Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    Liveness Detection using CNN: An Overview

    Abstract

    Face recognition System has advanced quickly over the years, and it is now better, user-friendly, and efficient than previous approaches. One of the most severe threats to facial recognition systems is face spoofing. However, scholars interested in improving the security of such biometric systems against purposeful spoofing assaults have recently expressed an interest in liveness detection. Because of the low resource needs and low processing costs, analysis of the textural features of the skin is becoming more popular in this field. We must be able to differentiate such fake/unreal faces in order to improve the security of facial recognition. Texture analysis utilizing the local binary pattern (LBP) of facial areas and heuristic algorithms that employ eye movement, lip movement, and blink detection are few of the many ways for determining if a face is real or fraudulent. This study suggests using liveness detection to prevent spoofing attacks. In this face recognition system we will be performing liveliness detection using OpenCV and Deep Learning techniques.

    Reviewer Photo

    Phanindra Kumar Kankanampati Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Phanindra Kumar Kankanampati Reviewer

    10 Oct 2024 03:45 PM

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The Research Article addresses the critical issue of face spoofing in facial recognition systems, highlighting the growing importance of liveness detection. This focus on enhancing biometric security is timely and relevant, given the increasing use of facial recognition in various applications. The originality of the study lies in its exploration of texture analysis and heuristic algorithms for detecting spoofing attacks, presenting a unique contribution to the field of biometric security.


    Methodology

    The methodology outlined in the Research Article discusses the use of local binary patterns (LBP) and heuristic algorithms, such as eye movement and blink detection, for liveness detection. While the approach is relevant, more detailed descriptions of the algorithms and their implementation would enhance understanding. Furthermore, outlining the experimental setup, data collection processes, and evaluation metrics used to assess the effectiveness of the proposed methods would strengthen the methodology.


    Validity & Reliability

    The validity of the proposed liveness detection methods is crucial for their practical application. The Research Article suggests using low-resource and cost-effective techniques, which can improve accessibility. However, it would be beneficial to provide empirical evidence or test results demonstrating the accuracy and reliability of these methods in real-world scenarios. Discussing potential limitations and how the system performs under varying conditions would further support the validity of the approach.


    Clarity and Structure

    The Research Article is structured logically, with a clear flow from the introduction of the problem to the proposed solutions. However, clarity could be enhanced by incorporating headings and subheadings to better delineate sections. Additionally, including diagrams or illustrations to represent the liveness detection process would aid in visual comprehension and engagement with the content.


    Result Analysis

    The result analysis in the Research Article emphasizes the potential of liveness detection techniques to prevent spoofing attacks. While the article outlines the methods used, it would benefit from a more comprehensive analysis of results obtained from testing these techniques. Providing quantitative data on detection accuracy, processing times, and comparison with existing methods would strengthen the analysis. Additionally, discussing future directions and potential enhancements to the proposed system would offer valuable insights for further research in this area.

    Publisher Logo

    IJ Publication Publisher

    Thank You Sir

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Phanindra Kumar

    Phanindra Kumar Kankanampati

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    IJNRD - INTERNATIONAL JOURNAL OF NOVEL RESEARCH AND DEVELOPMENT External Link

    Info Icon

    p-ISSN

    Info Icon

    e-ISSN

    2456-4184

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp