Results 91 to 100 of about 10,579 (187)

Exploring the Security of Mobile Face Recognition: Attacks, Defenses, and Future Directions

open access: yesApplied Sciences
Biometric authentication on smartphones has advanced rapidly in recent years, with face recognition becoming the dominant modality due to its convenience and easy integration with modern mobile hardware.
Elísabet Líf Birgisdóttir   +5 more
doaj   +1 more source

Analyzing the effect of reasoning-based supervision on face anti-spoofing

open access: yesScientific Reports
Face anti-spoofing (FAS) has become a crucial component in securing face recognition systems against presentation attacks, such as printed photos, replay videos, and 3D masks. While recent advances have improved generalization to unseen spoofing attempts,
Jimin Min   +6 more
doaj   +1 more source

Face Spoofing Detection with Stacking Ensembles in Work Time Registration System

open access: yesApplied Sciences
This paper introduces a passive face-authenticity detection system, designed for integration into an employee work time registration platform. The system is implemented as a stacking ensemble of multiple models.
Rafał Klinowski, Mirosław Kordos
doaj   +1 more source

Dependable identity recognition and authorization based on visual information

open access: yesDianxin kexue, 2020
Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled
Chunlei PENG   +3 more
doaj   +2 more sources

Context-Aware Intrusion Detection in Vehicular Communication Networks: Enhanced Attack Modeling and Dataset

open access: yesApplied Artificial Intelligence
Vehicular Communication Networks (VCNs) are essential for autonomous vehicles and Intelligent Transportation Systems but face challenges in security vulnerabilities and data sparsity.
Muhammad Danish Khan   +3 more
doaj   +1 more source

Improving Face Presentation Attack Detection Through Deformable Convolution and Transfer Learning

open access: yesIEEE Access
Face presentation attack detection (PAD) is essential for ensuring the security and reliability of face recognition systems by preventing unauthorized access through spoofing attempts.
Shakeel Muhammad Ibrahim   +4 more
doaj   +1 more source

Preventive Attendance Record using Photo from Mobile Phone and Printed Paper using CNN

open access: yesJournal of Information and Technology
Face-based attendance systems are increasingly popular for their ease of use, but they are susceptible to fraud, such as using photos or videos for unauthorized attendance.
Bradika Almandin Almandin Wisesa   +3 more
doaj   +1 more source

Feature-level fusion of face and speech based multimodal biometric attendance system with liveness detection

open access: yesAIP Advances
The rapid growth of deep learning and the Internet of Things has spurred the need for touchless biometric systems in areas where cleanliness and non-intrusive user interaction are critical.
Khushboo Jha   +2 more
doaj   +1 more source

Mitigating shoulder spoofing vulnerabilities in mobile payment systems: a security framework. [PDF]

open access: yesSci Rep
Alqahtani O   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy