FACIAL VERIFICATION ALONG WITH SPOOF ATTACKS

Jherna Devi, Sajida Parveen, Nadeem Naeem, NidaHusan Abbas
2017 International Journal of Advanced Research  
Face biometrics assumes an essential part in different authentication applications. Yet, there is a design issues exists to ensure the genuine person along with its originality being alived. For the improvement of such kind of robust framework of face verification along with anitspoofing, the database should include three kinds of data i.e. Genuine, Fake and Imposter. In this paper, a database is designed to work for face verification and anti-spoofing technique. The Local Binary Pattern is
more » ... ted to extract the features and calculate the scores for genuine, fake and imposter attacks. This research would provide a more realistic and challenging platform for facial anti-spoofing and verification research. Copy Right, IJAR, 2017,. All rights reserved. ...................................................................................................................... Introduction:-Currently, due to the advancement of electronic gadgets and easy availability of social media, fake facial specimen on different material can easily reproduced and breaches the facial biometric security [1]. To overcome such situation, it is essential to incorporate the anti-spoofing algorithm within face biometric such that the system is able to differentiate between live and spoof face specimen. The appearance of a fake face as a real face is affected by a number of factors, including some life signs such as motions and texture of real skin. To measure the impact of spoofing attacks, face anti-spoofing algorithm need to be trained and tested on a realistic and challenging database that should cover all sort of possible face spoofing attacks for face biometric systems. Also there is need of facial verification database along with its spoof attacks for complete performance evaluation of verification system under the spoof attacks. In this paper, our previously published and designed UPM face spoof database and UPM verification database is utilized for complete modeling of verification system along with anti-spoof countermeasure.
doi:10.21474/ijar01/5291 fatcat:auynyye6endnzihakj7wqgcgri