A survey of liveness detection methods for face biometric systems

Sensor Review ◽  
2017 ◽  
Vol 37 (3) ◽  
pp. 346-356 ◽  
Author(s):  
Yang Xin ◽  
Yi Liu ◽  
Zhi Liu ◽  
Xuemei Zhu ◽  
Lingshuang Kong ◽  
...  

Purpose Biometric systems are widely used for face recognition. They have rapidly developed in recent years. Compared with other approaches, such as fingerprint recognition, handwriting verification and retinal and iris scanning, face recognition is more straightforward, user friendly and extensively used. The aforementioned approaches, including face recognition, are vulnerable to malicious attacks by impostors; in such cases, face liveness detection comes in handy to ensure both accuracy and robustness. Liveness is an important feature that reflects physiological signs and differentiates artificial from real biometric traits. This paper aims to provide a simple path for the future development of more robust and accurate liveness detection approaches. Design/methodology/approach This paper discusses about introduction to the face biometric system, liveness detection in face recognition system and comparisons between the different discussed works of existing measures. Originality/value This paper presents an overview, comparison and discussion of proposed face liveness detection methods to provide a reference for the future development of more robust and accurate liveness detection approaches.

Author(s):  
Prasad A. Jagdale ◽  
Sudeep D. Thepade

Nowadays the system which holds private and confidential data are being protected using biometric password such as finger recognition, voice recognition, eyries and face recognition. Face recognition match the current user face with faces present in the database of that security system and it has one major drawback that it never works better if it doesn’t have liveness detection. These face recognition system can be spoofed using various traits. Spoofing is accessing a system software or data by harming the biometric recognition security system. These biometric systems can be easily attacked by spoofs like peoples face images, masks and videos which are easily available from social media. The proposed work mainly focused on detecting the spoofing attack by training the system. Spoofing methods like photo, mask or video image can be easily identified by this method. This paper proposed a fusion technique where different features of an image are combining together so that it can give best accuracy in terms of distinguish between spoof and live face. Also a comparative study is done of machine learning classifiers to find out which classifiers gives best accuracy.


Sensor Review ◽  
2018 ◽  
Vol 38 (3) ◽  
pp. 269-281 ◽  
Author(s):  
Hima Bindu ◽  
Manjunathachari K.

Purpose This paper aims to develop the Hybrid feature descriptor and probabilistic neuro-fuzzy system for attaining the high accuracy in face recognition system. In recent days, facial recognition (FR) systems play a vital part in several applications such as surveillance, access control and image understanding. Accordingly, various face recognition methods have been developed in the literature, but the applicability of these algorithms is restricted because of unsatisfied accuracy. So, the improvement of face recognition is significantly important for the current trend. Design/methodology/approach This paper proposes a face recognition system through feature extraction and classification. The proposed model extracts the local and the global feature of the image. The local features of the image are extracted using the kernel based scale invariant feature transform (K-SIFT) model and the global features are extracted using the proposed m-Co-HOG model. (Co-HOG: co-occurrence histograms of oriented gradients) The proposed m-Co-HOG model has the properties of the Co-HOG algorithm. The feature vector database contains combined local and the global feature vectors derived using the K-SIFT model and the proposed m-Co-HOG algorithm. This paper proposes a probabilistic neuro-fuzzy classifier system for the finding the identity of the person from the extracted feature vector database. Findings The face images required for the simulation of the proposed work are taken from the CVL database. The simulation considers a total of 114 persons form the CVL database. From the results, it is evident that the proposed model has outperformed the existing models with an improved accuracy of 0.98. The false acceptance rate (FAR) and false rejection rate (FRR) values of the proposed model have a low value of 0.01. Originality/value This paper proposes a face recognition system with proposed m-Co-HOG vector and the hybrid neuro-fuzzy classifier. Feature extraction was based on the proposed m-Co-HOG vector for extracting the global features and the existing K-SIFT model for extracting the local features from the face images. The proposed m-Co-HOG vector utilizes the existing Co-HOG model for feature extraction, along with a new color gradient decomposition method. The major advantage of the proposed m-Co-HOG vector is that it utilizes the color features of the image along with other features during the histogram operation.


2019 ◽  
Vol 46 (6) ◽  
pp. 761-783 ◽  
Author(s):  
Mohammad Hashemi Joo ◽  
Yuka Nishikawa ◽  
Krishnan Dandapani

Purpose The purpose of this paper is to recognize the benefits of the initial coin offering (ICO) as a way of raising funds and to present a detailed comparison between the ICO and the initial public offering to realize the future possibilities that this new funding method holds. Design/methodology/approach It is an exhaustive review of the ICO, the mechanism of crowdfunding, the blockchain technology behind it, benefits and current shortcomings of the ICO, and the potential future development of the ICO as a convenient and efficient way of raising capital. Findings ICOs have brought billions of dollars of funding to startups and projects worldwide in less than two years. Concurrently, many successful ICOs yielded extremely high returns to investors and believers of this new way of funding businesses. Research limitations/implications While the ICO is a revolutionary vehicle for business funding, it has raised concerns among users as well as potential investors about its risk and lack of regulation. The future of this innovative funding method highly depends on further development and placement of appropriate regulatory supervision, better understanding of risk and benefits and attaining the confidence of users. Originality/value This is a review of the advantages and drawbacks of the ICO. If the current fraud, market and cybersecurity risks can be mitigated and standardized regulations are developed, the ICO has a future to become an established way of capital funding or even replace the existing options, regardless of the size and age of companies.


