International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 113

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016


Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos

Shyama V S, Mary Linda P A


Abstract: Biometric authentication systems can be deceived in one way or other. Spoofing attacks to these biometric systems has greatly effected in verifying the identity of an individual. Detection of the spoofing attacks is a serious problem whereas face recognition systems and voice authentication systems are mostly vulnerable to spoofing. Traditional spoofing detection methods are not up to the mark due to the rapid increase in the hacking methodologies. Several spoofing attack detection methods have been proposed but each of them has its own drawbacks. The basic method used in detection of spoofed video uses prior knowledge regarding live face images such as eye blinking and lip movements since attack types are often unknown and very different from each other. Due to the lack of efficiency and accuracy whereas handling excessive attacks, specific cue which is peculiar to the attack must be developed. Thus a data driven approach with high accuracy and efficiency was developed. A combination of Dynamic Mode Decomposition, Principle Component Analysis and Hidden Markovian Model was introduced to provide a better security for the biometric authentication systems in videos. The project focus on both facial spoofing detection and voice spoofing detection in videos simultaneously. Principle Component Analysis and Dynamic Mode Decomposition together helps in the facial biometric authentication and Hidden Markov Model helps in the voice authentication. It considers various facial expressions, and even tilted angled faces in the spoofed samples. Local Binary Patterns, and Support Vector Machine were introduced for identifying print attacks, cut photo attacks and replay attacks. It results in better security, scalability, efficiency and accuracy.


Keywords: Dynamic Mode Decomposition, Hidden Markov Model, Local Binary Patterns, Replay Attacks


Edition: Volume 5 Issue 5, May 2016,


Pages: 2345 - 2351


How to Cite this Article?

Shyama V S, Mary Linda P A, "Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV163914, Volume 5 Issue 5, May 2016, 2345 - 2351

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Hidden Markov Model'

Downloads: 103

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1769 - 1771

A Review of Comparatively Study of Different Speaker Recognition Techniques

Umer Malik

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1744 - 1747

A Survey on Optimal Web Service Selection

Dipti Gumfawar, Manjushree Mahajan

Share this Article

Similar Articles with Keyword 'Local Binary Patterns'

Downloads: 116

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 422 - 425

An Empirical Study: Emotional Influence of Indian Classical Raagas on Face

Ashish A. Bardekar

Share this Article

Downloads: 126

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1494 - 1497

Face Recognition using Local Ternary Pattern for Low Resolution Image

Vikas, Amanpreet Kaur

Share this Article

Similar Articles with Keyword 'Replay Attacks'

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Share this Article

Similar Articles with Keyword 'Dynamic'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'Mode'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'Decomposition'

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1259 - 1261

Survey on Edge-Preserving Decomposition-Based Single Image Haze Removal

Neha Beegam P E, Sunena Aboobakar

Share this Article

Similar Articles with Keyword 'Hidden'

Downloads: 75

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patients DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article

Downloads: 98

Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018

Pages: 1409 - 1411

Students Performance Prediction Using FP-Tree Data Mining Techniques

Eliakim Ombati Akama

Share this Article

Similar Articles with Keyword 'Markov'

Downloads: 40

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2591 - 2595

DASU: High Quality Video Streaming Over Multiple Wireless Access Network Using Real Time Adaptive Algorithm

Prathibha T P

Share this Article

Similar Articles with Keyword 'Model'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'Local'

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 65

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

Similar Articles with Keyword 'Binary'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Similar Articles with Keyword 'Patterns'

Downloads: 2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 10, October 2021

Pages: 214 - 218

A Recognition System for Handwritten Digits Using CNN

Ayesha Siddiqa, Chakrapani D S

Share this Article

Downloads: 4

Comparative Studies, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1560 - 1562

A Comparative Study on Different Training Model in Machine Learning

Priyanka S Jigalur, Dr. B. G. Prasad

Share this Article

Similar Articles with Keyword 'Replay'

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

Similar Articles with Keyword 'Attacks'

Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article
Top