نتایج جستجو برای: anti spoofing

تعداد نتایج: 365614  

The Global Positioning System (GPS) signals are very weak signal over wireless channels, so they are vulnerable to in-band interferences. Therefore, even a low-power interference can easily spoof GPS receivers. Among the variety of GPS signal interference, spoofing is considered as the most dangerous intentional interference. The spoofing effects can mitigate with an appropriate strategy in the...

Journal: :Signal processing for security technologies 2022

This book was inadvertently published with the participants faces clearly identifiable in figures of this chapter, and there were no signed release forms from subjects. The those people are now obscured.

Journal: :Proceedings of the ... AAAI Conference on Artificial Intelligence 2023

Current domain adaptation methods for face anti-spoofing leverage labeled source data and unlabeled target to obtain a promising generalizable decision boundary. However, it is usually difficult these achieve perfect domain-invariant liveness feature disentanglement, which may degrade the final classification performance by differences in illumination, category, spoof type, etc. In this work, w...

Journal: :Algorithms 2023

The rapid development of speech synthesis technology has significantly improved the naturalness and human-likeness synthetic speech. As technical barriers for are rapidly lowering, number illegal activities such as fraud extortion is increasing, posing a significant threat to authentication systems, automatic speaker verification. This paper proposes an end-to-end detection model based on audio...

Journal: :IEEE Transactions on Circuits and Systems for Video Technology 2021

We have witnessed rapid advances in both face presentation attack models and detection (PAD) recent years. When compared with widely studied 2D attacks, 3D spoofing attacks are more challenging because recognition systems easily confused by the characteristics of materials similar to real faces. In this work, we tackle problem detecting these realistic propose a novel anti-spoofing method from ...

Journal: :IEEE transactions on biometrics, behavior, and identity science 2021

Face anti-spoofing (FAS) plays a vital role in securing face recognition systems from the presentation attacks (PAs). As more and realistic PAs with novel types spring up, it is necessary to develop robust algorithms for detecting unknown even unseen scenarios. However, deep models supervised by traditional binary loss (e.g., `0' bonafide vs. `1' PAs) are weak describing intrinsic discriminativ...

Journal: :Applied sciences 2022

Automatic speaker verification (ASV) is a voice biometric technology whose security might be compromised by spoofing attacks. To increase the robustness against attacks, presentation attack detection (PAD) or anti-spoofing systems for detecting replay, text-to-speech and conversion-based attacks are being developed. However, it was recently shown that adversarial may seriously fool systems. Mor...

Journal: :EURASIP J. Image and Video Processing 2014
Tiago de Freitas Pereira Jukka Komulainen André Anjos José Mario De Martino Abdenour Hadid Matti Pietikäinen Sébastien Marcel

User authentication is an important step to protect information, and in this context, face biometrics is potentially advantageous. Face biometrics is natural, intuitive, easy to use, and less human-invasive. Unfortunately, recent work has revealed that face biometrics is vulnerable to spoofing attacks using cheap low-tech equipment. This paper introduces a novel and appealing approach to detect...

2016
Huiqi Tao Hong Li Mingquan Lu

The spoofing attack is one of the security threats of systems depending on the Global Navigation Satellite System (GNSS). There have been many GNSS spoofing detection methods, and each of them focuses on a characteristic of the GNSS signal or a measurement that the receiver has obtained. The method based on a single detector is insufficient against spoofing attacks in some scenarios. How to fus...

2004
Amir Herzberg

In spite of the use of standard web security measures, swindlers often clone sensitive web sites and/or present false credentials, causing substantial damages to individuals and corporations. Several papers presented such web spoofing attacks, and suggested countermeasures, mostly by improved browser user interface. However, we argue that these countermeasures are inappropriate to most non-expe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید