Downloads: 122 | Views: 260
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 7 / 10
Applications of Client Identity Information for Face Antispoofing
Poonam Nemade, Deeksha Bhardwaj
Abstract: Lately, facial biometric frameworks have gotten expanded organization in different applications, for example, reconnaissance, access control and measurable examinations. On the other hand, one of the confinements of face antispoofing framework is the high probability of the framework being hoodwinked or mock by non-genuine faces, for example, photo, video clasps or sham countenances. With a specific end goal to recognize the caricaturing assaults on such biometric frameworks, face liveness discovery methodologies have been produced. Along these lines, the present methodology is to coordinate liveness recognition inside of facial biometrics by utilizing life sign markers of individual elements. This paper introduces a survey of best in class strategies in face liveness identification, which are arranged into two gatherings, to be specific meddlesome and non-nosy methodologies. Here, each strategy is talked about as far as its execution, qualities and impediments, and also signs on.
Keywords: Biometrics, face antispoofing, meddlesome, liveness recognition, non-nosy
Edition: Volume 4 Issue 11, November 2015
Pages: 271 - 273
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera