The Comprehensive Review of Face Anti-Spoofing Techniques

  • Sudeep D. Thepade, Mayuresh R. Dindorkar, Piyush R. Chaudhari, Rohit B. Bangar, Shalakha V. Bang

Abstract

Assorted robust security systems are using different biometric modalities such as face, eyes, fingers, palms, voice, etc. Among them, face recognition is the one which needs no cooperation from user and is contactless. Increase in use of face biometric systems have raised many new challenges in day to day applications such as smartphones, laptops, banking sector, airports, criminal identification, online exams or interviews, etc. Spoofing refers to bypassing biometric security systems by acquiring unauthorized access. Numerous face recognition systems lack face liveness detection functionality. Hence these systems are liable to suffer from various face spoofing attacks such as mask attack, photo attack, video replay attack, cut photo attack, etc. Photo attack is mostly preferred because of its low cost and simplicity. This paper gives a brief overview of various face presentation attacks (FPA) and face anti-spoofing techniques. This paper also covers different methodologies for face spoofing detection, description of the experimentation databases available for face spoofing detection and aims to provide new research direction in this field.

Published
2020-05-26
How to Cite
Sudeep D. Thepade, Mayuresh R. Dindorkar, Piyush R. Chaudhari, Rohit B. Bangar, Shalakha V. Bang. (2020). The Comprehensive Review of Face Anti-Spoofing Techniques. International Journal of Advanced Science and Technology, 29(05), 8196-8205. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/18468