نتایج جستجو برای: anti spoofing

تعداد نتایج: 365614  

Journal: :IEEE Transactions on Information Forensics and Security 2021

With the rapid development in face recognition, most of existing systems can perform very well unconstrained scenarios. However, it is still a challenging task to detect spoofing attacks, thus anti-spoofing has become one important research topics community. Though various models have been proposed, generalisation capability these usually degrades for unseen attacks presence appearance variatio...

Journal: :Electronics 2023

Face recognition technology has been widely used due to the convenience it provides. However, face is vulnerable spoofing attacks which limits its usage in sensitive application areas. This work introduces a novel anti-spoofing system, FASS, that fuses results of two classifiers. One, random forest, uses identified by us seven no-reference image quality features derived from images and are fuse...

Journal: :Telecommunication Systems 2006
Wei Chen Dit-Yan Yeung

3 Abstract TCP-based flooding attacks are a common form of Distributed Denial-of-Service 4 (DDoS) attacks which abuse network resources and can bring about serious threats to the Internet. 5 Incorporating IP spoofing makes it even more difficult to defend against such attacks. Among 6 different IP spoofing techniques, which include random spoofing, subnet spoofing and fixed 7 spoofing, subnet s...

2016
Galina Lavrentyeva Sergey Novoselov Konstantin Simonchik

Growing interest in automatic speaker verification (ASV) systems has lead to significant quality improvement of spoofing attacks on them. Many research works confirm that despite the low equal error rate (EER) ASV systems are still vulnerable to spoofing attacks. In this work we overview different acoustic feature spaces and classifiers to determine reliable and robust countermeasures against s...

Journal: :IOP Conference Series: Materials Science and Engineering 2020

2004
Stephanie Schuckers Sujan T. V. Parthasaradhi Reza Derakhshani Lawrence A. Hornak

Fingerprint scanners may be susceptible to spoofing using artificial materials, or in the worst case, dismembered fingers. An anti-spoofing method based on liveness detection has been developed for use in fingerprint scanners. This method quantifies a specific temporal perspiration pattern present in fingerprints acquired from live claimants. The enhanced perspiration detection algorithm presen...

2017
Marcin Witkowski Stanislaw Kacprzak Piotr Zelasko Konrad Kowalczyk Jakub Galka

This paper presents our contribution to the ASVspoof 2017 Challenge. It addresses a replay spoofing attack against a speaker recognition system by detecting that the analysed signal has passed through multiple analogue-to-digital (AD) conversions. Specifically, we show that most of the cues that enable to detect the replay attacks can be found in the high-frequency band of the replayed recordin...

2015
Sooyeon Kim Yuseok Ban Sangyoun Lee

In order to develop security systems for identity authentication, face recognition (FR) technology has been applied. One of the main problems of applying FR technology is that the systems are especially vulnerable to attacks with spoofing faces (e.g., 2D pictures). To defend from these attacks and to enhance the reliability of FR systems, many anti-spoofing approaches have been recently develop...

2014
Elie el Khoury Tomi Kinnunen Aleksandr Sizov Zhizheng Wu Sébastien Marcel

Any biometric recognizer is vulnerable to direct spoofing attacks and automatic speaker verification (ASV) is no exception; replay, synthesis and conversion attacks all provoke false acceptances unless countermeasures are used. We focus on voice conversion (VC) attacks. Most existing countermeasures use full knowledge of a particular VC system to detect spoofing. We study a potentially more uni...

2017
Sherman Lo Yu Hsuan Chen Tyler Reid Adrien Perkins Todd Walter Arlene C. Coffman

Global navigation satellite systems (GNSS) are integral to aviation navigation and precise landings. It will be fundamental to many other safety of life applications such as railway and autonomous vehicles. To truly protect these systems and maintain safety, we need to not just address nominal hazards but also deliberate threats such as spoofing. Many methods have been proposed to address spoof...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید