{ "access": { "embargo": { "active": false, "reason": null }, "files": "public", "record": "public", "status": "open" }, "created": "2022-01-10T03:37:22.535345+00:00", "custom_fields": { "journal:journal": { "issue": "2", "pages": "225-232", "title": "International Journal of Recent Technology and Engineering (IJRTE)", "volume": "10" }, "legacy:subjects": [ { "identifier": "2277-3878", "scheme": "issn", "term": "ISSN" }, { "identifier": "100.1/ijrte.B63090710221", "scheme": "handle", "term": "Retrieval Number:" } ] }, "deletion_status": { "is_deleted": false, "status": "P" }, "files": { "count": 1, "enabled": true, "entries": { "B63090710221.pdf": { "checksum": "md5:49103cd2ab1ff3d7c708660e1dc47dd4", "ext": "pdf", "id": "cb91c02a-d28f-4fcf-a121-74df8ef60747", "key": "B63090710221.pdf", "metadata": null, "mimetype": "application/pdf", "size": 591012 } }, "order": [], "total_bytes": 591012 }, "id": "5832162", "is_draft": false, "is_published": true, "links": { "access": "https://zenodo.org/api/records/5832162/access", "access_links": "https://zenodo.org/api/records/5832162/access/links", "access_request": "https://zenodo.org/api/records/5832162/access/request", "access_users": "https://zenodo.org/api/records/5832162/access/users", "archive": "https://zenodo.org/api/records/5832162/files-archive", "archive_media": "https://zenodo.org/api/records/5832162/media-files-archive", "communities": "https://zenodo.org/api/records/5832162/communities", "communities-suggestions": "https://zenodo.org/api/records/5832162/communities-suggestions", "doi": "https://doi.org/10.35940/ijrte.B6309.0710221", "draft": "https://zenodo.org/api/records/5832162/draft", "files": "https://zenodo.org/api/records/5832162/files", "latest": "https://zenodo.org/api/records/5832162/versions/latest", "latest_html": "https://zenodo.org/records/5832162/latest", "media_files": "https://zenodo.org/api/records/5832162/media-files", "parent": "https://zenodo.org/api/records/5832161", "parent_doi": "https://zenodo.org/doi/", "parent_html": "https://zenodo.org/records/5832161", "requests": "https://zenodo.org/api/records/5832162/requests", "reserve_doi": "https://zenodo.org/api/records/5832162/draft/pids/doi", "self": "https://zenodo.org/api/records/5832162", "self_doi": "https://zenodo.org/doi/10.35940/ijrte.B6309.0710221", "self_html": "https://zenodo.org/records/5832162", "self_iiif_manifest": "https://zenodo.org/api/iiif/record:5832162/manifest", "self_iiif_sequence": "https://zenodo.org/api/iiif/record:5832162/sequence/default", "versions": "https://zenodo.org/api/records/5832162/versions" }, "media_files": { "count": 0, "enabled": false, "entries": {}, "order": [], "total_bytes": 0 }, "metadata": { "contributors": [ { "affiliations": [ { "name": "Publisher" } ], "person_or_org": { "family_name": "Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)", "name": "Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)", "type": "personal" }, "role": { "id": "sponsor", "title": { "de": "Sponsor", "en": "Sponsor" } } } ], "creators": [ { "affiliations": [ { "name": "Pursuing, Master Degree, Department of Computer Science and Engineering, Basaveshwar Engineering College (Autonomous), Bagalkot, Visvesvaraya Technological University, Belagavi ( Karnataka), India." } ], "person_or_org": { "family_name": "Shweta Policepatil", "name": "Shweta Policepatil", "type": "personal" } }, { "affiliations": [ { "name": "Department of Computer Science and Engineering, Basaveshwar Engineering College, Bagalkot, Visvesvaraya Technological University, Belagavi ( Karnataka), India." } ], "person_or_org": { "family_name": "Sanjeeva Kumar M. Hatture", "name": "Sanjeeva Kumar M. Hatture", "type": "personal" } } ], "description": "
Biometrics systems are mostly used to establish an automated way for validating or recognising a living or nonliving person's identity based on physiological and behavioural features. Now a day’s biometric system has become trend in personal identification for security purpose in various fields like online banking, e-payment, organizations, institutions and so on. Face biometric is the second largest biometric trait used for unique identification while fingerprint is being the first. But face recognition systems are susceptible to spoof attacks made by nonreal faces mainly known as masquerade attack. The masquerade attack is performed using authorized users’ artifact biometric data that may be artifact facial masks, photo or iris photo or any latex finger. This type of attack in Liveness detection has become counter problem in the today's world. To prevent such spoofing attack, we proposed Liveness detection of face by considering the countermeasures and texture analysis of face and also a hybrid approach which combine both passive and active liveness detection is used. Our proposed approach achieves accuracy of 99.33 percentage for face anti-spoofing detection. Also we performed active face spoofing by providing several task (turn face left, turn face right, blink eye, etc) that performed by user on live camera for liveness detection.
", "languages": [ { "id": "eng", "title": { "en": "English" } } ], "publication_date": "2021-07-30", "publisher": "Zenodo", "related_identifiers": [ { "identifier": "2277-3878", "relation_type": { "id": "iscitedby", "title": { "de": "Wird zitiert von", "en": "Is cited by" } }, "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "scheme": "issn" } ], "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "rights": [ { "description": { "en": "The Creative Commons Attribution license allows re-distribution and re-use of a licensed work on the condition that the creator is appropriately credited." }, "icon": "cc-by-icon", "id": "cc-by-4.0", "props": { "scheme": "spdx", "url": "https://creativecommons.org/licenses/by/4.0/legalcode" }, "title": { "en": "Creative Commons Attribution 4.0 International" } } ], "subjects": [ { "subject": "Face Recognition; Pattern Recognition; Feature Extraction; Anti-Spoofing, Masquerade Attack." } ], "title": "Masquerade Attack Analysis for Secured Face Biometric System" }, "parent": { "access": { "owned_by": { "user": 282476 } }, "communities": {}, "id": "5832161", "pids": {} }, "pids": { "doi": { "identifier": "10.35940/ijrte.B6309.0710221", "provider": "external" }, "oai": { "identifier": "oai:zenodo.org:5832162", "provider": "oai" } }, "revision_id": 2, "stats": { "all_versions": { "data_volume": 42552864.0, "downloads": 72, "unique_downloads": 71, "unique_views": 68, "views": 72 }, "this_version": { "data_volume": 42552864.0, "downloads": 72, "unique_downloads": 71, "unique_views": 65, "views": 69 } }, "status": "published", "updated": "2022-01-10T13:48:48.905338+00:00", "versions": { "index": 1, "is_latest": true } }