Results 71 to 80 of about 2,994,964 (187)
IoT Cloud-Based Framework for Face Spoofing Detection with Deep Multicolor Feature Learning Model
A face-based authentication system has become an important topic in various fields of IoT applications such as identity validation for social care, crime detection, ATM access, computer security, etc.
Sajad Einy, Cemil Öz, Y. D. Navaei
semanticscholar +1 more source
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose +6 more
wiley +1 more source
Overview of satellite nav spoofing and anti-spoofing techniques
In recent years, satellite navigation systems have witnessed widespread adoption across diverse fields, including military surveillance, precision agriculture, traffic monitoring, resource exploration, and disaster assessment. However, navigation signals
Cheng Lu +8 more
doaj +1 more source
Face Liveness Detection Using a Light Field Camera
A light field camera is a sensor that can record the directions as well as the colors of incident rays. This camera is widely utilized from 3D reconstruction to face and iris recognition.
Sooyeon Kim, Yuseok Ban, Sangyoun Lee
doaj +1 more source
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca +6 more
wiley +1 more source
Face anti‐spoofing from the perspective of data sampling
Without deploying face anti‐spoofing countermeasures, face recognition systems can be spoofed by presenting a printed photo, a video, or a silicon mask of a genuine user.
Usman Muhammad, Mourad Oussalah
doaj +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López +3 more
wiley +1 more source
Face anti-spoofing is a critical challenge in biometric security systems, where sophisticated spoofing techniques pose significant threats. To enhance the effectiveness and efficiency of the methods employed for face anti-spoofing, this paper presents a ...
Mohammed Kareem Hussein Hussein +1 more
doaj +1 more source
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source

