Results 51 to 60 of about 2,994,964 (187)
Texture analysis using local ternary pattern for face anti-spoofing [PDF]
This paper proposes a new face anti-spoofing approach based on analysis of texture characteristics. Photo images are used for spoofing the face recognition and verification system.
Hanafi, Marsyita +4 more
core
Learning to Generate Posters of Scientific Papers
Researchers often summarize their work in the form of posters. Posters provide a coherent and efficient way to convey core ideas from scientific papers.
Fu, Yanwei +4 more
core +1 more source
Face spoofing, the act of using deceptive techniques such as printed photos or digital images to deceive facial recognition systems, poses a significant threat to the security of various applications, including biometric authentication and access control
Ijsrem Journal
semanticscholar +1 more source
From the Ground to the Stars: The Vertical Politics of the EU Drone Wall and Airspace Defence
Abstract This research note analyses the European Commission's Defence Readiness Roadmap 2030 as a manifestation of a new spatial and technological logic of European defence: the vertical territorialisation of security. Moving beyond traditional perimeter‐based understandings of territorial defence, the Roadmap constructs a multi‐layered continuum ...
Justinas Lingevicius +2 more
wiley +1 more source
Biometrics in ABC: counter-spoofing research [PDF]
Automated border control (ABC) is concerned with fast and secure processing for intelligence-led identification. The FastPass project aims to build a harmonised, modular reference system for future European ABC.
Chen, Lulu, Ferryman, James, Wei, Hong
core
A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification
For practical automatic speaker verification (ASV) systems, replay attack poses a true risk. By replaying a pre-recorded speech signal of the genuine speaker, ASV systems tend to be easily fooled.
Chen, Yixiang +3 more
core +1 more source
Effect of Facial Shape Information Reflected on Learned Features in Face Spoofing Detection
Face recognition is a convenient and non-contact biometric method used widely for secure personal authentication. However, the face is an exposed body part, and face spoofing attacks, which compromise the security of systems that use face recognition ...
Su-Gyeong Yu Su-Gyeong Yu +3 more
semanticscholar +1 more source
Abstract Cyanobacteria are cosmopolitan, important components of biomass with a remarkable ability to synthesize a diverse array of bioactive compounds, some of which may have toxic effects on other organisms and ecosystems. In this study, filamentous cyanobacterial strains isolated predominantly from temperate European freshwaters (Aphanizomenon ...
Łukasz Wejnerowski +14 more
wiley +1 more source
PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices
Voice is envisioned to be a popular way for humans to interact with Internet-of-Things (IoT) devices. We propose a proximity-based user authentication method (called PIANO) for access control on such voice-powered IoT devices.
Bao, Xuan +7 more
core +1 more source
Building centaur responders: is emergency management ready for artificial intelligence?
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte +1 more
wiley +1 more source

