International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 108

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014


Antispoofing Methods for Authenticating Live Users in Biometric System

Anita Kori | Swathi S. Wali | Sanjeev Kumar M. Hatture | Dr. Suvarna Nandyal [5]


Abstract: In todays e-commerce world the e-business application require a very high level of authentication; as the existing traditional authenticating methods such as username; password; identity card etc can be easily stolen. To alleviate such problems the new authenticating methods using physiological/behavioral biometrics are emerged. Even the biometrics systems are fooled by spoofing techniques with fake biometric traits such as masked face; iris; fake finger print; hand geometry; voice and many more. Spoofing is an attack when a malicious party impersonates another device or a user on a network/system in order to launch a attacks against new hosts/system. Hence; the anti-spoofing methods required to challenge the intruders of the biometric system. However; spoofing attack is still a fatal threat for biometric authentication systems. Liveness detection; aims at recognition of human physiological activities as the liveness indicator to prevent spoofing attack. This paper presents an overview of different anti-spoofing methods used with biometric system. It also highlights the issues; challenges and applications of biometric systems with anti-spoofing techniques.


Keywords: Authentication, spoofing, biometric, anti-spoof, liveness detection


Edition: Volume 3 Issue 6, June 2014,


Pages: 2694 - 2699


How to Cite this Article?

Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal, "Antispoofing Methods for Authenticating Live Users in Biometric System", International Journal of Science and Research (IJSR), Volume 3 Issue 6, June 2014, pp. 2694-2699, https://www.ijsr.net/get_abstract.php?paper_id=2014896

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021

Pages: 1257 - 1264

Digital Image Watermarking Technique Using Discrete Wavelet Transform and Discrete Cosine Transform

Bhupendra Ram

Share this Article


Top