Abstract
Biometric methods are of considerable value when used alone or in combination with other identity verification technologies. Two-dimensional facial recognition approaches provide low cost and convenient recognition system due to convenience and ease of use. Rapid face image substitution is one of the main problems in 2D face area. Biometric systems can be attacked by fakes such as images of people’s faces, masks and videos that are easily accessible from social networks. The typical disadvantage of survivability detection in consumer-grade methods is a significant disadvantage and limits the value of device-built biometric authentication in smartphones and tablets. The work is devoted to the study of methods for verifying the belonging of a biometric sample to a living person. The relevance of the work is due to the expansion of the use of biometric authentication systems and the need to protect the biometric identification and authentication processes from hacking attempts using photographs or video. For the experimental evaluation of the complex application of the studied methods, a prototype of a multi-module system for testing faces using neural networks and heuristic algorithms was developed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ant, A.: Technology insight for biometric authentication. https://www.gartner.com/document/3796577. Accessed 21 July 2019
Smith, R.: Authentication: from passwords to public keys: trans. from English. Publishing House “Williams”, Moscow (2002)
Owano, N.: Windows hello: researches bypass face authentification. https://techxplore.com/433232362.pdf. Accessed 12 Apr 2019
ISO/IEC 30107-3: 2017 Information technology. Biometric detection technology attacks. Part 3. Testing and reporting. Identification cards. Chip cards Biometrics (2017)
Viola, P., Jones, M.: Robust real-time face detection. Int. J. Comput. Vis., 137–154 (2004)
Li, H., Li, W., Cao, H., Wang, S., Huang, F., Kot, A.: Unsupervised domain adaptation for face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 13(7), 1794–1809 (2018)
Ding, H.: Facenet2expnet: regularizing a face for expression recognition. https://arxiv.org/pdf/1609.06591. Accessed 05 June 2019
Chung, J.: Lip reading in the wild. In: Asian Conference on Computer Vision, pp. 87–103. Springer, Cham (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Ivanova, E., Borzunov, G. (2020). Improving the Security of the Facial Biometrics System Using the Liveness Detection Module. In: Misyurin, S., Arakelian, V., Avetisyan, A. (eds) Advanced Technologies in Robotics and Intelligent Systems. Mechanisms and Machine Science, vol 80. Springer, Cham. https://doi.org/10.1007/978-3-030-33491-8_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-33491-8_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33490-1
Online ISBN: 978-3-030-33491-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)