Abstract

Even though biometric technology increases the security of systems that use it, they are prone to spoof attacks where attempts of fraudulent biometrics are used. To overcome these risks, techniques on detecting liveness of the biometric measure are employed. For example, in systems that utilise face authentication as biometrics, a liveness is assured using an estimation of blood flow, or analysis of quality of the face image. Liveness assurance of the face using real depth technique is rarely used in biometric devices and in the literature, even with the availability of depth datasets. Therefore, this technique of employing 3D cameras for liveness of face authentication is underexplored for its vulnerabilities to spoofing attacks. This research reviews the literature on this aspect and then evaluates the liveness detection to suggest solutions that account for the weaknesses found in detecting spoofing attacks. We conduct a proof-of-concept study to assess the liveness detection of 3D cameras in three devices, where the results show that having more flexibility resulted in achieving a higher rate in detecting spoofing attacks. Nonetheless, it was found that selecting a wide depth range of the 3D camera is important for anti-spoofing security recognition systems such as surveillance cameras used in airports. Therefore, to utilise the depth information and implement techniques that detect faces regardless of the distance, a 3D camera with long maximum depth range (e.g., 20 m) and high resolution stereo cameras could be selected, which can have a positive impact on accuracy.

Highlights

  • The metrics that assess measurements of body identifiers of a person to distinguish them from others are called biometrics

  • It was found that selecting a wide depth range of the 3D camera is important for anti-spoofing security recognition systems such as surveillance cameras used in airports

  • We review in details all the research work that investigated liveness detection from face biometrics

Read more

Summary

Introduction

The metrics that assess measurements of body identifiers of a person to distinguish them from others are called biometrics These biometrics are unique for each individual and are used as a technology to secure systems for authenticating (identification) purposes. Fake masks of different material are being used to access face recognition systems Such attacks are at hand for many people due to the fact that the materials used in such attacks are affordable and within reach of everyone. The researchers will record the details of the depressed individuals before watching the videos and compare it with the details of the same depressed individual after watching the videos In this case, the data is user dependent because researchers are comparing a sample of data with the same sample of data in different situations

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call