Results 41 to 50 of about 10,579 (187)
The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras
Even though biometric technology increases the security of systems that use it, they are prone to spoof attacks where attempts of fraudulent biometrics are used.
Ghazel Albakri, Sharifa Alghowinem
doaj +1 more source
Segmentation Method for Face Modelling in Thermal Images
Face detection is mostly applied in RGB images. The object detection usually applied the Deep Learning method for model creation. One method face spoofing is by using a thermal camera. The famous object detection methods are Yolo, Fast RCNN, Faster RCNN,
Albar Albar +2 more
doaj +1 more source
Generalized Spoof Detection and Incremental Algorithm Recognition for Voice Spoofing
Highly deceptive deepfake technologies have caused much controversy, e.g., artificial intelligence-based software can automatically generate nude photos and deepfake images of anyone. This brings considerable threats to both individuals and society.
Jinlin Guo, Yancheng Zhao, Haoran Wang
doaj +1 more source
Learning to Generate Posters of Scientific Papers
Researchers often summarize their work in the form of posters. Posters provide a coherent and efficient way to convey core ideas from scientific papers.
Fu, Yanwei +4 more
core +1 more source
Real masks and spoof faces: On the masked face presentation attack detection
Accepted at Pattern ...
Fang, Meiling +3 more
openaire +3 more sources
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
The rise in popularity of face anti-spoofing is attributed to its crucial role in safeguarding face recognition systems. Perpetrators use either a photo or a video to execute a face-spoofing attack on the authentication system of an authorized user ...
Marwa Radad +4 more
doaj +1 more source
A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification
For practical automatic speaker verification (ASV) systems, replay attack poses a true risk. By replaying a pre-recorded speech signal of the genuine speaker, ASV systems tend to be easily fooled.
Chen, Yixiang +3 more
core +1 more source
ABSTRACT The integration of low Earth orbit (LEO) satellite constellations with commercial aircraft communication systems presents critical challenges in maintaining continuous connectivity during dynamic flight conditions. Current geostationary satellite systems suffer from high round‐trip latency (>$$ > $$ 500 ms) and inadequate coverage at high ...
Raúl Parada +4 more
wiley +1 more source
Face presentation attack detection (PAD) is considered to be an essential and critical step in modern face recognition systems. Face PAD aims at exposing an imposter or an unauthorized person seeking to deceive the authentication system.
Madini O. Alassafi +8 more
doaj +1 more source

