TY - GEN
T1 - U-Architecture for Face Recognition to Prevent Cyber and Spoofing Attacks in IoT
AU - Sharma, Vaibhav
AU - Sharma, Sachin
AU - Batra, Vandana
AU - Singh, Anu
AU - Bhatia, Himanshi
AU - Ikhar, Sharyu
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - Preventing cyber assaults is crucial in the setting of a smart city, which is more vulnerable to such threats. Spoofing is a kind of cyber assault that is becoming more widespread across various platforms, including but not limited to email, geo location services, and social media. When someone commits a series of crimes under the guise of another person-for example, fraud, cyberbullying, sextortion, etc.-they are engaging in identity spoofing. A facial recognition system is presented here, with potential use in stopping spoofing. The HOG descriptor, developed by Google, is the basis of this approach. The introduction of entropy would allow us to quantify the significance of each face area in the descriptor, since various face regions do not contain the same information for the recognition process. Therefore, entropy is included to strengthen the algorithm's reliability. When it comes to facial recognition, we've tested our method on three popular databases (ORL, FERET, and LFW), and the results indicate that include entropy information greatly increases the identification rate-by as much as 40% in some of the databases we evaluated. On the CASIA FASD and MIFS databases, spoofing experiments have been conducted, with again improved results compared to comparable texture descriptors techniques. Half Error Rate (HER) is considered as major performance metric and the proposed work minimizes the error up to 1.14.
AB - Preventing cyber assaults is crucial in the setting of a smart city, which is more vulnerable to such threats. Spoofing is a kind of cyber assault that is becoming more widespread across various platforms, including but not limited to email, geo location services, and social media. When someone commits a series of crimes under the guise of another person-for example, fraud, cyberbullying, sextortion, etc.-they are engaging in identity spoofing. A facial recognition system is presented here, with potential use in stopping spoofing. The HOG descriptor, developed by Google, is the basis of this approach. The introduction of entropy would allow us to quantify the significance of each face area in the descriptor, since various face regions do not contain the same information for the recognition process. Therefore, entropy is included to strengthen the algorithm's reliability. When it comes to facial recognition, we've tested our method on three popular databases (ORL, FERET, and LFW), and the results indicate that include entropy information greatly increases the identification rate-by as much as 40% in some of the databases we evaluated. On the CASIA FASD and MIFS databases, spoofing experiments have been conducted, with again improved results compared to comparable texture descriptors techniques. Half Error Rate (HER) is considered as major performance metric and the proposed work minimizes the error up to 1.14.
KW - IoT
KW - face recognition
KW - histogram of oriented gradients
KW - security
KW - spoofing
UR - https://www.scopus.com/pages/publications/85173628334
U2 - 10.1109/ICDSNS58469.2023.10245245
DO - 10.1109/ICDSNS58469.2023.10245245
M3 - Conference contribution
AN - SCOPUS:85173628334
T3 - 2023 International Conference on Data Science and Network Security, ICDSNS 2023
BT - 2023 International Conference on Data Science and Network Security, ICDSNS 2023
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2023 International Conference on Data Science and Network Security, ICDSNS 2023
Y2 - 28 July 2023 through 29 July 2023
ER -