Results 151 to 160 of about 4,892 (195)
Some of the next articles are maybe not open access.

A review of iris anti-spoofing

2016 4th International Conference on Biometrics and Forensics (IWBF), 2016
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured physical synthetic sample, is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. The whole biometric community, including researchers, developers, standardizing bodies and vendors, has
Javier Galbally, Marta Gomez-Barrero
openaire   +1 more source

Context based face anti-spoofing

2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2013
The face recognition community has finally started paying more attention to the long-neglected problem of spoofing attacks and the number of countermeasures is gradually increasing. Fairly good results have been reported on the publicly available databases but it is reasonable to assume that there exists no superior anti-spoofing technique due to the ...
Komulainen Jukka   +2 more
openaire   +1 more source

Anti-spoofing, Voice Databases

2014
As with any task involving statistical pattern recognition, the assessment of spoofing and anti-spoofing approaches for voice recognition calls for significantscale databases of spoofed speech signals. Depending on the application, these signals should normally reflect spoofing attacks performed prior to acquisition at the sensor or microphone.
Federico Alegre   +4 more
openaire   +1 more source

Anti-spoofing: Iris Databases

2014
Anti-spoofing may be defined as the pattern recognition problem of automatically differentiating between real and fake biometric samples produced with a synthetically manufactured artifact (e.g., iris photograph or plastic eye). As with any other machine learning problem, the availability of data is a critical factor in order to successfully address ...
Javier Galbally, Anna Bori Toth
openaire   +1 more source

Anti-spoofing, Voice Conversion

2014
Voice conversion is a process which converts or transforms one speaker’s voice towards that of another. The literature shows that voice conversion can be used to spoof or fool an automatic speaker verification system. State-of-the-art voice conversion algorithms can produce high-quality speech signals in real time and are capable of fooling both human ...
Nicholas Evans   +3 more
openaire   +1 more source

Curvelet-based fingerprint anti-spoofing

Signal, Image and Video Processing, 2009
Existing perspiration-based liveness detection algorithms need two successive images (captured in certain time interval), hence they are slow and not useful for real-time applications. Liveness detection methods using extra hardware increase the cost of the system.
Shankar Bhausaheb Nikam, Suneeta Agarwal
openaire   +1 more source

Toward Incentivizing Anti-Spoofing Deployment

IEEE Transactions on Information Forensics and Security, 2014
IP spoofing-based flooding attacks are a serious and open security problem on the current Internet. The best current antispoofing practices have long been implemented in modern routers. However, they are not sufficiently applied due to the lack of deployment incentives, i.e., an autonomous system (AS) can hardly gain additional protection by deploying ...
Bingyang Liu   +2 more
openaire   +1 more source

A deployable approach for inter-AS anti-spoofing

2011 19th IEEE International Conference on Network Protocols, 2011
Filtering IP packets with spoofed source addresses not only improves network security, but also helps with network diagnosis and management. Compared with filtering spoofing packets at the edge of network which involves high deployment and maintenance cost, filtering at autonomous system (AS) borders is more cost-effective.
Bingyang Liu, Jun Bi, Yu Zhu
openaire   +1 more source

Iris Anti-spoofing

2014
Iris images contain rich texture information for reliable personal identification. However, forged iris patterns may be used to spoof iris recognition systems. This paper proposes an iris anti-spoofing approach based on the texture discrimination between genuine and fake iris images. Four texture analysis methods include gray level co-occurrence matrix,
Zhenan Sun, Tieniu Tan
openaire   +1 more source

Face Anti-spoofing: Visual Approach

2014
User authentication is an important step to protect information and in this regard face biometrics is advantageous. Face biometrics is natural, easy to use and less human-invasive. Unfortunately, recent work revealed that face biometrics is quite vulnerable to spoofing attacks.
André Anjos   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy