نتایج جستجو برای: anti spoofing
تعداد نتایج: 365614 فیلتر نتایج به سال:
The process of verifying whether the voice sample presented to an authentication system is real (i.e., alive), or whether it is replayed or synthetic, and thus fraudulent. When authentication through a voice authentication system is requested, it is important to be sure that the person seeking the authentication actually provides the required voice sample at the time and place of the authentica...
Phasor measurement unit (PMU) GPS receiver spoofing has been addressed in the recent literatures. Having spoofed GPS signals, the spoofer can inject bad data into power system control center and consequently the protection system will face serious problems. The existing anti spoofing techniques are all based on GPS signal analysis and are just able to detect spoofing. However, as PMUs are place...
Voice conversion is a process which converts or transforms one speaker’s voice towards that of another. The literature shows that voice conversion can be used to spoof or fool an automatic speaker verification system. State-of-the-art voice conversion algorithms can produce high-quality speech signals in real time and are capable of fooling both human listeners and automatic systems, including ...
Email spoofing is a critical step of phishing, where the attacker impersonates someone the victim knows or trusts. In this paper, we conduct a qualitative study to explore why email spoofing is still possible after years of efforts to develop and deploy anti-spoofing protocols (e.g., SPF, DKIM, DMARC). First, we measure the protocol adoption by scanning 1 million Internet domains. We find the a...
While face recognition systems got a significant boost in terms of recognition performance in recent years, they are known to be vulnerable to presentation attacks. Up to date, most of the research in the field of face anti-spoofing or presentation attack detection was considered as a two-class classification task: features of bona-fide samples versus features coming from spoofing attempts. The...
The biometric system is a security technology that uses information based on living person's characteristics to verify or recognize the identity, such as facial recognition. Face recognition has numerous applications in real world, access control and surveillance. But face issue of spoofing. A anti-spoofing, task prevent fake authorization by breaching systems using photo, video, mask, differen...
A receiver-spoofer is one of the most covert global navigation satellite system (GNSS) spoofing attacks and can only be effectively detected by the combination of multiple anti-spoofing technologies. In this paper, an analysis of influencing parameters for receiver-spoofers indicates that the ratio of the spoofing signal amplitude versus the authentic signal amplitude (spoofing-signal ratio) is...
Nowadays spoofing detection is one of the priority research areas in the field of automatic speaker verification. The success of Automatic Speaker Verification Spoofing and Countermeasures (ASVspoof) Challenge 2015 confirmed the impressive perspective in detection of unforeseen spoofing trials based on speech synthesis and voice conversion techniques. However, there is a small number of researc...
Global Positioning System (GPS) spoofing could pose a major threat for GPS navigation ‎systems, so the GPS users have to gain a better understanding of the broader implications of ‎GPS.‎ In this paper, a plenary anti-spoofing approach based on correlation is proposed to distinguish spoofing effects. The suggested ‎method can be easily implemented in tracking loop of GPS receiver...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید