Results 31 to 40 of about 10,579 (187)

Hybrid Classification for Face Spoof Detection

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2021
Abstract: ML (machine learning) is consisted of a method of recognizing face. This technique is useful for the attendance system. Two sets are generated for testing and training phases in order to segment the image, to extract the features and develop a dataset.
openaire   +1 more source

Face Spoofing Detection using Deep Learning

open access: yesInternational Journal of Research Publication and Reviews
The author's school has a conflict of interest regarding the submission of this article prior to his graduation thesis ...
Najeebullah   +2 more
openaire   +3 more sources

Real-time cross-layer design for large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks [PDF]

open access: yes, 2009
IEEE 802.11 WMN is an emerging next generation low-cost multi-hop wireless broadband provisioning technology. It has the capability of integrating wired and wireless networks such as LANs, IEEE 802.11 WLANs, IEEE 802.16 WMANs, and sensor networks.
Khan, S, Loo, KK
core   +1 more source

Face Spoofing Detection by Fusing Binocular Depth and Spatial Pyramid Coding Micro-Texture Features

open access: yes, 2017
Robust features are of vital importance to face spoofing detection, because various situations make feature space extremely complicated to partition. Thus in this paper, two novel and robust features for anti-spoofing are proposed.
Lin, Tianwei, Song, Xiao, Zhao, Xu
core   +1 more source

Face Spoofing, Age, Gender and Facial Expression Recognition Using Advance Neural Network Architecture-Based Biometric System

open access: yesSensors, 2022
Nowadays, the demand for soft-biometric-based devices is increasing rapidly because of the huge use of electronics items such as mobiles, laptops and electronic gadgets in daily life.
Sandeep Kumar   +6 more
doaj   +1 more source

Audio-replay attack detection countermeasures

open access: yes, 2017
This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017.
Kozlov, Alexander   +5 more
core   +1 more source

Impact Assessment of GNSS Spoofing Attacks on INS/GNSS Integrated Navigation System

open access: yesSensors, 2018
In the face of emerging Global Navigation Satellite System (GNSS) spoofing attacks, there is a need to give a comprehensive analysis on how the inertial navigation system (INS)/GNSS integrated navigation system responds to different kinds of spoofing ...
Yang Liu   +3 more
doaj   +1 more source

A Study on Presentation Attack Detection in Thermal Infrared

open access: yesSensors, 2020
Face recognition systems face real challenges from various presentation attacks. New, more sophisticated methods of presentation attacks are becoming more difficult to detect using traditional face recognition systems.
Marcin Kowalski
doaj   +1 more source

Live Spoofing Detection for Automatic Human Activity Recognition Applications

open access: yesSensors, 2021
Human Activity Recognition (HAR) has become increasingly crucial in several applications, ranging from motion-driven virtual games to automated video surveillance systems.
Viktor Dénes Huszár   +1 more
doaj   +1 more source

FACE SPOOF DETECTION USING CONVOLUTIONAL NEURAL NETWORK

open access: yesProblems of Information Society, 2023
The paper suggests a technique that uses convolutional neural network (CNN) to identify fraudulent facial manipulation. The proposed method comprises teaching an intricate neural network using a comprehensive compilation of genuine and fake facial images.
Leyla Muradkhanli, Parviz Namazli
openaire   +2 more sources

Home - About - Disclaimer - Privacy