Abstract
Abstract:
 In a world where biometric identification and authentication is increasingly growing, it is critical for IT Security personnel to have an understanding of how these systems they use work, and weaknesses that lay with them. Face recognition is a very common form of biometric identification and authentication, where the face of the user is used to both identify and authenticate the user. This paper serves as a literature review for a preliminary understanding of face recognition systems. First the basics of how a facial recognition system works is reviewed. After this, selected articles demonstrating a variety of facial recognition spoofing attacks are summarized to demonstrate the attack surface. This is then followed by a review of studies conducted for defenses against these attacks, focusing primarily on the key concepts used to help identify spoofing attempts. This paper then concludes by summarizing the findings, and explaining the importance of understanding these different aspects of facial recognition from a business perspective.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal for Electronic Crime Investigation
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.