SCNN Based Classification Technique for the Face Spoof Detection Using Deep Learning Concept
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2022.13.2.25Keywords:
Liveness Detection, Convolutional Neural Network, Face recognition.Dimensions Badge
Issue
Section
License
Copyright (c) 2022 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Face spoofing refers to “tricking” a facial recognition system to gain unauthorized access to a particular system. It is mostly used to steal data and money or spread malware. The malicious impersonation of oneself is a critical component of face spoofing to gain access to a system. It is observed in many identity theft cases, particularly in the financial sector. In 2015, Wen et al. presented experimental results for cutting-edge commercial off-the-shelf face recognition systems. These demonstrated the probability of fake face images being accepted as genuine. The probability could be as high as 70%. Despite this, the vulnerabilities of face recognitionAbstract
systems to attacks were frequently overlooked. The Presentation Attack Detection (PAD) method that determines whether the source of a biometric sample is a live person or a fake representation is known as Liveness Detection. Algorithms are used to accomplish this by analyzing biometric sensor data for the determination of the authenticity of a source.
How to Cite
Downloads
Similar Articles
- Bhavya Sathenapalli, Kali Charan Sabat, Unleashing entrepreneurial spirit: Driving innovation and growth in a rapidly changing world , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Rajeshwari D, C. Victoria Priscilla, An optimized real-time human detected keyframe extraction algorithm (HDKFE) based on faster R-CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- T. Kanimozhi, V. Rajeswari, R. Suguna, J. Nirmaladevi, P. Prema, B. Janani, R. Gomathi, RWHO: A hybrid of CNN architecture and optimization algorithm to predict basal cell carcinoma skin cancer in dermoscopic images , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- P. Ananthi, A. Chandrabose, The socio-technical opportunities and threats of crowdsensing , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Roshni Kanth, R Guru, Anusuya M A, Madhu B K, A comprehensive study of AI in test case generation: Analysing industry trends and developing a predictive model , The Scientific Temper: Vol. 16 No. Spl-1 (2025): The Scientific Temper
- A. Sahaya Mercy, Dr. G. Arockia Sahaya Sheela, Speckle-Robust Local Phase and Ternary Texture Encoding (SLaP-TEX) based Feature Extraction for Liver Steatosis Classification in Ultrasound Imaging , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- M. Balamurugan, A. Bharathiraja, An enhanced hybrid GCNN-MHA-GRU approach for symptom-to-medicine recommendation by utilizing textual analysis of customer reviews , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Mallamma V. Reddy, Sachhidanand Sidramappa, Digitization and Recognition of Kannada Inscription Dynasty , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Archana Verma, Application of metaverse technologies and artificial intelligence in smart cities , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 7 8 9 10 11 12 13 14 15 16 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Abhishek Dwivedi, Nikhat Raza Khan, Reconfiguration of Automated Manufacturing Systems Using Gated Graph Neural Networks , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper

