Results 11 to 20 of about 22,160 (195)
GANBA: Generative Adversarial Network for Biometric Anti-Spoofing
Automatic speaker verification (ASV) is a voice biometric technology whose security might be compromised by spoofing attacks. To increase the robustness against spoofing attacks, presentation attack detection (PAD) or anti-spoofing systems for detecting ...
Alejandro Gomez-Alanis +2 more
doaj +1 more source
Visual/Inertial/GNSS Integrated Navigation System under GNSS Spoofing Attack
Visual/Inertial/GNSS (VIG) integrated navigation and positioning systems are widely used in unmanned vehicles and other systems. This VIG system is vulnerable to of GNSS spoofing attacks.
Nianzu Gu, Fei Xing, Zheng You
doaj +1 more source
Spoofing Attack Detection by Anomaly Detection [PDF]
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this paper we focus on face spoofing detection. The majority of papers on spoofing attack detection formulate the problem as a two or multiclass learning task, attempting to separate normal accesses from samples of different types of spoofing attacks.
Fatemifar, Soroush +3 more
openaire +3 more sources
Overview of Anti-Spoofing Methods of Face Recognition Systems for Different Sensors and Complex Scenes [PDF]
As an important biometric recognition technology, face recognition has been widely used in daily life.Although significant progress has been made in this field, the existing face recognition systems are vulnerable to malicious attacks from illegal users ...
HUANG Yifang, WEI Dandan, WU Miao, LI Huibin, GUO Meng
doaj +1 more source
Spoofing and Anti-Spoofing Technologies of Global Navigation Satellite System: A Survey
A large number of facts prove that Global Navigation Satellite System (GNSS) has certain security risks and is threatened by attacks. In particular, GNSS civilian signal receivers have some vulnerability in responding to spoofing attack and jamming ...
Zhijun Wu +4 more
doaj +1 more source
Biometrics Evaluation Under Spoofing Attacks [PDF]
While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, resulting in efficient counter-measures for many biometric modes.
Ivana Chingovska +2 more
openaire +1 more source
Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias
The aim of this paper was to propose a method to characterize the ability of a GNSS user to detect a spoofing attack from the behavior of the clock bias.
Victor Truong +3 more
doaj +1 more source
A channel state information based virtual MAC spoofing detector
Physical layer security has attracted lots of attention with the expansion of wireless devices to the edge networks in recent years. Due to limited authentication mechanisms, MAC spoofing attack, also known as the identity attack, threatens wireless ...
Peng Jiang, Hongyi Wu, Chunsheng Xin
doaj +1 more source
Face Biometric Spoof Detection Method Using a Remote Photoplethysmography Signal
Spoofing attacks in face recognition systems are easy because faces are always exposed. Various remote photoplethysmography-based methods to detect face spoofing have been developed. However, they are vulnerable to replay attacks.
Seung-Hyun Kim +2 more
doaj +1 more source
On the requirements for successful GPS spoofing attacks [PDF]
An increasing number of wireless applications rely on GPS signals for localization, navigation, and time synchronization. However, civilian GPS signals are known to be susceptible to spoofing attacks which make GPS receivers in range believe that they reside at locations different than their real physical locations.
Nils Ole Tippenhauer +3 more
openaire +2 more sources

