Please use this identifier to cite or link to this item: https://dspace.univ-ouargla.dz/jspui/handle/123456789/28813
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorBENLAMOUDI, Azeddine-
dc.contributor.authorBOUBLAL, Hamza-
dc.contributor.authorSADAOUI, Radouane-
dc.contributor.authorMOULAY OMAR, Abderrahmane-
dc.date.accessioned2022-05-06T20:15:03Z-
dc.date.available2022-05-06T20:15:03Z-
dc.date.issued2020-
dc.identifier.urihttp://dspace.univ-ouargla.dz/jspui/handle/123456789/28813-
dc.description.abstractAlthough some progress has been achieved in the field of computer vision research is confirming the identity of the user, such as face recognition, fingerprints, and iris. It has been shown that face recognition techniques are vulnerable to spoofing attack, spoofing a face recognition system is easy to perform: all that is needed is a simple photograph of the user. In this study, we dealt with the use of a convolutional neural network in terms of its structure and how it works in processing images to differentiate between real and fake faces, It is considered a solution to many computer vision problems in artificial intelligence such as image processing. We will process the image data in three stages : 1) Face alignment and preprocessing 2) feature extraction 3) Classification. The purpose of face alignment is to define the face in the photo, correct the shape of the face, and trim the area of interest, data extraction and classification are also done via the convolutional neural network which is used to distinguish between real and fake faces. Finally, we mention the results obtained using the database (CASIA), as the experimental results were improved by increasing the number of epochs, also, the considered approach is suitable for real-time applicationen_US
dc.description.abstractBien que certains progres aient ` et ´ e r ´ ealis ´ es dans le domaine de la recherche en vision par ´ ordinateur pour confirmer l’identite de l’utilisateur, comme la reconnaissance faciale, les em- ´ preintes digitales et l’iris. Il a et ´ e d ´ emontr ´ e que les techniques de reconnaissance faciale sont ´ vulnerables aux attaques par usurpation d’identit ´ e, l’usurpation d’un syst ´ eme de reconnaissance ` faciale est facile a r ` ealiser: il suffit d’une simple photographie de l’utilisateur. ´ Dans cette etude, nous avons trait ´ e de l’utilisation d’un r ´ eseau de neurones convolutifs en ´ termes de sa structure et de son fonctionnement dans le traitement des images pour differencier ´ les visages reels et faux.Il est consid ´ er ´ e comme une solution ´ a de nombreux probl ` emes de ` vision par ordinateur en intelligence artificielle tels que l’image en traitement. Nous traiterons les donnees d’image en trois ´ etapes: 1) Pr ´ etraitement et alignement des visages. 2) Extraction ´ de caracteristiques 3) Classification. Le but de l’alignement du visage est de corriger la forme ´ du visage et de rogner la zone d’inter ´ et, l’extraction et la classification des donn ˆ ees se font ´ egalement via le r ´ eseau neuronal convolutif qui sert ´ a distinguer le r ` eel du faux visages. ´ Enfin, nous mentionnons les resultats obtenus ´ a l’aide de la base de donn ` ees (CASIA), ´ comme les resultats exp ´ erimentaux ont ´ et ´ e am ´ elior ´ es en augmentant le nombre d’ ´ epoques, ´ egalement, l’approche consid ´ er ´ ee est adapt ´ ee ´ a une application en temps r ` eel. ´-
dc.language.isoenen_US
dc.publisherUNIVERSITY OF KASDI MERBAH OUARGLAen_US
dc.subjectComputer Visionen_US
dc.subjectConvolutional Neural Networken_US
dc.subjectAttaques par Usurpation d’identiteen_US
dc.subjectReconnaissance de Visageen_US
dc.titleDetect Spoofing Using Convolutional Neural Networken_US
dc.typeThesisen_US
Appears in Collections:Département d'Electronique et des Télécommunications - Master

Files in This Item:
File Description SizeFormat 
BOUBLAL-SADAOUI-MOULAY OMAR.pdfElectronic of Embedded Systems13,22 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.