Open Access   Article Go Back

Review on Various Face Artefact Detection Mechanism

Amanpreet 1 , Anil Kumar2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 881-887, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.881887

Online published on Apr 30, 2019

Copyright © Amanpreet, Anil Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Amanpreet, Anil Kumar, “Review on Various Face Artefact Detection Mechanism,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.881-887, 2019.

MLA Style Citation: Amanpreet, Anil Kumar "Review on Various Face Artefact Detection Mechanism." International Journal of Computer Sciences and Engineering 7.4 (2019): 881-887.

APA Style Citation: Amanpreet, Anil Kumar, (2019). Review on Various Face Artefact Detection Mechanism. International Journal of Computer Sciences and Engineering, 7(4), 881-887.

BibTex Style Citation:
@article{Kumar_2019,
author = {Amanpreet, Anil Kumar},
title = {Review on Various Face Artefact Detection Mechanism},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {881-887},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4135},
doi = {https://doi.org/10.26438/ijcse/v7i4.881887}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.881887}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4135
TI - Review on Various Face Artefact Detection Mechanism
T2 - International Journal of Computer Sciences and Engineering
AU - Amanpreet, Anil Kumar
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 881-887
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
292 201 downloads 105 downloads
  
  
           

Abstract

To automatically recognition of face is wide utilized in a few applications like confirmation of portable payment. Programmed face recognition has raised issues concerning face artefact detection (biometric sensor introduction assaults), in which a photo or video of an approved individual`s face will be utilized to pick up access. There are assortments of face attack discovery strategies are proposed, their speculation capacity has not been sufficiently tended to. The goal of this paper is to review and recognize various face attack detection ways and to sort them into entirely unexpected classes.

Key-Words / Index Term

face attack, image processing, DCT

References

[1]. Aggarwal, A. & Verma, M.K., 2016. Multimodal Biometric Systems – A Survey. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3), pp.437–441.
[2]. Ahuja, M.S. & Chabbra, S., A Survey of Multimodal Biometrics. International journal of Computer Science and its Applications, pp.157–160.
[3]. Das, T.K. & Bhunre, P.K., 2015. LNCS 8956 - A Secure Image Hashing Technique forattack Detection. , pp.335–338.
[4]. Farid, H., 2009. Imageattack Detection [. , (March), pp.16–25.
[5]. Furon, T., 2005. A Survey of Watermarking Security. , pp.201–215.
[6]. Gopal, N. & Selvakumar, R.K., 2016. Multimodal Biometric Identification System - An Overview. International Journal of Engineering Trends and Technology (IJETT), 33(7), pp.351–355.
[7]. Gupta, P., 2012. Cryptography based digital image watermarking algorithm to increase security of watermark data. , 3(9), pp.1–4.
[8]. Imran, M. & Ghafoor, A., 2012. A PCA-DWT-SVD based Color Image Watermarking. , pp.1147–1152.
[9]. Kaushik, R., Kumar, R. & Mathew, J., 2015. On Imageattack Detection Using Two Dimensional Discrete Cosine Transform and Statistical Moments. , 70, pp.130–136.
[10]. Ma, Z., 2017. Digital Rights Management : Model , Technology and Application. , pp.156–167.
[11]. Mane, P.V.M., Review of Multimodal Biometrics : Applications , challenges and Research Areas. , 3(5), pp.90–95.
[12]. Oommen, R.S., A Survey of Faceattack Detection Techniques for Digital Images.
[13]. Ozdemir, S., 2007. Secure and Reliable Data Aggregation for. , pp.102–109.
[14]. Panchal, T., 2013. Multimodal Biometric System. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), pp.1360–1363.
[15]. Rani, S., 2015. Available Online at www.ijarcs.info Watermarking using DWT and PCA. , 6(6), pp.117–120.
[16]. Self-embedding, W. et al., 2013. Efficient Method for Content Reconstruction. , 22(3), pp.1134–1147.
[17]. Shaikh, J., 2016. Review of Hand Feature of Unimodal and Multimodal Biometric System. International Journal of Computer Applications, 133(5), pp.19–24.
[18]. Sheikh, Z.G. & Thakare, V.M., 2016. Wavelet Based Feature Extraction Technique for Face Recognition and Retrieval : A Review. , pp.49–54.