Downloads: 113 | Views: 276
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.9 / 10
Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos
Shyama V S, Mary Linda P A
Abstract: Biometric authentication systems can be deceived in one way or other. Spoofing attacks to these biometric systems has greatly effected in verifying the identity of an individual. Detection of the spoofing attacks is a serious problem whereas face recognition systems and voice authentication systems are mostly vulnerable to spoofing. Traditional spoofing detection methods are not up to the mark due to the rapid increase in the hacking methodologies. Several spoofing attack detection methods have been proposed but each of them has its own drawbacks. The basic method used in detection of spoofed video uses prior knowledge regarding live face images such as eye blinking and lip movements since attack types are often unknown and very different from each other. Due to the lack of efficiency and accuracy whereas handling excessive attacks, specific cue which is peculiar to the attack must be developed. Thus a data driven approach with high accuracy and efficiency was developed. A combination of Dynamic Mode Decomposition, Principle Component Analysis and Hidden Markovian Model was introduced to provide a better security for the biometric authentication systems in videos. The project focus on both facial spoofing detection and voice spoofing detection in videos simultaneously. Principle Component Analysis and Dynamic Mode Decomposition together helps in the facial biometric authentication and Hidden Markov Model helps in the voice authentication. It considers various facial expressions, and even tilted angled faces in the spoofed samples. Local Binary Patterns, and Support Vector Machine were introduced for identifying print attacks, cut photo attacks and replay attacks. It results in better security, scalability, efficiency and accuracy.
Keywords: Dynamic Mode Decomposition, Hidden Markov Model, Local Binary Patterns, Replay Attacks
Edition: Volume 5 Issue 5, May 2016
Pages: 2345 - 2351
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 723
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera