نتایج جستجو برای: Anti-Spoofing
تعداد نتایج: 365614 فیلتر نتایج به سال:
Spoofing attacks can completely mislead the position solution provided by global navigation satellite systems (GNSS). Recently, several anti-spoofing techniques have been introduced to combat spoofing attacks. However, in most cases the available anti-spoofing techniques are computationally complex or limited to a specific spoofing scenario. This paper provides a low computational complexity ap...
GPS spoofing has become a hot topic. At the 2011 Institute of Navigation (ION) GNSS conference, 18 papers discussed spoofing, compared with the same number over the past decade. ION-GNSS also featured its first panel session on anti-spoofing, called “Improving Security of GNSS Receivers,” which offered six security experts a forum to debate the most promising anti-spoofing technologies. The spo...
While multimodal biometric systems are considered to be more robust than unimodal ones but traditional fusion rules are more sensitive to spoofing attempts. The proposed system is designed to overcome spoofing in worst-case scenario where impostor was able to create fake biometric traits of both face and fingerprint modalities in the presented multimodal biometric system. The paper investigates...
Biometric systems are vulnerable to certain type of attacks at various points in the biometric model. A spoofing attack which is submitting a stolen, copied biometric trait to the sensor to gain unauthorized access to the biometric system is one among them. Multimodal biometric systems are designed to increase the accuracy of the biometric system, but they are more vulnerable to spoofing attack...
Voice controlled systems (VCS) in Internet of Things (IoT), speaker verification systems, voice-based biometrics, and other voice-assistant-enabled are vulnerable to different spoofing attacks i.e., replay, cloning, cloned-replay, etc. VCS not only susceptible these a non-network environment, but they also multi-order networked IoT. Additionally, deepfakes with artificially generated audio pose...
As with any task involving statistical pattern recognition, the assessment of spoofing and anti-spoofing approaches for voice recognition calls for significantscale databases of spoofed speech signals. Depending on the application, these signals should normally reflect spoofing attacks performed prior to acquisition at the sensor or microphone. Since the collection of large quantities of any bi...
While multimodal biometric systems were commonly believed to be intrinsically more robust to spoof attacks than unimodal systems, recent results provided clear evidence that they can be evaded by spoofing a single biometric trait. This pointed out that also multimodal systems require specific anti-spoofing measures. In this chapter we introduce the issue of multimodal anti-spoofing, and give an...
In some recent articles, the spoofing of Phasor measurement unit (PMU) GPS receiver has been highlighted as a threat to power grid protection system. Having spoofed PMU GPS signals, one can manipulate the measurements and inject bad data to power grid protection system. The previous anti spoofing methods are all based on GPS signal analysis. The mentioned methods are just able to detect spoofin...
The need for automation of the identity recognition process for a vast number of applications resulted in great advancement of biometric systems in the recent years. Yet, many studies indicate that these systems suffer from vulnerabilities to spoofing (presentation) attacks: a weakness that may compromise their usage in many cases. Face verification systems account for one of the most attractiv...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید