International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016

Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos

Shyama V S, Mary Linda P A

Biometric authentication systems can be deceived in one way or other. Spoofing attacks to these biometric systems has greatly effected in verifying the identity of an individual. Detection of the spoofing attacks is a serious problem whereas face recognition systems and voice authentication systems are mostly vulnerable to spoofing. Traditional spoofing detection methods are not up to the mark due to the rapid increase in the hacking methodologies. Several spoofing attack detection methods have been proposed but each of them has its own drawbacks. The basic method used in detection of spoofed video uses prior knowledge regarding live face images such as eye blinking and lip movements since attack types are often unknown and very different from each other. Due to the lack of efficiency and accuracy whereas handling excessive attacks, specific cue which is peculiar to the attack must be developed. Thus a data driven approach with high accuracy and efficiency was developed. A combination of Dynamic Mode Decomposition, Principle Component Analysis and Hidden Markovian Model was introduced to provide a better security for the biometric authentication systems in videos. The project focus on both facial spoofing detection and voice spoofing detection in videos simultaneously. Principle Component Analysis and Dynamic Mode Decomposition together helps in the facial biometric authentication and Hidden Markov Model helps in the voice authentication. It considers various facial expressions, and even tilted angled faces in the spoofed samples. Local Binary Patterns, and Support Vector Machine were introduced for identifying print attacks, cut photo attacks and replay attacks. It results in better security, scalability, efficiency and accuracy.

Keywords: Dynamic Mode Decomposition, Hidden Markov Model, Local Binary Patterns, Replay Attacks

Edition: Volume 5 Issue 5, May 2016

Pages: 2345 - 2351


How to Cite this Article?

Shyama V S, Mary Linda P A, "Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163914, Volume 5 Issue 5, May 2016, 2345 - 2351

39 PDF Views | 27 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Hidden Markov Model'

Survey Paper, Computer Science & Engineering, Saudi Arabia, Volume 5 Issue 11, November 2016

Pages: 348 - 351

The Application of Hidden Markov Models (HMMs) in Offline Arabic Handwritten Recognition

Rawia Ahmed, Mohammed Musa

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 707 - 710

Chronological Comparison for Organizing Summaries of Content Anatomy

A. Geetha Vani, B. Naresh Achari

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2345 - 2351

Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos

Shyama V S, Mary Linda P A

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 670 - 674

An Enhancement for Content Sharing Over Smartphone-Based Delay Tolerant Networks

P. Guru Tejaswini, K. Palguna Rao

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 574 - 579

Internet Banking Fraud Detection using HMM and BLAST-SSAHA Hybridization

Avanti H. Vaidya, S. W. Mohod

Share this article



Similar Articles with Keyword 'Local Binary Patterns'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2345 - 2351

Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos

Shyama V S, Mary Linda P A

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 422 - 425

An Empirical Study: Emotional Influence of Indian Classical Raagas on Face

Ashish A. Bardekar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1494 - 1497

Face Recognition using Local Ternary Pattern for Low Resolution Image

Vikas, Amanpreet Kaur

Share this article



Similar Articles with Keyword 'Replay Attacks'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2345 - 2351

Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos

Shyama V S, Mary Linda P A

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1036 - 1037

Survey on Securely Shared Data on Cloud

Priti Padole, Priti Saktel

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1297 - 1299

Secure Cloud Storage with Anonymous Authentication using Decentralized Access Control

Jessy Cherian

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2024 - 2027

Survey Paper on User Anonymous Authentication Scheme for Decentralized Access Control in Clouds

Afsha Pathan, M. D. Ingle

Share this article
Top