Restrictive Voting Technique for Faces Spoofing Attack
نویسندگان
چکیده
Face anti-spoofing has become widely used due to the increasing use of biometric authentication systems that rely on facial recognition. It is a critical issue in aim prevent unauthorized access. In this paper, we propose modified version majority voting ensembles votes six classifiers for multiple video chunks improve accuracy face anti-spoofing. Our approach involves sampling sub-videos 2 seconds each with one-second overlap and classifying sub-video using classifiers. We then ensemble classifications across all decide complete classification. focus False Acceptance Rate (FAR) metric highlight importance preventing evaluated our method Replay Attack dataset achieved zero FAR. also reported Half Total Error (HTER) Equal (EER) gained better result than most state-of-the-art methods. experimental results show proposed significantly reduces FAR, which crucial real-world applications.
منابع مشابه
Attack Class: Address Spoofing
We present an analysis of a class of attacks we call address spoofing. Fundamentals of internetwork routing and communication are presented, followed by a discussion of the address spoofing class. The attack class is made concrete with a discussion of a well known incident. We conclude by dispelling several myths of purported security solutions including the security provided by one-time passwo...
متن کاملFace Recognition Systems under Spoofing Attack
Face recognition system is one of the most successful application of computer vision, which has been deployed largely in recent years. In last decade, several algorithms for face recognition have been proposed in the literature. To increase reliability of face recognition systems, the systems must be able to differentiate between real genuine faces and fake faces (spoofed faces). In this paper,...
متن کاملDNS Spoofing Attack Simulation for Model-Based Security Evaluation
Security of computer systems and networks has become very significant nowadays. Introducing and using a unified framework for modeling and quantitative security evaluation (QSE) is an open problem. Th results of our study on drawbacks of the existing security assessment methodologies motivated us to use a simulation framework for model-based security evaluation. We have used discrete-event simu...
متن کاملSecure verification technique for defending IP spoofing attacks
The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attacks in the network, a secure authentication technique is required to defend against spoofing attacks. In order to achieve this, in this paper, we p ropose a (SVT) for defending IP spoofing attacks. Our technique authentic...
متن کاملDetecting ARP Spoofing: An Active Technique
The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man in the middle and session hijacking. The current methods of detection use a passive approa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: nternational journal of communication networks and information security
سال: 2023
ISSN: ['2073-607X', '2076-0930']
DOI: https://doi.org/10.17762/ijcnis.v15i1.5738