نتایج جستجو برای: anti spoofing

تعداد نتایج: 365614  

2013
V Bharath Srinivas Syed Umar

Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. In this paper we propose a method for both detecting spoofing attacks, as well as locating the positions of adversaries performing the attacks. We first propose an attack detector for wireless spoofing that utilizes K-means cluster analysis. Next, we describe how we integrated our...

2015
Artur Janicki

In this paper a novel speaker verification spoofing countermeasure based on analysis of linear prediction error is presented. The method analyses the energy of the prediction error, prediction gain and temporal parameters related to the prediction error signal. The idea of the proposed algorithm and its implementation is described in detail. Various binary classifiers were researched to separat...

2016
Xiaohai Tian Zhizheng Wu Xiong Xiao Chng Eng Siong Haizhou Li

Spoofing detection for automatic speaker verification (ASV), which is to discriminate between live and artificial speech, has received increasing attentions recently. However, the previous studies have been done on the clean data without significant noise. It is still not clear whether the spoofing detectors trained on clean speech can generalise well under noisy conditions. In this work, we pe...

2011
Jesús Antonio Villalba López Eduardo Lleida

In this paper, we describe a system for detecting spoofing attacks on speaker verification systems. By spoofing we mean an attempt to impersonate a legitimate user. We focus on detecting if the test segment is a far-field microphone recording of the victim. This kind of attack is of critical importance in security applications like access to bank accounts. We present experiments on databases cr...

Journal: :Int. Arab J. Inf. Technol. 2016
Alwar Rengarajan Rajendran Sugumar Chinnappan Jayakumar

The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attacks in the network, a secure authentication technique is required to defend against spoofing attacks. In order to achieve this, in this paper, we p ropose a (SVT) for defending IP spoofing attacks. Our technique authentic...

2017
A. VIJAYA LAKSHMI S. RANJITH

In biometrics, Fingerprint is widely used in identification of individual’s identity. Biometric recognition is leading technology for identification and security systems. Fingerprint has unique identification among all other biometric modalities. Use of the fingerprints as biometric characteristics is extensively used and developed for fingerprint recognition in forensic, civilian and commercia...

2014
Ramesh kumar

Spoofing attack which easily attack the network and reduce the performance of the network. In this Paper, Spoofing attacks are detected, Finding the number of attackers that masquerade the node identity, Localizing all the attackers node and calculate the speed of a node, by using RSS (received signal strength) for spoofing detection. The number of attacker is determined by clusterbased method....

Journal: :IEEE/ACM Transactions on Audio, Speech, and Language Processing 2020

Journal: :IEEE Trans. Information Forensics and Security 2015
Diogo C. Garcia Ricardo L. de Queiroz

Biometric systems based on face recognition have been shown unreliable under the presence of face-spoofing images. Hence, automatic solutions for spoofing detection became necessary. In this paper, face-spoofing detection is proposed by searching for Moiré patterns due to the overlap of the digital grids. The conditions under which these patterns arise are first described, and their detection i...

2012
Divya Pal Singh Pankaj Sharma Ashish Kumar

Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. A spoofing attack is the most common online attack in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage, it become more sophisticated defense mechanisms. Although the identity of a node can be verified ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید