2023
DOI: 10.3390/bdcc7010037
|View full text |Cite
|
Sign up to set email alerts
|

Face Liveness Detection Using Artificial Intelligence Techniques: A Systematic Literature Review and Future Directions

Abstract: Biometrics has been evolving as an exciting yet challenging area in the last decade. Though face recognition is one of the most promising biometrics techniques, it is vulnerable to spoofing threats. Many researchers focus on face liveness detection to protect biometric authentication systems from spoofing attacks with printed photos, video replays, etc. As a result, it is critical to investigate the current research concerning face liveness detection, to address whether recent advancements can give solutions t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 128 publications
0
5
0
Order By: Relevance
“…Moreover, it is essential to consider real-time applications in disease detection and incorporate them into proposed systems for clinical use. Live capturing for the human face can detect eye blinking and distinguish between the face and a manipulated image [82]. An itemized facial analysis to handle each face organ can provide a contributed optimization and combined analysis for local features can provide higher-accuracy performance while identifying the whole face image.…”
Section: Integrating the Contributed Technologiesmentioning
confidence: 99%
“…Moreover, it is essential to consider real-time applications in disease detection and incorporate them into proposed systems for clinical use. Live capturing for the human face can detect eye blinking and distinguish between the face and a manipulated image [82]. An itemized facial analysis to handle each face organ can provide a contributed optimization and combined analysis for local features can provide higher-accuracy performance while identifying the whole face image.…”
Section: Integrating the Contributed Technologiesmentioning
confidence: 99%
“…The first vulnerable point of the mechanism, exploited by attackers who want to penetrate the system through various techniques and attack tools to manipulate digital facial features, present from the early phase of the authentication process is found at the biometric sensor level. There are well-known attacks such as the presentation attack [61], also known as the spoofing attack which involves various misleading means such as photographic paper, high-resolution photos, video footage, or authentication masks (2D, 3D), the morphing attack [62] which consists of creating artificial facial biometric samples by integrating several faces into a single face, and Deepfake technologies based on artificial intelligence algorithms and deep learning which aim to create fake digital images as persuasive as possible or videos that achieve similarity between two users.…”
Section: Security Vulnerability Assessmentmentioning
confidence: 99%
“…The first vulnerable point of the mechanism, exploited by attackers who want to penetrate the system through various techniques and attack tools to manipulate digital facial features, present from the early phase of the authentication process is found at the biometric sensor level. There are well-known attacks such as the presentation attack [61], also known as the spoofing attack which involves various misleading means such as photographic paper, high-resolution photos, video footage, or authentication masks (2D, 3D), Another vulnerable point of the mechanism is the biometric database, which can be hacked, either by coercion of the system administrator, by completely bypassing the security rings around the database, or by an external attacker who can steal the administrator privileges and the access credentials to directly modify the data stored in the database. Various information can also be injected into the database that can compromise it or alter the biometric templates so that the system can no longer function at optimal parameters.…”
Section: Security Vulnerability Assessmentmentioning
confidence: 99%
“…Live face recognition is an important part of face recognition, which prevents others from using photos, videos, and face models to complete face recognition in place of the person themselves [15]. In this paper, we use near-infrared face detection to prevent the use of others' photos and videos to help with check-in [16].…”
Section: Face Living Recognitionmentioning
confidence: 99%