be taken into account to discuss the future research directions. Thus, the work will focus on threats to the current security systems, with an aim to analyse the possible countermeasures, and its applications in real life scenarios.
Keywords: Biometrics, Face Recognition, Security, Spoofing Attack, Vulnerability, Machine Learning.
Scope of the Article: Pattern Recognition