Prevention of Spoofing Attacks in Face Recognition System Using Liveness Detection

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 02 | Feb -2017

p-ISSN: 2395-0072

www.irjet.net

Prevention of Spoofing Attacks in Face Recognition System Using Liveness Detection Kewal Bhat1,Suryapratap Chauhan2,Gopal Benure3,Prafulla Ambekar4,Prof. Sagar Salunke5 1,2,3,4

BE Students, Dept. of Computer Engineering, PCCOE, Pune, Maharashtra, India

5Professor,

Dept. of Computer Engineering, PCCOE, Pune, Maharashtra, India

---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - Biometric system has gained wide selection of

1.INTRODUCTION

motivations and applications in security domain. Biometric systems relay on the biometric characteristics/data taken from the user for authentication. sadly such biometric information is stolen or duplicated by the imposters/unauthorized users. Most of the biometry systems rely strictly on distinguishing the physiological characteristics of the user. It becomes easier to spoof in these biometric systems with the help of faux biometric it any reduces the dependability and security of biometric system. Spoof fools the system through the method of deception and impersonating others to create out that they're licensed so as to achieve access in to the biometric system. Now a day’s spoofing has become quite common on the net that therefore ends up in determine stealing and fraud. There are several level of spoofing attacks like putting faux biometry on the detector, replay attack, attacking the entrance centre corrupting the intermediator, attacking the application etc. These successively can cut back the extent of security and dependability of biometric system. liveness identification using the facial expression also has been receiving a lot of attention compared to other biometric modalities. prevention of spoof attack in biometric system is done by detecting the liveness of the user with the assistance of native facial expression like eye blinking, lip movement, forehead and chin movement pattern of the face detected with real-time generic web-camera. within the planned work, a good authentication system using face biometric modality by developing the aliveness detection model using the variations within the facial movements.

In this tightly connected networked society, personal identification has become critically necessary. Biometric identifiers are commutation ancient identifiers, because it is troublesome to steal, replace, forget or transfer them. A 2D-image primarily based facial recognition system will be simply spoofed with straightforward tricks and a few poorly-designed systems have even been shown to be fooled by the imposters. Spoofing with photograph or video is one among the foremost common manners to circumvent a face recognition system. Liveness detection mistreatment facial expression in biometric system may be a technique to capture the image of the person and take a look at for his/her aliveness when obtaining documented. Automatic extraction of caput and face boundaries and facial features is vital within the areas of face recognition, criminal identification, security and police investigation systems, human pc interface, and modelbased video writing. In general, the processed face recognition includes four steps. First, the face image is increased and segmental. Second, the face boundary and facial expression square measure detected. Third, the extracted options square measure matched against the options within the information. Fourth, the classification or reorganization of the user is achieved. Further, aliveness of the user is to be tested in-order to forestall the spoof attack. Providing dependableness associate degreed security within the biometric system has become a “need of an hour”. Since the present biometric systems designed mistreatment many strategies and algorithms fails to beat the fraud and larceny identity. It becomes necessary to make an

Key Words: Biometrics, Face Recognition, Liveness detection, Template matching, Spoof attack

© 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

|

Page 554


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.