5 research outputs found

    Texture analysis using local ternary pattern for face anti-spoofing

    Get PDF
    This paper proposes a new face anti-spoofing approach based on analysis of texture characteristics. Photo images are used for spoofing the face recognition and verification system. These photos are similar to the images of a live person which are exhibiting quite different contrast and texture characteristics when compared to real face images. Various feature extraction methods for texture classification including local Binary Patterns emerge as one of the most popular method because of its simplicity and classification accuracy. However, in homogenous regions, the order of the pixel with respect to its neighbors is quite noisy which can affect the performance of Local Binary Pattern. This paper demonstrates the use of local Ternary Pattern (LTP) in face liveness detection system to overcome this problem. The LTP approach is tested on three publicly available NUAA Photograph Imposter database, CASIA Face Anti -Spoofing Database and REPLAY-ATTACK database. Moreover, different experiments are performed by applying different sizes of neighbor pixels and radius of the patches. The test results are compared with the LBP operator and other state-of art work. The proposed face anti-spoofing method performs better than conventional texture based methods

    State-of-the-art in techniques of text digital watermarking: challenges and limitations

    Get PDF
    Data protection from malicious attacks and misuse has become a crucial issue. Various types of data, including images, videos, audio and text documents, have given cause for the development of different methods for their protection. Cryptography, digital signatures and steganography are the most well known technologies used to protect data. During the last decade, digital watermarking technology has also been utilized as an alternative to prevent media forgery and tampering or falsification to ensure both copyright and authentication. Much work has been done to protect images, videos and audio but only a few algorithms have been considered for text document protection with digital watermarking. However, our survey observed that available text watermarking algorithms are neither robust nor imperceptible and as such remain unsecured methods of protection. Hence, research to improve the performance of text watermarking algorithms is required. This paper reviews current watermarking algorithms for text documents and categorizes text watermarking methods based on the way the text was treated during the watermarking process. It also discusses merits and demerits of available methods as well as recent proposed methods for evaluating text watermarking systems and the need for further research on digital text watermarking

    DEEP LEARNING DETECTION OF FACIAL BIOMETRIC PRESENTATION ATTACK: Received: 11th May 2022; Revised: 19th June 2022, 01st July 2022, 08th July 2022; Accepted: 08th July 2022

    No full text
    Face recognition systems have gained increasing importance in today’s society, which applications range from access controls to secure systems to electronic devices such as mobile phones and laptops. However, the security of face recognition systems is currently being threatened by the emergence of spoofing attacks that happens when someone tries to unauthorizedly bypass the biometric system by presenting a photo, 3-dimensional mask, or replay video of a legit user. The video attacks are perhaps one of the most frequent, cheapest, and simplest spoofing techniques to cheat face recognition systems. This research paper focuses on face liveness detection in video attacks, intending to determine if the provided input biometric samples came from a live face or spoof attack by extracting frames from the videos and classifying them by using the Resnet-50 deep learning algorithm. The majority voting mechanism is used as a decision fusion to derive a final verdict. The experiment was conducted on the spoof videos of the Replay-attack dataset. The results demonstrated that the optimal number of frames for video liveness detection is 3 with an accuracy of 96.93 %.  This result is encouraging since the low number of frames requires minimal time for processing

    System and method for protecting digital documents and preventing unauthorized distribution of documents to third party

    No full text
    A method for protecting digital document from unauthorized distribution of the document to any third party includes the steps of receiving the at least one digital document by at least one client, dynamically generating watermarking bits to be embedded on to said at least one digital document, embedding the watermarking bits on to the digital document, and generating at least one watermarked digital document
    corecore