Efficiently Mitigating Face-Swap-Attacks: Compressed-PRNU Verification with Sub-Zones
نویسندگان
چکیده
Face-swap-attacks (FSAs) are a new threat to face recognition systems. FSAs essentially imperceptible replay-attacks using an injection device and generative networks. By placing the between camera computer device, attackers can present any as desired. This is particularly potent it also maintains liveliness features, sophisticated alternation of real person, go undetected by traditional anti-spoofing methods. To address FSAs, this research proposes noise-verification framework. Even best networks today leave alteration traces in photo-response noise profile; these detected doing comparison challenge images against enrollment. introduces compression sub-zone analysis for efficiency. Benchmarking with open-source tampering-detection algorithms shows proposed compressed-PRNU verification robustly verifies facial-image authenticity while being significantly faster. demonstrates novel efficiency mitigating face-swap-attacks, including denial-of-service attacks.
منابع مشابه
Mitigating Dictionary Attacks with Text-Graphics Character Captchas
We propose a new construct, the Text-Graphics Character (TGC) CAPTCHA, for preventing dictionary attacks against password authentication systems allowing remote access via dumb terminals. Password authentication is commonly used for computer access control. But password authentication systems are prone to dictionary attacks, in which attackers repeatedly attempt to gain access using the entries...
متن کاملMitigating Link-flooding Attacks With Active Link Obfuscation
Link-flooding attack (LFA) has emerged as a serious threat to Internet which cuts off connections between legitimate hosts and targeted servers by flooding only a few links (e.g., target links). Several mechanisms have been proposed to mitigate LFA, however, they can only mitigate LFA after target links have been compromised by adversaries. Based on the fact that adversaries rely on network lin...
متن کاملMitigating congestion based DoS attacks with an enhanced AQM technique
Denial of Service (DoS) attacks are currently one of the biggest risks any organization connected to the Internet can face. Hence, the congestion handling techniques at the edge router(s), such as Active Queue Management (AQM) schemes must take into account such attacks. Ideally, an AQM scheme should (a) ensure that each network flow gets its fair share of bandwidth, and (b) identify attack flo...
متن کاملMitigating Routing Attacks with Local Trust in DHTs
Distributed Hash Tables (DHTs) have been used as a common building block in many distributed applications, including Peer-to-Peer (P2P), Cloud and Grid Computing. However, there are still important security vulnerabilities that hinder their adoption in today’s large-scale computing platforms. For instance, routing vulnerabilities have been a subject of intensive research but existing solutions ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Technologies (Basel)
سال: 2022
ISSN: ['2227-7080']
DOI: https://doi.org/10.3390/technologies10020046