Survey of non-intrusive face spoof detection methods

Biometrics are distinct physiological characteristics used to describe individuals. Compared to the traditional access control methods such as passwords and Person Identification Numbers (PIN) which can be forgotten and shared easily, biometrics are widely used in authentication systems. Even though...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2021-04, Vol.80 (10), p.14693-14721
Hauptverfasser: Patil, Pooja R., Kulkarni, Subhash S.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Biometrics are distinct physiological characteristics used to describe individuals. Compared to the traditional access control methods such as passwords and Person Identification Numbers (PIN) which can be forgotten and shared easily, biometrics are widely used in authentication systems. Even though the accuracy of face recognition systems is lower than that of the systems using fingerprint, iris, etc. as the acquisition devices of the latter evade the affine and photometric transformations, recognition systems with the face as a trait are widely used due to the contactless and non-intrusive nature of the acquisition device-camera. As the cameras are in-built in most of the handheld and portable devices such as mobile phones and laptops, the uncontrolled and/or unregulated immediacy of sharing the photographs via messaging services and uploading on social networks entices the attackers to create spoofs to deceive a face recognition system. Hence, it is necessary to incorporate a spoof detection algorithm in recognition systems before revealing the identity. This paper gives an overview of the steps involved in the face spoof detection process, the various databases available, the different measures to discern between live and spoof images, aligned with the perceived observance, the binary classifiers used, and the performance evaluation parameters revealed in the literature.
ISSN:1380-7501
1573-7721
DOI:10.1007/s11042-020-10338-1