نتایج جستجو برای: anti spoofing

تعداد نتایج: 365614  

2017
Kaustubh D. Vishnu V. M. Thakare

Biometric system have evolved very well in last few years and in this digital era secure automatic solution for face spoofing is needed. Combining existing anti-spoofing approaches to come up with more robust mechanism is needed for preventing system from various spoofing types. In this paper, detecting face from image and extracting data from it and then optimizing that information with datase...

Journal: :Computer Networks 2013
Guang Yao Jun Bi Peiyao Xiao

Filtering out traffic with forged source address on routers can significantly improve the security of Internet. However, despite intermittent IP spoofing attacks, existing filtering mechanisms inspect each packet all the time, consuming considerable resource on routers even there is no spoofing at all. This article considers the requirement for a solution performing IP spoofing filtering with a...

Journal: :J. Visual Communication and Image Representation 2016
Litong Feng Lai-Man Po Yuming Li Xuyuan Xu Fang Yuan Chun-Ho Cheung William Kwok-Wai Cheung

Many trait-specific countermeasures to face spoofing attacks have been developed for security of face authentication. However, there is no superior face anti-spoofing technique to deal with every kind of spoofing attack in varying scenarios. In order to improve the generalization ability of face anti-spoofing approaches, an extendable multi-cues integration framework for face anti-spoofing usin...

2006
Fang Qi Feng Bao Tieyan Li Weijia Jia Yongdong Wu

The anti-spoofing community has been intensively proposing new methods for defending against new spoofing techniques. It is still challenging for protecting näıve users from advanced spoofing attacks. In this paper, we analyze the problems within those anti-spoofing mechanisms and propose a new Automatic Detecting Security Indicator (ADSI) scheme. This paper describe the trust model in ADSI in ...

Journal: :Security and Communication Networks 2011
Fang Qi Zhe Tang Guojun Wang Jie Wu

The anti-spoofing community has been intensively proposing new methods for defending against new web-spoofing techniques. In this paper, we analyze the problems within current anti-spoofing mechanisms, and propose a new SSL protected trust model. Then, we describe the attacks on SSL protected trusted communication. In this paper, we also propose the new Automatic Detecting Security Indicator sc...

Journal: :Indonesian Journal of Computer Science 2023

Biometric data are personal that result from specialized processing techniques and associated with physical, biological, or behavioral characteristics of a natural person allow for confirm their unquestionable identification. These identifiers permanent unique.
 This paper refers to the biometric used by systems, mode operation, categories they distinguished in. The types attacks may be su...

2016
Zhenjun Zhang Xingqun Zhan

Spoofing is becoming a serious threat to various Global Navigation Satellite System (GNSS) applications, especially for those that require high reliability and security such as power grid synchronization and applications related to first responders and aviation safety. Most current works on anti-spoofing focus on spoofing detection from the individual receiver side, which identifies spoofing wh...

2016

Biometric forms of authentication are becoming increasingly popular in mobile devices. Passwords and PINs are being replaced by this convenient and more secure form of identification. Although biometric forms of identification provide a higher level of security, hacking and spoofing techniques are also becoming more sophisticated. There are anti-spoofing technologies that can help defend agains...

2014
zhizheng wu haizhou li

A speaker verification system automatically accepts or rejects a claimed identity of a speaker based on a speech sample. Recently, a major progress was made in speaker verification which leads to mass market adoption, such as in smartphone and in online commerce for user authentication. A major concern when deploying speaker verification technology is whether a system is robust against spoofing...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید