نتایج جستجو برای: anti spoofing

تعداد نتایج: 365614  

Journal: :Image Vision Comput. 2014
Neslihan Kose Jean-Luc Dugelay

In this paper, initially, the impact of mask spoofing on face recognition is analyzed. For this purpose, one baseline technique is selected for both 2D and 3D face recognition. Next, novel countermeasures, which are based on the analysis of different shape, texture and reflectance characteristics of real faces and mask faces, are proposed to detect mask spoofing. In this paper, countermeasures ...

2017
Luka Malisa Kari Kostiainen Srdjan Capkun

Mobile application spoofing is an attack where a malicious mobile app mimics the visual appearance of another one. A common example of mobile application spoofing is a phishing attack where the adversary tricks the user into revealing her password to a malicious app that resembles the legitimate one. In this paper, we propose a novel spoofing detection approach, tailored to the protection of mo...

2016
Md. Sahidullah Héctor Delgado Massimiliano Todisco Hong Yu Tomi Kinnunen Nicholas W. D. Evans Zheng-Hua Tan

It is well known that automatic speaker verification (ASV) systems can be vulnerable to spoofing. The community has responded to the threat by developing dedicated countermeasures aimed at detecting spoofing attacks. Progress in this area has accelerated over recent years, partly as a result of the first standard evaluation, ASVspoof 2015, which focused on spoofing detection in isolation from A...

2016
Massimiliano Todisco Héctor Delgado Nicholas Evans

Efforts to develop new countermeasures in order to protect automatic speaker verification from spoofing have intensified over recent years. The ASVspoof 2015 initiative showed that there is great potential to detect spoofing attacks, but also that the detection of previously unforeseen spoofing attacks remains challenging. This paper argues that there is more to be gained from the study of feat...

Journal: :International Journal of Computer Applications 2010

2017
Alok Pandey Jatinderkumar R. Saini

Much attention needs to be paid to different types of security threats and related attacks in the LAN and the interconnected environment. A variety of controls and counter mechanisms covering different layers of TCP/IP protocol suite are already available. But most of them have several issues related to cost, compatibility, interoperability, manageability, effectiveness etc. and hence multiple ...

2016
S. MENAKA

In recent years face recognition has been the important factor in biometric authentication. Significant progress has been made in the area of face spoofing detection. In practical application, the problem of spoofing attacks can be threatened to face biometric systems which is used for authentication. Kernel Discriminate Analysis(KDA) is effective in detecting the face spoofing detection. Kerne...

Journal: :Pattern Recognition 2010
Bozhao Tan Stephanie Schuckers

Biometric fingerprint scanners are positioned to provide improved security in a great span of applications from government to private. However, one highly publicized vulnerability is that it is possible to spoof a variety of fingerprint scanners using artificial fingers made from Play-Doh, gelatin and silicone molds. Therefore, it is necessary to offer protection for fingerprint systems against...

Journal: :IEEE Access 2023

Advances in speech synthesis have exposed the vulnerability of spoofing countermeasure (CM) systems. Adversarial attacks exacerbate this problem, mainly due to reliance most CM models on deep neural networks. While research adversarial anti-spoofing systems has received considerable attention, there is a relative scarcity studies focused developing effective defense techniques. In study, we pro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید