SCNN Based Classification Technique for the Face Spoof Detection Using Deep Learning Concept
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2022.13.2.25Keywords:
Liveness Detection, Convolutional Neural Network, Face recognition.Dimensions Badge
Issue
Section
License
Copyright (c) 2022 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Face spoofing refers to “tricking” a facial recognition system to gain unauthorized access to a particular system. It is mostly used to steal data and money or spread malware. The malicious impersonation of oneself is a critical component of face spoofing to gain access to a system. It is observed in many identity theft cases, particularly in the financial sector. In 2015, Wen et al. presented experimental results for cutting-edge commercial off-the-shelf face recognition systems. These demonstrated the probability of fake face images being accepted as genuine. The probability could be as high as 70%. Despite this, the vulnerabilities of face recognitionAbstract
systems to attacks were frequently overlooked. The Presentation Attack Detection (PAD) method that determines whether the source of a biometric sample is a live person or a fake representation is known as Liveness Detection. Algorithms are used to accomplish this by analyzing biometric sensor data for the determination of the authenticity of a source.
How to Cite
Downloads
Similar Articles
- S. SATHIYAVATHI, V. MATHIVANAN, SELVI SABHANAYAKAM, WESTERN BLOT ASSAY OF SELECTED PATIENTS BLOOD INFECED WITH HIV : IN AND AROUND SALEM DISTRICT, TAMILNADU, INDIA. , The Scientific Temper: Vol. 2 No. 1&2 (2011): The Scientific Temper
- J. Helan Shali Margret, N. Amsaveni, Application of Lotka’s law in Indian cytokine publications: A scientometric study based on web of science during 1998 TO 2022 , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Pinkey Kumari Prasad, Kalidasan Varathan, Effect of concise arm rehabilitation for stroke patients approach vs modified constraint-induced movement therapy on hand functions in post stroke hemiparetic subjects , The Scientific Temper: Vol. 16 No. 07 (2025): The Scientific Temper
- Geetha Satish Pisharody, Sanjay Gupta, Understanding Resilience: An Analytical Study of Adversity Quotient Levels Among Higher Secondary Learners in Gujarat State , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- R.R. Jenifer, V.S.J. Prakash, Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Poornima Dave, Aditi Shrimali, MATRIMANAS digital app for maternal mental healthcare: A research proposal , The Scientific Temper: Vol. 16 No. Spl-1 (2025): The Scientific Temper
- B Supraja, B Ramachandra, N Venkatasubba Naidu, Analytical Method Development and Validation Analysis for Quantitative Assessment of Thifluzamide by HPLC Procedure , The Scientific Temper: Vol. 13 No. 01 (2022): The Scientific Temper
- Arunachalaprabu G, Fathima Bibi K, A pattern-driven Huffman encoding and positional encoding for DNA compression , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Vishakha Khambhati, Rajan Kumar Singh, Assessment of Respiratory Dynamics from ECG during Physical Exertion , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Dhulasi Priya S, Saranya K G, Significance of artificial intelligence in the development of sustainable transportation , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
<< < 10 11 12 13 14 15 16 17 18 19 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Abhishek Dwivedi, Nikhat Raza Khan, Reconfiguration of Automated Manufacturing Systems Using Gated Graph Neural Networks , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper

