Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014
Antispoofing Methods for Authenticating Live Users in Biometric System
Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal
In todays e-commerce world the e-business application require a very high level of authentication; as the existing traditional authenticating methods such as username; password; identity card etc can be easily stolen. To alleviate such problems the new authenticating methods using physiological/behavioral biometrics are emerged. Even the biometrics systems are fooled by spoofing techniques with fake biometric traits such as masked face; iris; fake finger print; hand geometry; voice and many more. Spoofing is an attack when a malicious party impersonates another device or a user on a network/system in order to launch a attacks against new hosts/system. Hence; the anti-spoofing methods required to challenge the intruders of the biometric system. However; spoofing attack is still a fatal threat for biometric authentication systems. Liveness detection; aims at recognition of human physiological activities as the liveness indicator to prevent spoofing attack. This paper presents an overview of different anti-spoofing methods used with biometric system. It also highlights the issues; challenges and applications of biometric systems with anti-spoofing techniques.
Keywords: Authentication, spoofing, biometric, anti-spoof, liveness detection
Edition: Volume 3 Issue 6, June 2014
Pages: 2694 - 2699
How to Cite this Article?
Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal, "Antispoofing Methods for Authenticating Live Users in Biometric System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014896, Volume 3 Issue 6, June 2014, 2694 - 2699
104 PDF Views | 94 PDF Downloads
Similar Articles with Keyword 'Authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1548 - 1550Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication
Chaitali P. Kathar, Vidya Dhamdhere
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Similar Articles with Keyword 'spoofing'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1809 - 1812Efficient Flow Marking IP Traceback System
Sonali H. Mane, S. Pratap Singh
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1262 - 1265A Survey on IP Traceback Mechanisms
Aparna C Bhadran, Maria Joy
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2982 - 2984Protection of Server from Proxy Based HTTP Attacks
Poonam Uttam Patil, Y. V. Chavan
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017
Pages: 1588 - 1590Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
Apurva J. Shastri, S. R. Tandle
Similar Articles with Keyword 'biometric'
Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 890 - 894A Survey on Types of Crawlers and Web Searching Algorithms
T. Yogameera, Dr. D. Shanthi
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 165 - 167Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics
Nisha, Jatinder Kansal, JPS Raina
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1907 - 1913Human Gait Recognition Using Multisvm Classifier
Saranya Sasidharan, Smitha K S, Minu Thomas
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 143 - 146Offline Signature Verification Using Contour Tracing
Madhuri, Alok
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017
Pages: 1670 - 1675Experimental Study of a Person Identification Framework Based on Combining Left and Right Palmprint Images
Mane Bhagyashri, Kalyankar Pravin
Similar Articles with Keyword 'liveness detection'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2694 - 2699Antispoofing Methods for Authenticating Live Users in Biometric System
Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 2599 - 2603Iris Image Classification: A Survey
Anjali Hake, Pradeep Patil
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 692 - 695A Survey on Face Spoofing Detection
Farsana N U, Selin M