International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Antispoofing Methods for Authenticating Live Users in Biometric System

Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal

In todays e-commerce world the e-business application require a very high level of authentication; as the existing traditional authenticating methods such as username; password; identity card etc can be easily stolen. To alleviate such problems the new authenticating methods using physiological/behavioral biometrics are emerged. Even the biometrics systems are fooled by spoofing techniques with fake biometric traits such as masked face; iris; fake finger print; hand geometry; voice and many more. Spoofing is an attack when a malicious party impersonates another device or a user on a network/system in order to launch a attacks against new hosts/system. Hence; the anti-spoofing methods required to challenge the intruders of the biometric system. However; spoofing attack is still a fatal threat for biometric authentication systems. Liveness detection; aims at recognition of human physiological activities as the liveness indicator to prevent spoofing attack. This paper presents an overview of different anti-spoofing methods used with biometric system. It also highlights the issues; challenges and applications of biometric systems with anti-spoofing techniques.

Keywords: Authentication, spoofing, biometric, anti-spoof, liveness detection

Edition: Volume 3 Issue 6, June 2014

Pages: 2694 - 2699


How to Cite this Article?

Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal, "Antispoofing Methods for Authenticating Live Users in Biometric System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014896, Volume 3 Issue 6, June 2014, 2694 - 2699

22 PDF Views | 25 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2644 - 2649

Misbehavior Packet Detection Approach using Effective Trust in Delay-Tolerant Networks

Prerana S. Jagadale, Prashant Jawalkar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this article



Similar Articles with Keyword 'spoofing'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2345 - 2351

Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos

Shyama V S, Mary Linda P A

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2694 - 2699

Antispoofing Methods for Authenticating Live Users in Biometric System

Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal

Share this article



Similar Articles with Keyword 'biometric'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2717 - 2720

Multi Biometrics: Overview and User Perception Survey

Harendra Singh Mahour, Hemant Makwana

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 2058 - 2060

Biometric Template Security Scheme using Fuzzy Vault

Purva Gabhane, Anisa Anjum

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2599 - 2603

Iris Image Classification: A Survey

Anjali Hake, Pradeep Patil

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2031 - 2035

A Review on Various Fusion and Features Extraction Approaches for Multi-Modal Biometric Authentication System

Hardeep Kaur, Paramjit Kaur

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2402 - 2405

Finger Vein Recognition Using Minutiae Extraction and Curve Analysis

Komal Bansal, Supreet Kaur

Share this article



Similar Articles with Keyword 'liveness detection'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2599 - 2603

Iris Image Classification: A Survey

Anjali Hake, Pradeep Patil

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2694 - 2699

Antispoofing Methods for Authenticating Live Users in Biometric System

Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 692 - 695

A Survey on Face Spoofing Detection

Farsana N U, Selin M

Share this article
Top