Review on Various Face Artefact Detection Mechanism
Amanpreet 1 , Anil Kumar2
Section:Review Paper, Product Type: Journal Paper
Volume-7 ,
Issue-4 , Page no. 881-887, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.881887
Online published on Apr 30, 2019
Copyright © Amanpreet, Anil Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Amanpreet, Anil Kumar, “Review on Various Face Artefact Detection Mechanism,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.881-887, 2019.
MLA Style Citation: Amanpreet, Anil Kumar "Review on Various Face Artefact Detection Mechanism." International Journal of Computer Sciences and Engineering 7.4 (2019): 881-887.
APA Style Citation: Amanpreet, Anil Kumar, (2019). Review on Various Face Artefact Detection Mechanism. International Journal of Computer Sciences and Engineering, 7(4), 881-887.
BibTex Style Citation:
@article{Kumar_2019,
author = {Amanpreet, Anil Kumar},
title = {Review on Various Face Artefact Detection Mechanism},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {881-887},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4135},
doi = {https://doi.org/10.26438/ijcse/v7i4.881887}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.881887}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4135
TI - Review on Various Face Artefact Detection Mechanism
T2 - International Journal of Computer Sciences and Engineering
AU - Amanpreet, Anil Kumar
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 881-887
IS - 4
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
323 | 231 downloads | 126 downloads |
Abstract
To automatically recognition of face is wide utilized in a few applications like confirmation of portable payment. Programmed face recognition has raised issues concerning face artefact detection (biometric sensor introduction assaults), in which a photo or video of an approved individual`s face will be utilized to pick up access. There are assortments of face attack discovery strategies are proposed, their speculation capacity has not been sufficiently tended to. The goal of this paper is to review and recognize various face attack detection ways and to sort them into entirely unexpected classes.
Key-Words / Index Term
face attack, image processing, DCT
References
[1]. Aggarwal, A. & Verma, M.K., 2016. Multimodal Biometric Systems – A Survey. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3), pp.437–441.
[2]. Ahuja, M.S. & Chabbra, S., A Survey of Multimodal Biometrics. International journal of Computer Science and its Applications, pp.157–160.
[3]. Das, T.K. & Bhunre, P.K., 2015. LNCS 8956 - A Secure Image Hashing Technique forattack Detection. , pp.335–338.
[4]. Farid, H., 2009. Imageattack Detection [. , (March), pp.16–25.
[5]. Furon, T., 2005. A Survey of Watermarking Security. , pp.201–215.
[6]. Gopal, N. & Selvakumar, R.K., 2016. Multimodal Biometric Identification System - An Overview. International Journal of Engineering Trends and Technology (IJETT), 33(7), pp.351–355.
[7]. Gupta, P., 2012. Cryptography based digital image watermarking algorithm to increase security of watermark data. , 3(9), pp.1–4.
[8]. Imran, M. & Ghafoor, A., 2012. A PCA-DWT-SVD based Color Image Watermarking. , pp.1147–1152.
[9]. Kaushik, R., Kumar, R. & Mathew, J., 2015. On Imageattack Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments. , 70, pp.130–136.
[10]. Ma, Z., 2017. Digital Rights Management : Model , Technology and Application. , pp.156–167.
[11]. Mane, P.V.M., Review of Multimodal Biometrics : Applications , challenges and Research Areas. , 3(5), pp.90–95.
[12]. Oommen, R.S., A Survey of Faceattack Detection Techniques for Digital Images.
[13]. Ozdemir, S., 2007. Secure and Reliable Data Aggregation for. , pp.102–109.
[14]. Panchal, T., 2013. Multimodal Biometric System. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), pp.1360–1363.
[15]. Rani, S., 2015. Available Online at www.ijarcs.info Watermarking using DWT and PCA. , 6(6), pp.117–120.
[16]. Self-embedding, W. et al., 2013. Efficient Method for Content Reconstruction. , 22(3), pp.1134–1147.
[17]. Shaikh, J., 2016. Review of Hand Feature of Unimodal and Multimodal Biometric System. International Journal of Computer Applications, 133(5), pp.19–24.
[18]. Sheikh, Z.G. & Thakare, V.M., 2016. Wavelet Based Feature Extraction Technique for Face Recognition and Retrieval : A Review. , pp.49–54.