Detecting Masquerade in Face Recognition System – A Literature survey
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
A masquerader is an (often external) attacker is one who, after succeeding in obtaining a legitimateuser’s credentials, attempts to use the stolen identity to carry out malicious actions.Automatic detection of masquerading attacks is generally undertaken by approaching theproblem from an anomaly detection perspective: a model of normal behaviour for eachuser is constructed and significant departures from it are identified as potentialmasquerading attempts.The most common techniqueto masquerade a face recognition system is to use a photo print or a video of a valid user to gain illegitimate access. There exist methods in literature addressing this issue. This paper presents an analysis of masquerade detection algorithms in face recognition system.
Authors and Affiliations
Lina. S
Adaptive Discrimination Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient with Collective Feedback
A Distributed denial of service (DDoS) attack is a most popular and crucial attack in the internet. Its motive is to make a network resource unavailable to the legitimate users. Botnets are commonly the engine...
Analysis and Interpretation of Coronary Artery Blockage using Soft Computing Techniques
Abstract: Analysis and interpretation of Myocardial infarction, is very important at the early stage to detect the possible risk for heart attacks. Various non-invasive imaging modalities have been used for better diagno...
Automatic Detection of sunspot activities using advanced detection model
Abstract : Sunspots are dark areas on the photosphere, from which sun emit light. Sunspots are regions located on active regions of the sun and have intense magnetic field [1]. Sunspots appear dark and bright areas...
Performance Analysis of Different Clustering Algorithm
Abstract: Clustering is the process of grouping objects into clusters such that the objects from the sameclusters are similar and objects from different clusters are dissimilar. The relationship is often expressed...
Traffic Event Detection using Computer Vision
Abstract: To make sure that the vehicles on road follow traffic rules, lane disciplines and traffic signals, it takes a lot of human effort and precious time. An automated system which is coupled with traffic camer...