Author(s):  
Piyush Manish Sonar ◽  
Aniket Nitin Chaudhari ◽  
Mehul Deepak Sethi ◽  
Tejaswini Sanjay Gadakh

Face is the representation of one’s identity. Hence, we have proposed an automated student attendance system based on face recognition. Face recognition system is very useful in life applications especially for attendance system. In our proposed approach, firstly, video framing is performed by activating the camera through a user-friendly interface. In the pre-processing stage, scaling of the size of images is performed, if necessary, in order to prevent loss of information. In face recognition stage, enhanced local binary pattern (LBP) and principal component analysis (PCA) is applied correspondingly in order to extract the features from facial images. Another way of marking the attendance is fingerprint recognition. To mark the attendance students simply have to give the fingerprint impression in fingerprint scanner module. Finally, the attendance of the recognized student will be marked and saved in the excel file. The student who is not registered will also be able to register on the spot and notification will be given if students sign in more than once. Whenever seminar is completed then a link is sent on email. It includes the information in terms of feedback. When student fills the feedback form then analysis of overall session is done.


2019 ◽  
Vol 75 (1) ◽  
pp. 158-161
Author(s):  
Gang-Hua Chen ◽  
Songshan (Sam) Huang

Purpose This paper aims to contemplate the past development of backpacker tourism research and assess the future development of backpacker tourism research. Design/methodology/approach The authors evaluate the research on backpacker tourism in the past in the following three aspects, namely, research themes, research methods and geographical and cultural contexts of research. Findings Backpackers and backpacker tourism have been evolving in the past 75 years, just as other groups of travelers and forms of travel have. With the rapid pace of globalization in our time, backpacker tourism and its kinship forms will remain an important international tourism phenomenon, with root reasons in different types of economies and societies. As such, it will remain to be a significant research subject for tourism researchers in the future. Originality/value This paper contemplates the past development and assesses the future development of backpacker tourism research.


2020 ◽  
Vol 2 (1) ◽  
pp. 33-45
Author(s):  
Noha El-Bassiouny ◽  
Ahmed Amin ◽  
Ahmad Jamal

Purpose The main research attempts guiding questions about management research agendas had been relevance questions versus rigor questions. Researchers have also attempted to set management research agendas in particular sectors. To the best of the authors’ knowledge, no research, however, has addressed the infrastructural and foundational questions of what moral priorities and ethical principles should guide the future development of management research. Because the Islamic theological approach is a “transcendental values integration” approach, it presents a potentially viable source of reference particularly for scholars interested in ethical philosophical paradigmatic approaches. Islamic literature has presented guiding principles as to how to balance priorities through the Jurisprudence of Priorities (Fiqh Al-Awlawiyyat). The purpose of this exploratory conceptual paper is to synchronize the Islamic background literature on the jurisprudence of priorities with management research development and agendas. The research is exploratory in nature. Design/methodology/approach The paper is conceptual, merging Islamic literature with management research for the development of a framework to potentially guide management researchers in prioritizing their research agendas. Findings The research resulted in the conceptualization of a framework aiding researchers in the prioritization of their research agendas. Research limitations/implications The research has implications for management scholars who are interested to prioritize their research projects and agendas. The research presents a schematic diagram and guiding framework through which scholars can reflect on their choice of research topics. Practical implications The research is also relevant to funding agencies as they devise the funding priorities in the management field. Originality/value This paper addresses the unique and foundational question of what moral priorities and ethical principles should guide the future development of management research. The authors build on a religious-philosophical approach, drawing on the Islamic jurisprudence of priorities as a literature base. The authors, therefore, address the key principles of responsible research regarding how it can be relevant on the infrastructural level to society and how the benefit to key stakeholders should be tackled. To the authors’ knowledge, this was not done in previous literature.


2013 ◽  
Vol 2013 ◽  
pp. 1-11 ◽  
Author(s):  
Martin Drahansky ◽  
Michal Dolezel ◽  
Jan Vana ◽  
Eva Brezinova ◽  
Jaegeol Yim ◽  
...  

This paper is devoted to new optical methods, which are supposed to be used for liveness detection on fingers. First we describe the basics about fake finger use in fingerprint recognition process and the possibilities of liveness detection. Then we continue with introducing three new liveness detection methods, which we developed and tested in the scope of our research activities—the first one is based on measurement of the pulse, the second one on variations of optical characteristics caused by pressure change, and the last one is based on reaction of skin to illumination with different wavelengths. The last part deals with the influence of skin diseases on fingerprint recognition, especially on liveness detection.


Sign in / Sign up

Export Citation Format

Share Document