Restrictive Voting Technique for Faces Spoofing Attack

نویسندگان

چکیده

Face anti-spoofing has become widely used due to the increasing use of biometric authentication systems that rely on facial recognition. It is a critical issue in aim prevent unauthorized access. In this paper, we propose modified version majority voting ensembles votes six classifiers for multiple video chunks improve accuracy face anti-spoofing. Our approach involves sampling sub-videos 2 seconds each with one-second overlap and classifying sub-video using classifiers. We then ensemble classifications across all decide complete classification. focus False Acceptance Rate (FAR) metric highlight importance preventing evaluated our method Replay Attack dataset achieved zero FAR. also reported Half Total Error (HTER) Equal (EER) gained better result than most state-of-the-art methods. experimental results show proposed significantly reduces FAR, which crucial real-world applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack Class: Address Spoofing

We present an analysis of a class of attacks we call address spoofing. Fundamentals of internetwork routing and communication are presented, followed by a discussion of the address spoofing class. The attack class is made concrete with a discussion of a well known incident. We conclude by dispelling several myths of purported security solutions including the security provided by one-time passwo...

متن کامل

Face Recognition Systems under Spoofing Attack

Face recognition system is one of the most successful application of computer vision, which has been deployed largely in recent years. In last decade, several algorithms for face recognition have been proposed in the literature. To increase reliability of face recognition systems, the systems must be able to differentiate between real genuine faces and fake faces (spoofed faces). In this paper,...

متن کامل

DNS Spoofing Attack Simulation for Model-Based Security Evaluation

Security of computer systems and networks has become very significant nowadays. Introducing and using a unified framework for modeling and quantitative security evaluation (QSE) is an open problem. Th results of our study on drawbacks of the existing security assessment methodologies motivated us to use a simulation framework for model-based security evaluation. We have used discrete-event simu...

متن کامل

Secure verification technique for defending IP spoofing attacks

The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attacks in the network, a secure authentication technique is required to defend against spoofing attacks. In order to achieve this, in this paper, we p ropose a (SVT) for defending IP spoofing attacks. Our technique authentic...

متن کامل

Detecting ARP Spoofing: An Active Technique

The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man in the middle and session hijacking. The current methods of detection use a passive approa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: nternational journal of communication networks and information security

سال: 2023

ISSN: ['2073-607X', '2076-0930']

DOI: https://doi.org/10.17762/ijcnis.v15i1.5738