Entropy-Based Face Recognition and Spoof Detection for Security Applications

Author:

Pujol Francisco A.ORCID,Pujol María José,Rizo-Maestre CarlosORCID,Pujol MarORCID

Abstract

Nowadays, cyber attacks are becoming an extremely serious issue, which is particularly important to prevent in a smart city context. Among cyber attacks, spoofing is an action that is increasingly common in many areas, such as emails, geolocation services or social networks. Identity spoofing is defined as the action by which a person impersonates a third party to carry out a series of illegal activities such as committing fraud, cyberbullying, sextorsion, etc. In this work, a face recognition system is proposed, with an application to the spoofing prevention. The method is based on the Histogram of Oriented Gradients (HOG) descriptor. Since different face regions do not have the same information for the recognition process, introducing entropy would quantify the importance of each face region in the descriptor. Therefore, entropy is added to increase the robustness of the algorithm. Regarding face recognition, our approach has been tested on three well-known databases (ORL, FERET and LFW) and the experiments show that adding entropy information improves the recognition rate significantly, with an increase over 40% in some of the considered databases. Spoofing tests has been implemented on CASIA FASD and MIFS databases, having obtained again better results than similar texture descriptors approaches.

Publisher

MDPI AG

Subject

Management, Monitoring, Policy and Law,Renewable Energy, Sustainability and the Environment,Geography, Planning and Development

Reference69 articles.

1. Handbook of Biometrics

2. Consumers rule: why the biometrics market is facing major disruption

3. Global Biometrics Market Revenue to Reach $15.1 Billion by 2025 | Tractica https://www.tractica.com/newsroom/press-releases/global-biometrics-market-revenue-to-reach-15-1-billion-by-2025/

4. Mobile biometrics revenues predicted to boom

5. Security and Cryptographic Challenges for Authentication Based on Biometrics Data

Cited by 13 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Face spoofing detection using Heterogeneous Auto-Similarities of Characteristics;Engineering Applications of Artificial Intelligence;2024-04

2. Vulnerability Analysis of Low-Entropy Face Recognition Systems against Brute Force Attacks;2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS);2024-02-24

3. YSAF: Yolo with Spatial Attention and FFT to Detect Face Spoofing Attacks;2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC);2024-02-07

4. Fractal-Thermodynamic system analogy and complexity of plant leaves;Environmental Research Communications;2023-05-01

5. Machine Learning for Face Recognition in Shallow Data;Data Science and Algorithms in Systems;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3