Results 51 to 60 of about 10,579 (187)
PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices
Voice is envisioned to be a popular way for humans to interact with Internet-of-Things (IoT) devices. We propose a proximity-based user authentication method (called PIANO) for access control on such voice-powered IoT devices.
Bao, Xuan +7 more
core +1 more source
Face Spoofing Detection Using Local Graph Structure [PDF]
Face spoofing attack is one of the recent security traits that face recognition systems are proven to be vulnerable to. The spoofing occurs when an attacker bypass the authentication scheme by presenting a copy of the face image for a valid user. Therefore, it's very easy to perform face recognition spoofing attack with compare to other biometrics ...
Bashier, Housam Khalifa +4 more
openaire +2 more sources
A microstructured PVC‐based tribo‐electromagnetic nanogenerator (TEMNG) enables simultaneous harvesting of biomechanical and ambient electromagnetic energy. The hybrid device achieves high electrical outputs while supporting wearable sensing, gait monitoring, and self‐powered touch interfaces.
Ching‐Te Kuo +4 more
wiley +1 more source
Moving face spoofing detection via 3D projective invariants
Face recognition provides many advantages compared with other available biometrics, but it is particularly subject to spoofing. The most accurate methods in literature addressing this problem, rely on the estimation of the three-dimensionality of faces, which heavily increase the whole cost of the system.
DE MARSICO, Maria +3 more
openaire +5 more sources
The emergence of biometric-based authentication using modern sensors on electronic devices has led to an escalated use of face recognition technologies. While these technologies may seem intriguing, they are accompanied by numerous implicit drawbacks. In
Koushik Roy +6 more
doaj +1 more source
Texture analysis using local ternary pattern for face anti-spoofing [PDF]
This paper proposes a new face anti-spoofing approach based on analysis of texture characteristics. Photo images are used for spoofing the face recognition and verification system.
Hanafi, Marsyita +4 more
core
LivDet in Action - Fingerprint Liveness Detection Competition 2019
The International Fingerprint liveness Detection Competition (LivDet) is an open and well-acknowledged meeting point of academies and private companies that deal with the problem of distinguishing images coming from reproductions of fingerprints made of ...
Bazzoni, Carlotta +7 more
core +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Disguised face liveness detection: an ensemble approach using deep features
Deep learning models have surpassed classic machine learning models in face anti-spoofing detection during the last decade. Most face-spoofing detection algorithms are biased toward a single presentation attack, failing to robustly detect multiple ...
Padmashree G., Karunakar A. K.
doaj +1 more source
A Smart Spoofing Face Detector by Display Features Analysis
In this paper, a smart face liveness detector is proposed to prevent the biometric system from being “deceived” by the video or picture of a valid user that the counterfeiter took with a high definition handheld device (e.g., iPad with retina display ...
ChinLun Lai, ChiuYuan Tai
doaj +1 more source

