Results 151 to 160 of about 4,892 (195)
Some of the next articles are maybe not open access.
A review of iris anti-spoofing
2016 4th International Conference on Biometrics and Forensics (IWBF), 2016To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured physical synthetic sample, is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. The whole biometric community, including researchers, developers, standardizing bodies and vendors, has
Javier Galbally, Marta Gomez-Barrero
openaire +1 more source
Context based face anti-spoofing
2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2013The face recognition community has finally started paying more attention to the long-neglected problem of spoofing attacks and the number of countermeasures is gradually increasing. Fairly good results have been reported on the publicly available databases but it is reasonable to assume that there exists no superior anti-spoofing technique due to the ...
Komulainen Jukka +2 more
openaire +1 more source
Anti-spoofing, Voice Databases
2014As with any task involving statistical pattern recognition, the assessment of spoofing and anti-spoofing approaches for voice recognition calls for significantscale databases of spoofed speech signals. Depending on the application, these signals should normally reflect spoofing attacks performed prior to acquisition at the sensor or microphone.
Federico Alegre +4 more
openaire +1 more source
2014
Anti-spoofing may be defined as the pattern recognition problem of automatically differentiating between real and fake biometric samples produced with a synthetically manufactured artifact (e.g., iris photograph or plastic eye). As with any other machine learning problem, the availability of data is a critical factor in order to successfully address ...
Javier Galbally, Anna Bori Toth
openaire +1 more source
Anti-spoofing may be defined as the pattern recognition problem of automatically differentiating between real and fake biometric samples produced with a synthetically manufactured artifact (e.g., iris photograph or plastic eye). As with any other machine learning problem, the availability of data is a critical factor in order to successfully address ...
Javier Galbally, Anna Bori Toth
openaire +1 more source
Anti-spoofing, Voice Conversion
2014Voice conversion is a process which converts or transforms one speaker’s voice towards that of another. The literature shows that voice conversion can be used to spoof or fool an automatic speaker verification system. State-of-the-art voice conversion algorithms can produce high-quality speech signals in real time and are capable of fooling both human ...
Nicholas Evans +3 more
openaire +1 more source
Curvelet-based fingerprint anti-spoofing
Signal, Image and Video Processing, 2009Existing perspiration-based liveness detection algorithms need two successive images (captured in certain time interval), hence they are slow and not useful for real-time applications. Liveness detection methods using extra hardware increase the cost of the system.
Shankar Bhausaheb Nikam, Suneeta Agarwal
openaire +1 more source
Toward Incentivizing Anti-Spoofing Deployment
IEEE Transactions on Information Forensics and Security, 2014IP spoofing-based flooding attacks are a serious and open security problem on the current Internet. The best current antispoofing practices have long been implemented in modern routers. However, they are not sufficiently applied due to the lack of deployment incentives, i.e., an autonomous system (AS) can hardly gain additional protection by deploying ...
Bingyang Liu +2 more
openaire +1 more source
A deployable approach for inter-AS anti-spoofing
2011 19th IEEE International Conference on Network Protocols, 2011Filtering IP packets with spoofed source addresses not only improves network security, but also helps with network diagnosis and management. Compared with filtering spoofing packets at the edge of network which involves high deployment and maintenance cost, filtering at autonomous system (AS) borders is more cost-effective.
Bingyang Liu, Jun Bi, Yu Zhu
openaire +1 more source
2014
Iris images contain rich texture information for reliable personal identification. However, forged iris patterns may be used to spoof iris recognition systems. This paper proposes an iris anti-spoofing approach based on the texture discrimination between genuine and fake iris images. Four texture analysis methods include gray level co-occurrence matrix,
Zhenan Sun, Tieniu Tan
openaire +1 more source
Iris images contain rich texture information for reliable personal identification. However, forged iris patterns may be used to spoof iris recognition systems. This paper proposes an iris anti-spoofing approach based on the texture discrimination between genuine and fake iris images. Four texture analysis methods include gray level co-occurrence matrix,
Zhenan Sun, Tieniu Tan
openaire +1 more source
Face Anti-spoofing: Visual Approach
2014User authentication is an important step to protect information and in this regard face biometrics is advantageous. Face biometrics is natural, easy to use and less human-invasive. Unfortunately, recent work revealed that face biometrics is quite vulnerable to spoofing attacks.
André Anjos +4 more
openaire +1 more source

