Studi Literatur Presentation Attack dan Set Data Anti-Spoof Wajah
Face anti-spoof systems are needed in facial recognition systems to ward off attacks that present fake faces in front of the camera or image capture sensor (presentation attack). To build the system, a data set is needed to build a classification model that distinguishes the authenticity of the face...
Main Authors: | , |
---|---|
Format: | Article |
Language: | Indonesian |
Published: |
Universitas Negeri Semarang
2022-06-01
|
Series: | Jurnal Teknik Elektro |
Subjects: | |
Online Access: | https://journal.unnes.ac.id/nju/index.php/jte/article/view/36108 |
_version_ | 1817976467886178304 |
---|---|
author | I Kadek Dendy Senapartha Gabriel Indra Widi Tamtama |
author_facet | I Kadek Dendy Senapartha Gabriel Indra Widi Tamtama |
author_sort | I Kadek Dendy Senapartha |
collection | DOAJ |
description | Face anti-spoof systems are needed in facial recognition systems to ward off attacks that present fake faces in front of the camera or image capture sensor (presentation attack). To build the system, a data set is needed to build a classification model that distinguishes the authenticity of the face of the input image received by the system. In the past decade anti-face spoof research has produced many data sets that are public, but often researchers need time to build or use the right public data sets that are used to build facial anti-spoof models. This article conducts a literature study of public data sets using a systematic literature review method to find out the types of attacks that appear on the facial anti-spoof system, the development process, evolution, and availability of facial anti-spoof data sets. From the search and selection results based on the specified criteria, there were 42 primary research manuscripts in the period 2010 to 2021. The results of the literature study found that there were three trends in the development of anti-spoof facial data sets, namely, 1) data sets with a very large number, 2) datasets with different types of facial samples, and 3) datasets constructed with various devices and sensors. These various public data sets can be accessed freely but with special rules such as agreeing to an end user license agreement document from the researcher or the institution that owns the data set. However, there are also datasets that cannot be accessed due to invalid URLs or due to special rules from the cloud storage service provider where the datasets are stored. |
first_indexed | 2024-04-13T22:03:55Z |
format | Article |
id | doaj.art-4fa53cb482c9417e91bb3b75d5139968 |
institution | Directory Open Access Journal |
issn | 1411-0059 2549-1571 |
language | Indonesian |
last_indexed | 2024-04-13T22:03:55Z |
publishDate | 2022-06-01 |
publisher | Universitas Negeri Semarang |
record_format | Article |
series | Jurnal Teknik Elektro |
spelling | doaj.art-4fa53cb482c9417e91bb3b75d51399682022-12-22T02:28:01ZindUniversitas Negeri SemarangJurnal Teknik Elektro1411-00592549-15712022-06-01141101710.15294/jte.v14i1.3610812711Studi Literatur Presentation Attack dan Set Data Anti-Spoof WajahI Kadek Dendy Senapartha0Gabriel Indra Widi Tamtama1Universitas Kristen Duta WacanaUniversitas Kristen Duta WacanaFace anti-spoof systems are needed in facial recognition systems to ward off attacks that present fake faces in front of the camera or image capture sensor (presentation attack). To build the system, a data set is needed to build a classification model that distinguishes the authenticity of the face of the input image received by the system. In the past decade anti-face spoof research has produced many data sets that are public, but often researchers need time to build or use the right public data sets that are used to build facial anti-spoof models. This article conducts a literature study of public data sets using a systematic literature review method to find out the types of attacks that appear on the facial anti-spoof system, the development process, evolution, and availability of facial anti-spoof data sets. From the search and selection results based on the specified criteria, there were 42 primary research manuscripts in the period 2010 to 2021. The results of the literature study found that there were three trends in the development of anti-spoof facial data sets, namely, 1) data sets with a very large number, 2) datasets with different types of facial samples, and 3) datasets constructed with various devices and sensors. These various public data sets can be accessed freely but with special rules such as agreeing to an end user license agreement document from the researcher or the institution that owns the data set. However, there are also datasets that cannot be accessed due to invalid URLs or due to special rules from the cloud storage service provider where the datasets are stored.https://journal.unnes.ac.id/nju/index.php/jte/article/view/36108face anti-spoof datasetface anti-spoof modelface anti-spoof systemface recognition systempresentation attack |
spellingShingle | I Kadek Dendy Senapartha Gabriel Indra Widi Tamtama Studi Literatur Presentation Attack dan Set Data Anti-Spoof Wajah Jurnal Teknik Elektro face anti-spoof dataset face anti-spoof model face anti-spoof system face recognition system presentation attack |
title | Studi Literatur Presentation Attack dan Set Data Anti-Spoof Wajah |
title_full | Studi Literatur Presentation Attack dan Set Data Anti-Spoof Wajah |
title_fullStr | Studi Literatur Presentation Attack dan Set Data Anti-Spoof Wajah |
title_full_unstemmed | Studi Literatur Presentation Attack dan Set Data Anti-Spoof Wajah |
title_short | Studi Literatur Presentation Attack dan Set Data Anti-Spoof Wajah |
title_sort | studi literatur presentation attack dan set data anti spoof wajah |
topic | face anti-spoof dataset face anti-spoof model face anti-spoof system face recognition system presentation attack |
url | https://journal.unnes.ac.id/nju/index.php/jte/article/view/36108 |
work_keys_str_mv | AT ikadekdendysenapartha studiliteraturpresentationattackdansetdataantispoofwajah AT gabrielindrawiditamtama studiliteraturpresentationattackdansetdataantispoofwajah |