Entropy-Based Face Recognition and Spoof Detection for Security Applications
Francisco A. Pujol,
María José Pujol,
Carlos Rizo-Maestre and
Mar Pujol
Additional contact information
Francisco A. Pujol: Department of Computer Technology, University of Alicante, 03690 San Vicente del Raspeig-Alicante, Spain
María José Pujol: Department of Applied Mathematics, University of Alicante, 03690 San Vicente del Raspeig-Alicante, Spain
Carlos Rizo-Maestre: Department of Architectural Constructions, University of Alicante, 03690 San Vicente del Raspeig-Alicante, Spain
Mar Pujol: Department of Computer Science and Artificial Intelligence, University of Alicante, 03690 San Vicente del Raspeig-Alicante, Spain
Sustainability, 2019, vol. 12, issue 1, 1-18
Abstract:
Nowadays, cyber attacks are becoming an extremely serious issue, which is particularly important to prevent in a smart city context. Among cyber attacks, spoofing is an action that is increasingly common in many areas, such as emails, geolocation services or social networks. Identity spoofing is defined as the action by which a person impersonates a third party to carry out a series of illegal activities such as committing fraud, cyberbullying, sextorsion, etc. In this work, a face recognition system is proposed, with an application to the spoofing prevention. The method is based on the Histogram of Oriented Gradients (HOG) descriptor. Since different face regions do not have the same information for the recognition process, introducing entropy would quantify the importance of each face region in the descriptor. Therefore, entropy is added to increase the robustness of the algorithm. Regarding face recognition, our approach has been tested on three well-known databases (ORL, FERET and LFW) and the experiments show that adding entropy information improves the recognition rate significantly, with an increase over 40% in some of the considered databases. Spoofing tests has been implemented on CASIA FASD and MIFS databases, having obtained again better results than similar texture descriptors approaches.
Keywords: face recognition; security; spoofing; histogram of oriented gradients; smart cities (search for similar items in EconPapers)
JEL-codes: O13 Q Q0 Q2 Q3 Q5 Q56 (search for similar items in EconPapers)
Date: 2019
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2071-1050/12/1/85/pdf (application/pdf)
https://www.mdpi.com/2071-1050/12/1/85/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jsusta:v:12:y:2019:i:1:p:85-:d:300458
Access Statistics for this article
Sustainability is currently edited by Ms. Alexandra Wu
More articles in Sustainability from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().