31May 2017

FACIAL VERIFICATION ALONG WITH SPOOF ATTACKS.

  • Department of Information Technology, Quaid-e-Awam univertersity of Engineering, Science and Technology, Nawabshah, Pakistan.
  • Department of Computer Systems Engineering, Quaid-e-Awam univertersity of Engineering, Science and Technology, Nawabshah, Pakistan.
  • Department of Electronic Engineering, Quaid-e-Awam univertersity of Engineering, Science and Technology, Nawabshah, Pakistan.
  • Department of Computer and Communication Systems Engineering Universiti Putra Malaysia (UPM), Serdang, 43400, Selangor Darul Ehsan, Malaysia.
Crossref Cited-by Linking logo
  • Abstract
  • Keywords
  • References
  • Cite This Article as
  • Corresponding Author

Face biometrics assumes an essential part in different authentication applications. Yet, there is a design issues exists to ensure the genuine person along with its originality being alived. For the improvement of such kind of robust framework of face verification along with anit-spoofing, the database should include three kinds of data i.e. Genuine, Fake and Imposter. In this paper, a database is designed to work for face verification and anti-spoofing technique. The Local Binary Pattern is adopted to extract the features and calculate the scores for genuine, fake and imposter attacks. This research would provide a more realistic and challenging platform for facial anti-spoofing and verification research.


  1. Nixon, Kristin Adair, Valerio Aimale, and Robert K. Rowe. "Spoof detection schemes." In Handbook of biometrics, pp. 403-423. Springer US, 2008.
  2. Hadid, Abdenour. "Face Biometrics Under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions." In Computer Vision and Pattern Recognition Workshops (CVPRW), 2014 IEEE Conference on, pp. 113-118. IEEE, 2014.
  3. Tan, Xiaoyang, Yi Li, Jun Liu, and Lin Jiang. "Face liveness detection from a single image with sparse low rank bilinear discriminative model." In Computer Vision?ECCV 2010, pp. 504-517. Springer Berlin Heidelberg, 2010.
  4. Anjos, Andr?, and S?bastien Marcel. "Counter-measures to photo attacks in face recognition: a public database and a baseline." In Biometrics (IJCB), 2011 International Joint Conference on, pp. 1-7. IEEE, 2011.
  5. Ojala, T., Pietikainen, M., & Maenpaa, T. (2002). Multiresolution gray-scale and rotation invariant texture classification with local binary patterns.?IEEE Transactions on pattern analysis and machine intelligence,?24(7), 971-987.

[Jherna Devi, Sajida Parveen, Nadeem Naeem and Nida Husan Abbas. (2017); FACIAL VERIFICATION ALONG WITH SPOOF ATTACKS. Int. J. of Adv. Res. 5 (May). 2264-2268] (ISSN 2320-5407). www.journalijar.com


Jherna Devi
Department of Information Technology, Quaid-e-Awam univertersity of Engineering, Science and Technology, Nawabshah, Pakistan

DOI:


Article DOI: 10.21474/IJAR01/5291      
DOI URL: http://dx.doi.org/10.21474/IJAR01/5291