Information Security of Educational Portal Based on Face Anti-Spoofing Method: Effectiveness of Tiny Neural Network Machine Learning Model

PDF (892KB), PP.59-71

Views: 0 Downloads: 0

Author(s)

Meruert Serik 1 Danara Tleumagambetova 1,* Alaminov Muratbay 2

1. L.N. Gumilyov Eurasian National University, Astana, Kazakhstan

2. Nukus State Pedagogical Institute, Nukus, Uzbekistan

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2025.03.05

Received: 31 Dec. 2023 / Revised: 14 Feb. 2024 / Accepted: 16 Mar. 2025 / Published: 8 Jun. 2025

Index Terms

Information Security, Educational Portal, Machine Learning, Face Anti-Spoofing, Neural Network, Deep Learning

Abstract

This article presents the implementation of a machine learning-based face anti-spoofing method to enhance the security of an educational information portal for university students. The study addresses the challenge of preventing academic dishonesty by ensuring that only authorized individuals can complete intermediate and final assessment tasks. The proposed method leverages the Tiny neural network model, selected for its efficiency in compact data processing, alongside the dlib system in Python and the LCC_FASD dataset, which enables precise detection of 68 facial landmarks. Using a confusion matrix to evaluate performance, the method achieved a 94.47% accuracy in detecting spoofing attempts. These findings demonstrate the effectiveness of the proposed approach in safeguarding educational platforms and maintaining academic integrity.

Cite This Paper

Meruert Serik, Danara Tleumagambetova, Alaminov Muratbay, "Information Security of Educational Portal Based on Face Anti-Spoofing Method: Effectiveness of Tiny Neural Network Machine Learning Model", International Journal of Modern Education and Computer Science(IJMECS), Vol.17, No.3, pp. 59-71, 2025. DOI:10.5815/ijmecs.2025.03.05

Reference

[1]Z. Akhtar and S. Kale, “Security Analysis of Multimodal Biometric Systems against Spoof Attacks,” Communications in Computer and Information Science, vol. 191, 2011. https://doi.org/10.1007/978-3-642-22714-1_62
[2]M. Saranya and P. Amudha, “Anti-Spoofing Method: A Survey on Biometric Face Recognition,” World Scientific News, vol. 41, pp. 92–98, 2016. 
[3]S. Bharadwaj, T.I. Dhamecha, M. Vatsa and R. Singh, “Computationally efficient face spoofing detection with motion magnification,” In Proc. IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 105–110, 2013. https://doi.org/10.1109/CVPRW.2013.23
[4]R. Raghavendra and Ch. Busch, “Presentation Attack Detection Algorithm for Face and Iris Biometrics”, Signal Processing Conference (EUSIPCO), 2014.
[5]G. Pan, L. Sun, Z. Wu and S. Lao, “Eyeblink-based antispoofing in face recognition from a generic Webcamera,” In Proc. IEEE 11th ICCV’07, pp. 14-20, 2007. https://doi.org/10.1109/ICCV.2007.4409068
[6]T. Amirsina and N. Nasrabadi, “3D Convolutional Neural Networks for Cross Audio-Visual Matching Recognition,” IEEE. Translations and content mining are permitted for academic research only, vol.5, pp. 22081-22091, 2017. https://doi.org/10.1109/ACCESS.2017.2761539
[7]Y. Li, M. Chang and S. Lyu, “In ictu oculi: Exposing AI created fake videos by detecting eye blinking,” In 2018 IEEE International workshop on information forensics and security (WIFS), pp. 1-7, 2018. DOI: 10.1109/WIFS.2018.8630787 
[8]J. Kim, W. Luu and S. Palmisano, “Multisensory integration and the experience of scene instability, presence and cybersickness in virtual environments,” Computers in Human Behavior, vol.113, 2020. https://doi.org/10.1016/j.chb.2020.106484 
[9]Y. Kim, J. Na, S. Yoon and J. Yi, “Masked fake face detection using radiance measurements,” Journal of the Optical Society of America, vol. 26, is. 4, pp. 760-766, 2009. https://doi.org/10.1364/JOSAA.26.000760 
[10]R.J. Raghavendra, K.P. Jeevan, M. Likith, G. Manoj and D.S. Yashas, “A Survey on Anti-Spoofing Methods for Facial Recognition,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 8(2), pp.259-268, 2022.  https://doi.org/10.32628/CSEIT228248 
[11]Z. Yu and Y. Qin, “Deep learning for face anti-spoofing: A survey,” IEEE transactions on pattern analysis and machine intelligence, no. 45(5), pp. 5609-5631, 2022. https://doi.org/10.1109/TPAMI.2022.3215850.
[12]P. Anthony, B. Ay and G. Aydin, “A review of face anti-spoofing methods for face recognition systems,” 2021 International Conference on Innovations in Intelligent SysTems and Applications (INISTA). IEEE, pp.1-9, 2021.  https://doi.org/10.1109/INISTA52262.2021.9548404
[13]R. Ranjan and A. Bansal, “A Fast and Accurate System for Face Detection, Identification, and Verification,” IEEE Transactions on Biometrics Behavior and Identity Science, 2019, pp. (99):1-1. https://doi.org/10.1109/TBIOM.2019.2908436 
[14]D. Habrman, “Face Recognition with Preprocessing and Neural Networks,” M.S.thesis, Linköping University, Department of Electrical Engineering, 2016.
[15]Z. Ming, M. Visani, M. Luqman and J.C. Burie, “A survey on anti-spoofing methods for facial recognition with rgb cameras of generic consumer devices,” Journal of imaging, 6(12), p.139, 2020.
[16]S. Xiao and X. Zhao, “Discriminative representation combinations for accurate face spoofing detection,” Pattern Recognition, vol. 85, pp. 220-231, 2019. https://doi.org/10.1016/j.patcog.2018.08.019
[17]J. Galbally, S.Marcel and J. Fierrez, “Biometric antispoofing methods: A survey in face recognition,” Ieee Access, 2, pp. 1530-1552, 2020.
[18]N. Jahan and P.K. Bhuiyan, “Real Time Face Recognition System with Deep Residual Network and KNN,” Proceedings of the International Conference on Electronics and Sustainable Communication Systems (ICESC 2020), pp. 1122-1126, 2020. https://doi.org/10.1109/ICESC48915.2020.9155579
[19]D. Timoshenko, K. Simonchik, V.Shutov, P.Zhelezneva and V. Grishkin, ”Large crowdcollected facial anti-spoofing dataset,” Computer Science and Information Technologies (CSIT), pp.123-126, 2019.
[20]V. Patro, and M. Patra, “Augmenting weighted average with confusion matrix to enhance classification accuracy,” Transactions on Machine Learning and Artificial Intelligence, 2(4), pp.77-91, 2014.
[21]L. Wasserman, “All of statistics: a concise course in statistical inference,” Springer Science & Business Media, 2013.
[22]A.Agresti and B. Finlay, “Statistical methods for the social sciences”, 2009.
[23]T. Hastie and R. Tibshirani, “The elements of statistical learning”, 2001.
[24]J.Eng, “Receiver operating characteristic analysis: a primer1,” Academic radiology, 12(7), pp.909-916, 2013.
[25]J. Fan, S. Upadhye and A. Worster, “Understanding receiver operating characteristic (ROC) curves”, Canadian Journal of Emergency Medicine, 8(1), pp.19-20, 2006.