Results 11 to 20 of about 22,160 (195)

GANBA: Generative Adversarial Network for Biometric Anti-Spoofing

open access: yesApplied Sciences, 2022
Automatic speaker verification (ASV) is a voice biometric technology whose security might be compromised by spoofing attacks. To increase the robustness against spoofing attacks, presentation attack detection (PAD) or anti-spoofing systems for detecting ...
Alejandro Gomez-Alanis   +2 more
doaj   +1 more source

Visual/Inertial/GNSS Integrated Navigation System under GNSS Spoofing Attack

open access: yesRemote Sensing, 2022
Visual/Inertial/GNSS (VIG) integrated navigation and positioning systems are widely used in unmanned vehicles and other systems. This VIG system is vulnerable to of GNSS spoofing attacks.
Nianzu Gu, Fei Xing, Zheng You
doaj   +1 more source

Spoofing Attack Detection by Anomaly Detection [PDF]

open access: yesICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this paper we focus on face spoofing detection. The majority of papers on spoofing attack detection formulate the problem as a two or multiclass learning task, attempting to separate normal accesses from samples of different types of spoofing attacks.
Fatemifar, Soroush   +3 more
openaire   +3 more sources

Overview of Anti-Spoofing Methods of Face Recognition Systems for Different Sensors and Complex Scenes [PDF]

open access: yesJisuanji gongcheng, 2021
As an important biometric recognition technology, face recognition has been widely used in daily life.Although significant progress has been made in this field, the existing face recognition systems are vulnerable to malicious attacks from illegal users ...
HUANG Yifang, WEI Dandan, WU Miao, LI Huibin, GUO Meng
doaj   +1 more source

Spoofing and Anti-Spoofing Technologies of Global Navigation Satellite System: A Survey

open access: yesIEEE Access, 2020
A large number of facts prove that Global Navigation Satellite System (GNSS) has certain security risks and is threatened by attacks. In particular, GNSS civilian signal receivers have some vulnerability in responding to spoofing attack and jamming ...
Zhijun Wu   +4 more
doaj   +1 more source

Biometrics Evaluation Under Spoofing Attacks [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2014
While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, resulting in efficient counter-measures for many biometric modes.
Ivana Chingovska   +2 more
openaire   +1 more source

Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias

open access: yesSensors, 2023
The aim of this paper was to propose a method to characterize the ability of a GNSS user to detect a spoofing attack from the behavior of the clock bias.
Victor Truong   +3 more
doaj   +1 more source

A channel state information based virtual MAC spoofing detector

open access: yesHigh-Confidence Computing, 2022
Physical layer security has attracted lots of attention with the expansion of wireless devices to the edge networks in recent years. Due to limited authentication mechanisms, MAC spoofing attack, also known as the identity attack, threatens wireless ...
Peng Jiang, Hongyi Wu, Chunsheng Xin
doaj   +1 more source

Face Biometric Spoof Detection Method Using a Remote Photoplethysmography Signal

open access: yesSensors, 2022
Spoofing attacks in face recognition systems are easy because faces are always exposed. Various remote photoplethysmography-based methods to detect face spoofing have been developed. However, they are vulnerable to replay attacks.
Seung-Hyun Kim   +2 more
doaj   +1 more source

On the requirements for successful GPS spoofing attacks [PDF]

open access: yesProceedings of the 18th ACM conference on Computer and communications security, 2011
An increasing number of wireless applications rely on GPS signals for localization, navigation, and time synchronization. However, civilian GPS signals are known to be susceptible to spoofing attacks which make GPS receivers in range believe that they reside at locations different than their real physical locations.
Nils Ole Tippenhauer   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy