{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T17:42:32Z","timestamp":1769708552262,"version":"3.49.0"},"reference-count":33,"publisher":"SAGE Publications","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,11,4]]},"abstract":"<jats:p>Recent years have seen a rise in interest in face anti-spoofing (FAS) owing to the critical function it plays in protecting face recognition systems against presentation assaults (PAs). Early-stage FAS approaches relying on handmade characteristics become inaccurate when steadily realistic PAs of unique sorts emerge. Thus, face anti-spoofing algorithms are gaining increasing relevance in such setups. A very innovative method called deep learning has shown remarkable success in difficult computer vision problems. The proposed method uses deep acquisition and transfer of learning to extract characteristics from people\u2019s faces. This is why the authors of this study recommend using the Faster RCNN classifier with a face-liveness detection approach. Two distinct components\u2014 the data augmentation module for assessing sparse information as well as the faster RCNN classifier module\u2014 make up the anti-spoofing approach. We may use any publicly accessible dataset to train our quicker RCNN classifier. We successively fused these two components and used the Android platform to create a basic face recognition app. The results of the tests demonstrate that the developed module can identify several types of face spoof assaults, such as those carried out with the use of posters, masks, or cell phones. Testing the proposed architecture both across and inside databases using three benchmarking (Idiap Replay Attack, CASIA- FASD, &amp; 3DMAD) demonstrate its ability to deliver outcomes on par with cutting-edge techniques.<\/jats:p>","DOI":"10.3233\/jifs-233394","type":"journal-article","created":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T12:14:33Z","timestamp":1690546473000},"page":"7389-7405","source":"Crossref","is-referenced-by-count":0,"title":["Data augmentation based face anti-spoofing (FAS) scheme using deep learning techniques"],"prefix":"10.1177","volume":"45","author":[{"given":"Kasetty","family":"Lakshminarasimha","sequence":"first","affiliation":[{"name":"Information and Communication Engineering Department, Anna University, Chennai, Tamilnadu"}]},{"given":"V.","family":"Ponniyin Selvan","sequence":"additional","affiliation":[{"name":"Information and Communication Engineering Department, Anna University, Chennai, Tamilnadu"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-233394_ref1","first-page":"23","volume-title":"Sensors","author":"Hwang","year":"2023"},{"key":"10.3233\/JIFS-233394_ref2","doi-asserted-by":"crossref","unstructured":"Zhu J. , Wang A. , Wu W.H. , Zhao Z. , Xu Y. , Lei R. and Yue K. , Deep-learning-based recovery of frequency-hopping sequences for anti-jamming applications, Electronics (2023).","DOI":"10.3390\/electronics12030496"},{"key":"10.3233\/JIFS-233394_ref3","first-page":"1","article-title":"Reducing false positive rate with the help of scene change indicator in deep learning based real-time face recognition systems","author":"Kutlug\u00fcn","year":"2023","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/JIFS-233394_ref4","doi-asserted-by":"crossref","first-page":"170116","DOI":"10.1109\/ACCESS.2019.2955383","article-title":"A cascade face spoofing detector based on face anti-spoofing R-CNN and improved retinex LBP","volume":"7","author":"Chen","year":"2019","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233394_ref5","first-page":"1","article-title":"Adaptive multiple layer retinex-enabled color face enhancement for deep learning-based recognition","author":"Giap","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233394_ref6","first-page":"22","article-title":"Dynamic asynchronous anti poisoning federated deep learning with blockchain-based reputation-aware solutions","author":"Chen","year":"2022","journal-title":"Sensors"},{"key":"10.3233\/JIFS-233394_ref7","first-page":"1","article-title":"Deep Learning-based Facial Landmarks Localization using Compound Scaling","author":"Colaco","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233394_ref8","doi-asserted-by":"crossref","unstructured":"Tiwari P. , Kumar N. , Singh P.G. , Attray P. , Rai A. and Khan N. , Deep Learning-Based Recognition of Facial Expressions, International Journal for Research in Applied Science and Engineering Technology (2022).","DOI":"10.22214\/ijraset.2022.48474"},{"key":"10.3233\/JIFS-233394_ref9","doi-asserted-by":"crossref","unstructured":"Liu C. , Li H. , Liang Z. , Zhang Y. , Yan Y. , Zhong R.Y. and Peng S. , A novel deep-learning-based enhanced texture transformer network for reference image super-resolution, Electronics (2022).","DOI":"10.3390\/electronics11193038"},{"key":"10.3233\/JIFS-233394_ref10","doi-asserted-by":"crossref","unstructured":"Kumar T.A. , Rajmohan R. , Pavithra M. , Ajagbe S.A. , Hodhod R.A. and Gaber T. , Automatic face mask detection system in public transportation in smart cities using IoT and deep learning, Electronics (2022).","DOI":"10.3390\/electronics11060904"},{"key":"10.3233\/JIFS-233394_ref11","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1007\/s11042-019-08115-w","article-title":"Anti-spoofing in face recognition-based biometric authentication using image quality assessment","volume":"79","author":"Fourati","year":"2019","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/JIFS-233394_ref12","doi-asserted-by":"crossref","unstructured":"AlBdairi A.J. , Xiao Z. , Alkhayyat A. , Humaidi A.J. , Fadhel M.A. Taher B.H. , Alzubaidi L. , Santamar\u00eda J.I. and Al-Shamma O. , Face recognition based on deep learning and FPGA for ethnicity identification, Applied Sciences (2022).","DOI":"10.3390\/app12052605"},{"key":"10.3233\/JIFS-233394_ref13","doi-asserted-by":"crossref","unstructured":"Awotunde J.B. , Jimoh R.G. , Imoize A.L. , Abdulrazaq A.T. , Li C. and Lee C. , An enhanced deep learning-based deep fake video detection and classification system, Electronics (2022).","DOI":"10.3390\/electronics12010087"},{"key":"10.3233\/JIFS-233394_ref14","first-page":"1","article-title":"An improved anti-jamming method based on deep reinforcement learning and feature engineering","author":"Chang","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233394_ref15","doi-asserted-by":"crossref","unstructured":"Ulrich L. , Nonis F. , Vezzetti E. , Moos S. , Caruso G. , Shi Y. and Marcolin F. , Can ADAS Distract Driver\u2019s Attention? An RGB-D Camera and Deep Learning-Based Analysis, Applied Sciences (2021).","DOI":"10.3390\/app112411587"},{"key":"10.3233\/JIFS-233394_ref16","doi-asserted-by":"crossref","unstructured":"Solomon E. and Cios K.J. , FASS: face anti-spoofing system using image quality features and deep learning, Electronics (2023).","DOI":"10.3390\/electronics12102199"},{"key":"10.3233\/JIFS-233394_ref17","doi-asserted-by":"crossref","first-page":"7229","DOI":"10.1007\/s11042-020-10041-1","article-title":"Unraveling robustness of deep face anti-spoofing models against pixel attacks","volume":"80","author":"Bousnina","year":"2020","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/JIFS-233394_ref18","doi-asserted-by":"crossref","first-page":"16984","DOI":"10.1109\/ACCESS.2023.3242654","article-title":"CloudNet: A LiDAR-Based Face Anti-Spoofing Model That Is Robust Against Light Variation","volume":"11","author":"Kim","year":"2023","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233394_ref19","doi-asserted-by":"crossref","first-page":"201635","DOI":"10.1109\/ACCESS.2020.3035747","article-title":"One-class learning method based on live correlation loss for face anti-spoofing","volume":"8","author":"Lim","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233394_ref20","doi-asserted-by":"crossref","unstructured":"Kong Y. , Li X. , Hao G. and Liu C. , Face anti-spoofing method based on residual network with channel attention mechanism, Electronics (2022).","DOI":"10.3390\/electronics11193056"},{"key":"10.3233\/JIFS-233394_ref21","doi-asserted-by":"crossref","first-page":"28140","DOI":"10.1109\/ACCESS.2021.3052728","article-title":"A dataset and benchmark towards multi-modal face anti-spoofing under surveillance scenarios","volume":"9","author":"Chen","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233394_ref22","doi-asserted-by":"crossref","first-page":"10641","DOI":"10.1007\/s11042-022-13741-y","article-title":"CommuNety: deep learning-based face recognition system for the prediction of cohesive communities","volume":"82","author":"Shah","year":"2022","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/JIFS-233394_ref23","doi-asserted-by":"crossref","first-page":"72794","DOI":"10.1109\/ACCESS.2022.3188852","article-title":"Intelligent digital human agent service with deep learning based-face recognition","volume":"10","author":"Kim","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233394_ref24","doi-asserted-by":"crossref","first-page":"132652","DOI":"10.1109\/ACCESS.2021.3113186","article-title":"Development of a privacy-preserving UAV system with deep learning-based face anonymization","volume":"9","author":"Lee","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233394_ref25","doi-asserted-by":"crossref","first-page":"96964","DOI":"10.1109\/ACCESS.2021.3095191","article-title":"A deep learning based light-weight face mask detector with residual context attention and gaussian heatmap to fight against COVID-19","volume":"9","author":"Fan","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233394_ref26","doi-asserted-by":"crossref","first-page":"86966","DOI":"10.1109\/ACCESS.2021.3077629","article-title":"Suppressing spoof-irrelevant factors for domain-agnostic face anti-spoofing","volume":"9","author":"Kim","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233394_ref27","doi-asserted-by":"crossref","first-page":"8816","DOI":"10.1109\/ACCESS.2022.3143536","article-title":"Fusion of multi-intensity image for deep learning-based human and face detection","volume":"10","author":"Lu","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233394_ref28","doi-asserted-by":"crossref","unstructured":"Dang M. , Efficient vision-based face image manipulation identification framework based on deep learning, Electronics (2022).","DOI":"10.3390\/electronics11223773"},{"key":"10.3233\/JIFS-233394_ref29","doi-asserted-by":"crossref","first-page":"21299","DOI":"10.1007\/s11042-020-08952-0","article-title":"Face anti-spoofing with generated near-infrared images","volume":"79","author":"Jiang","year":"2020","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/JIFS-233394_ref30","doi-asserted-by":"crossref","first-page":"4549","DOI":"10.3390\/app11104549","article-title":"Deep learning based real age and gender estimation from unconstrained face image towards smart store customer relationship management","volume":"11","author":"Islam","year":"2021","journal-title":"Applied Sciences"},{"key":"10.3233\/JIFS-233394_ref31","first-page":"1","article-title":"Prediction of biomedical signals using deep learning techniques","author":"Kalaivani","year":"2023","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"10.3233\/JIFS-233394_ref32","first-page":"1","article-title":"A lightweight deep learning model based recommender system by sentiment analysis","author":"Chiranjeevi","year":"2023","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"1","key":"10.3233\/JIFS-233394_ref33","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1186\/s40537-023-00727-2","article-title":"A survey on deep learning tools dealing with data scarcity: definitions, challenges, solutions, tips, and applications","volume":"10","author":"Alzubaidi","year":"2023","journal-title":"Journal of Big Data"}],"updated-by":[{"DOI":"10.3233\/jifs-219434","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"record-id":"65096"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-233394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T06:58:37Z","timestamp":1769669917000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-233394"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,4]]},"references-count":33,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.3233\/jifs-233394","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,4]]}}}