SCNN Based Classification Technique for the Face Spoof Detection Using Deep Learning Concept
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2022.13.2.25Keywords:
Liveness Detection, Convolutional Neural Network, Face recognition.Dimensions Badge
Issue
Section
License
Copyright (c) 2022 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Face spoofing refers to “tricking” a facial recognition system to gain unauthorized access to a particular system. It is mostly used to steal data and money or spread malware. The malicious impersonation of oneself is a critical component of face spoofing to gain access to a system. It is observed in many identity theft cases, particularly in the financial sector. In 2015, Wen et al. presented experimental results for cutting-edge commercial off-the-shelf face recognition systems. These demonstrated the probability of fake face images being accepted as genuine. The probability could be as high as 70%. Despite this, the vulnerabilities of face recognitionAbstract
systems to attacks were frequently overlooked. The Presentation Attack Detection (PAD) method that determines whether the source of a biometric sample is a live person or a fake representation is known as Liveness Detection. Algorithms are used to accomplish this by analyzing biometric sensor data for the determination of the authenticity of a source.
How to Cite
Downloads
Similar Articles
- Sohini Bhattacharyya, Ajay Kumar Harit, Manoj Singh, Urvashi Sharma, Chaitramayee Pradhan, Occurrence of Antibiotic Resistance in Lotic Ecosystems , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- S. C. Prabha, P. Sivaraaj, S. Kantha Lakshmi, Data analysis and machine learning-based modeling for real-time production , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Krishna P. Kalyanathaya, Krishna Prasad K, A framework for generating explanations of machine learning models in Fintech industry , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- A. Anand, A. Nisha Jebaseeli, AI-driven real-time performance optimization and comparison of virtual machines and containers in cloud environments , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- S. SATHIYAVATHI, V. MATHIVANAN, SELVI SABHANAYAKAM, WESTERN BLOT ASSAY OF SELECTED PATIENTS BLOOD INFECED WITH HIV : IN AND AROUND SALEM DISTRICT, TAMILNADU, INDIA. , The Scientific Temper: Vol. 2 No. 1&2 (2011): The Scientific Temper
- Bratati Dey, Poonam Sharma, A comprehensive review of urban growth studies and predictions using the Sleuth model , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Sujay Bhalchandra, Nilesh D. Shinde, An exploratory study of factors influencing manufacturer-dealer relationship in Indian automobile industry , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Prakash Lakhani, Premasish Roy, Souren Koner, Deepa Nair, D. Patil, Mona Sinha, Exploring the influence of work-life balance on employee engagement in Mumbai’s real estate industry , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- R. Porselvi, D. Kanchana, Beulah Jackson, L. Vigneash, Dynamic resource management for 6G vehicular networks: CORA-6G offloading and allocation strategies , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Raja Selvaraj, Manikandasaran S Sundaram, ECM: Enhanced confidentiality method to ensure the secure migration of data in VM to cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 5 6 7 8 9 10 11 12 13 14 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Abhishek Dwivedi, Nikhat Raza Khan, Reconfiguration of Automated Manufacturing Systems Using Gated Graph Neural Networks , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper