z-logo
open-access-imgOpen Access
Technologies to Overcome Spoofing Attack in Facial Recognition
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.b1007.0782s419
Subject(s) - spoofing attack , biometrics , computer security , computer science , identification (biology) , focus (optics) , field (mathematics) , confidentiality , order (exchange) , face (sociological concept) , facial recognition system , internet privacy , artificial intelligence , pattern recognition (psychology) , business , social science , botany , physics , mathematics , finance , sociology , pure mathematics , optics , biology
The identification technologies used nowadays consists of biometrics as an essential component. The basic use of a conventional biometric system is to identify the authenticity of an individual through its physical as well as behavioral attributes, which is considered as one of the most suitable method to secure confidentiality of data. Though the security of these systems is stringent to breach, still it does consists of vulnerabilities due to various reasons. One of the major threats the current biometric system possess are the spoofing attacks. Spoofing attacks are difficult to conquer due to the fact that a person tries to masquerade as others in order to gain unauthorized access to the security systems. This is one of the biggest problem concerning the integrity of the biometric system. The study of spoofing attacks has gained interest of various researchers in the field of computer science, still there are aspects which needs greater attention in order to achieve a plausible solution. The study is based on the current biometric systems in order to compare and contrast the existing technology used in facial recognition. A detailed review of the existing anti – spoofing methods will be taken into account to discuss the future research directions. Thus, the work will focus on threats to the current security systems, with an aim to analyse the possible countermeasures, and its applications in real life scenarios.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here