Results 41 to 50 of about 10,579 (187)

The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras

open access: yesSensors, 2019
Even though biometric technology increases the security of systems that use it, they are prone to spoof attacks where attempts of fraudulent biometrics are used.
Ghazel Albakri, Sharifa Alghowinem
doaj   +1 more source

Segmentation Method for Face Modelling in Thermal Images

open access: yesKnowledge Engineering and Data Science, 2020
Face detection is mostly applied in RGB images. The object detection usually applied the Deep Learning method for model creation. One method face spoofing is by using a thermal camera. The famous object detection methods are Yolo, Fast RCNN, Faster RCNN,
Albar Albar   +2 more
doaj   +1 more source

Generalized Spoof Detection and Incremental Algorithm Recognition for Voice Spoofing

open access: yesApplied Sciences, 2023
Highly deceptive deepfake technologies have caused much controversy, e.g., artificial intelligence-based software can automatically generate nude photos and deepfake images of anyone. This brings considerable threats to both individuals and society.
Jinlin Guo, Yancheng Zhao, Haoran Wang
doaj   +1 more source

Learning to Generate Posters of Scientific Papers

open access: yes, 2016
Researchers often summarize their work in the form of posters. Posters provide a coherent and efficient way to convey core ideas from scientific papers.
Fu, Yanwei   +4 more
core   +1 more source

Real masks and spoof faces: On the masked face presentation attack detection

open access: yesPattern Recognition, 2022
Accepted at Pattern ...
Fang, Meiling   +3 more
openaire   +3 more sources

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Face Anti-spoofing Detection Based on Novel Encoder Convolutional Neural Network and Texture’s Grayscale Structural Information

open access: yesInternational Journal of Computational Intelligence Systems
The rise in popularity of face anti-spoofing is attributed to its crucial role in safeguarding face recognition systems. Perpetrators use either a photo or a video to execute a face-spoofing attack on the authentication system of an authorized user ...
Marwa Radad   +4 more
doaj   +1 more source

A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification

open access: yes, 2017
For practical automatic speaker verification (ASV) systems, replay attack poses a true risk. By replaying a pre-recorded speech signal of the genuine speaker, ASV systems tend to be easily fooled.
Chen, Yixiang   +3 more
core   +1 more source

Integrated LEO Constellation and In‐Cabin Distribution System for Continuous Aircraft 5G Connectivity

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT The integration of low Earth orbit (LEO) satellite constellations with commercial aircraft communication systems presents critical challenges in maintaining continuous connectivity during dynamic flight conditions. Current geostationary satellite systems suffer from high round‐trip latency (>$$ > $$ 500 ms) and inadequate coverage at high ...
Raúl Parada   +4 more
wiley   +1 more source

A Novel Deep Learning Architecture With Image Diffusion for Robust Face Presentation Attack Detection

open access: yesIEEE Access, 2023
Face presentation attack detection (PAD) is considered to be an essential and critical step in modern face recognition systems. Face PAD aims at exposing an imposter or an unauthorized person seeking to deceive the authentication system.
Madini O. Alassafi   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy