Results 161 to 170 of about 23,142 (187)
Some of the next articles are maybe not open access.
Face Spoof Detection: An Experimental Framework
2021Face recognition has recently become widespread in security applications. Although advancing technology has improved the performance of these systems, they are still prone to various attacks, including spoofing. The inherent feature extraction capability of machine learning techniques and deep neural networks has facilitated more accurate performance ...
Faseela Abdullakutty +2 more
openaire +1 more source
Image-Based Object Spoofing Detection
2018Using 2D images in authentication systems raises the question of spoof attacks: is it possible to deceive an authentication system using fake models possessing identical visual properties of the genuine one? In this work, an anti-spoofing method approach for a wine anti-counterfeiting system is presented.
Valter Costa +2 more
openaire +1 more source
Spoofing Detectability as a Property of Biometric Characteristics. [PDF]
Regardless of the application domain, adversaries may conduct spoofing attacks in order to bypass an authentication system. The difficulty of fooling a biometric sensor, known as circumvention; can be paired with an additional property based on the easiness of identifying ongoing presentation attacks which could help selecting the most suitable ...
Zoppi T. +4 more
openaire +1 more source
Terahertz detection of fingerprint spoofing
2020 45th International Conference on Infrared, Millimeter, and Terahertz Waves (IRMMW-THz), 2020Currently, spoofing attacks using imitations of legitimate user fingerprints compromise biometric systems. Five representative spoofing materials and a group of 16 adults with different age and gender were selected for tests. We used the terahertz time domain spectroscopy in reflection configuration to distinguish a real finger from its imitation. Both
Norbert Palka, Marcin Kowalski
openaire +1 more source
Detection and mitigation of pilot spoofing attack
2017 51st Asilomar Conference on Signals, Systems, and Computers, 2017In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary (spoofer) also sends identical training (pilot) signal as that of the legitimate receiver.
openaire +1 more source
Detecting ARP Spoofing: An Active Technique
2005The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man in the middle and session hijacking.
Vivek Ramachandran, Sukumar Nandi
openaire +1 more source
Biometric Spoofing and Deepfake Detection
Advances in Multidisciplinary and scientific Research Journal Publication, 2022Biometrics have increasingly become most suited mechanisms for identification and authentication in the use of diverse technologies and systems. However, much they prove to be more robust than other identification and authentication mechanisms, there is also an upsurge with privacy and security concerns.
openaire +1 more source
2022 International Conference on Futuristic Technologies (INCOFT), 2022
Prema Sahane +4 more
openaire +1 more source
Prema Sahane +4 more
openaire +1 more source
Face Spoofing Detection Using Dynamic Texture
2013While there is a significant number of works addressing e.g. pose and illumination variation problems in face recognition, the vulnerabilities to spoofing attacks were mostly unexplored until very recently when an increasing attention is started to be paid to this threat.
Komulainen Jukka +2 more
openaire +1 more source
Person-Specific Face Spoofing Detection Based on a Siamese Network
Pattern Recognition, 2023Mingtao Pei
exaly

