نتایج جستجو برای: anti spoofing
تعداد نتایج: 365614 فیلتر نتایج به سال:
The Global Positioning System (GPS) signals are very weak signal over wireless channels, so they are vulnerable to in-band interferences. Therefore, even a low-power interference can easily spoof GPS receivers. Among the variety of GPS signal interference, spoofing is considered as the most dangerous intentional interference. The spoofing effects can mitigate with an appropriate strategy in the...
This book was inadvertently published with the participants faces clearly identifiable in figures of this chapter, and there were no signed release forms from subjects. The those people are now obscured.
Current domain adaptation methods for face anti-spoofing leverage labeled source data and unlabeled target to obtain a promising generalizable decision boundary. However, it is usually difficult these achieve perfect domain-invariant liveness feature disentanglement, which may degrade the final classification performance by differences in illumination, category, spoof type, etc. In this work, w...
The rapid development of speech synthesis technology has significantly improved the naturalness and human-likeness synthetic speech. As technical barriers for are rapidly lowering, number illegal activities such as fraud extortion is increasing, posing a significant threat to authentication systems, automatic speaker verification. This paper proposes an end-to-end detection model based on audio...
We have witnessed rapid advances in both face presentation attack models and detection (PAD) recent years. When compared with widely studied 2D attacks, 3D spoofing attacks are more challenging because recognition systems easily confused by the characteristics of materials similar to real faces. In this work, we tackle problem detecting these realistic propose a novel anti-spoofing method from ...
Face anti-spoofing (FAS) plays a vital role in securing face recognition systems from the presentation attacks (PAs). As more and realistic PAs with novel types spring up, it is necessary to develop robust algorithms for detecting unknown even unseen scenarios. However, deep models supervised by traditional binary loss (e.g., `0' bonafide vs. `1' PAs) are weak describing intrinsic discriminativ...
Automatic speaker verification (ASV) is a voice biometric technology whose security might be compromised by spoofing attacks. To increase the robustness against attacks, presentation attack detection (PAD) or anti-spoofing systems for detecting replay, text-to-speech and conversion-based attacks are being developed. However, it was recently shown that adversarial may seriously fool systems. Mor...
User authentication is an important step to protect information, and in this context, face biometrics is potentially advantageous. Face biometrics is natural, intuitive, easy to use, and less human-invasive. Unfortunately, recent work has revealed that face biometrics is vulnerable to spoofing attacks using cheap low-tech equipment. This paper introduces a novel and appealing approach to detect...
The spoofing attack is one of the security threats of systems depending on the Global Navigation Satellite System (GNSS). There have been many GNSS spoofing detection methods, and each of them focuses on a characteristic of the GNSS signal or a measurement that the receiver has obtained. The method based on a single detector is insufficient against spoofing attacks in some scenarios. How to fus...
In spite of the use of standard web security measures, swindlers often clone sensitive web sites and/or present false credentials, causing substantial damages to individuals and corporations. Several papers presented such web spoofing attacks, and suggested countermeasures, mostly by improved browser user interface. However, we argue that these countermeasures are inappropriate to most non-expe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید