Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014
Antispoofing Methods for Authenticating Live Users in Biometric System
Anita Kori | Swathi S. Wali | Sanjeev Kumar M. Hatture | Dr. Suvarna Nandyal 
Abstract: In todays e-commerce world the e-business application require a very high level of authentication; as the existing traditional authenticating methods such as username; password; identity card etc can be easily stolen. To alleviate such problems the new authenticating methods using physiological/behavioral biometrics are emerged. Even the biometrics systems are fooled by spoofing techniques with fake biometric traits such as masked face; iris; fake finger print; hand geometry; voice and many more. Spoofing is an attack when a malicious party impersonates another device or a user on a network/system in order to launch a attacks against new hosts/system. Hence; the anti-spoofing methods required to challenge the intruders of the biometric system. However; spoofing attack is still a fatal threat for biometric authentication systems. Liveness detection; aims at recognition of human physiological activities as the liveness indicator to prevent spoofing attack. This paper presents an overview of different anti-spoofing methods used with biometric system. It also highlights the issues; challenges and applications of biometric systems with anti-spoofing techniques.
Keywords: Authentication, spoofing, biometric, anti-spoof, liveness detection
Edition: Volume 3 Issue 6, June 2014,
Pages: 2694 - 2699
How to Cite this Article?
Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal, "Antispoofing Methods for Authenticating Live Users in Biometric System", International Journal of Science and Research (IJSR), Volume 3 Issue 6, June 2014, pp. 2694-2699, https://www.ijsr.net/get_abstract.php?paper_id=2014896
How to Share this Article?
Similar Articles with Keyword 'Authentication'
Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Digital Image Watermarking Technique Using Discrete Wavelet Transform and Discrete Cosine Transform