نتایج جستجو برای: anti spoofing

تعداد نتایج: 365614  

2015
Michael Wagner Girija Chetty

2015
Michael Wagner

The process of verifying whether the voice sample presented to an authentication system is real (i.e., alive), or whether it is replayed or synthetic, and thus fraudulent. When authentication through a voice authentication system is requested, it is important to be sure that the person seeking the authentication actually provides the required voice sample at the time and place of the authentica...

2015
Mohammad Yasinzadeh Mahdi Akhbari

Phasor measurement unit (PMU) GPS receiver spoofing has been addressed in the recent literatures. Having spoofed GPS signals, the spoofer can inject bad data into power system control center and consequently the protection system will face serious problems. The existing anti spoofing techniques are all based on GPS signal analysis and are just able to detect spoofing. However, as PMUs are place...

2015
Nicholas W. D. Evans Federico Alegre Zhizheng Wu Tomi Kinnunen

Voice conversion is a process which converts or transforms one speaker’s voice towards that of another. The literature shows that voice conversion can be used to spoof or fool an automatic speaker verification system. State-of-the-art voice conversion algorithms can produce high-quality speech signals in real time and are capable of fooling both human listeners and automatic systems, including ...

Journal: :CoRR 2017
Hang Hu Peng Peng Gang Wang

Email spoofing is a critical step of phishing, where the attacker impersonates someone the victim knows or trusts. In this paper, we conduct a qualitative study to explore why email spoofing is still possible after years of efforts to develop and deploy anti-spoofing protocols (e.g., SPF, DKIM, DMARC). First, we measure the protocol adoption by scanning 1 million Internet domains. We find the a...

2017
Olegs Nikisins Amir Mohammadi André Anjos

While face recognition systems got a significant boost in terms of recognition performance in recent years, they are known to be vulnerable to presentation attacks. Up to date, most of the research in the field of face anti-spoofing or presentation attack detection was considered as a two-class classification task: features of bona-fide samples versus features coming from spoofing attempts. The...

Journal: :IJITEE (International Journal of Information Technology and Electrical Engineering) 2021

The biometric system is a security technology that uses information based on living person's characteristics to verify or recognize the identity, such as facial recognition. Face recognition has numerous applications in real world, access control and surveillance. But face issue of spoofing. A anti-spoofing, task prevent fake authorization by breaching systems using photo, video, mask, differen...

2018
Meng Zhou Hong Li Mingquan Lu

A receiver-spoofer is one of the most covert global navigation satellite system (GNSS) spoofing attacks and can only be effectively detected by the combination of multiple anti-spoofing technologies. In this paper, an analysis of influencing parameters for receiver-spoofers indicates that the ratio of the spoofing signal amplitude versus the authentic signal amplitude (spoofing-signal ratio) is...

2017
Galina Lavrentyeva Sergey Novoselov Egor Malykh Alexander Kozlov Oleg Kudashev Vadim Shchemelinin

Nowadays spoofing detection is one of the priority research areas in the field of automatic speaker verification. The success of Automatic Speaker Verification Spoofing and Countermeasures (ASVspoof) Challenge 2015 confirmed the impressive perspective in detection of unforeseen spoofing trials based on speech synthesis and voice conversion techniques. However, there is a small number of researc...

Global Positioning System (GPS) spoofing could pose a major threat for GPS navigation ‎systems, so the GPS users have to gain a better understanding of the broader implications of ‎GPS.‎ In this paper, a plenary anti-spoofing approach based on correlation is proposed to distinguish spoofing effects. The suggested ‎method can be easily implemented in tracking loop of GPS receiver...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید