Results 161 to 170 of about 23,142 (187)
Some of the next articles are maybe not open access.

Face Spoof Detection: An Experimental Framework

2021
Face recognition has recently become widespread in security applications. Although advancing technology has improved the performance of these systems, they are still prone to various attacks, including spoofing. The inherent feature extraction capability of machine learning techniques and deep neural networks has facilitated more accurate performance ...
Faseela Abdullakutty   +2 more
openaire   +1 more source

Image-Based Object Spoofing Detection

2018
Using 2D images in authentication systems raises the question of spoof attacks: is it possible to deceive an authentication system using fake models possessing identical visual properties of the genuine one? In this work, an anti-spoofing method approach for a wine anti-counterfeiting system is presented.
Valter Costa   +2 more
openaire   +1 more source

Spoofing Detectability as a Property of Biometric Characteristics. [PDF]

open access: possible, 2021
Regardless of the application domain, adversaries may conduct spoofing attacks in order to bypass an authentication system. The difficulty of fooling a biometric sensor, known as circumvention; can be paired with an additional property based on the easiness of identifying ongoing presentation attacks which could help selecting the most suitable ...
Zoppi T.   +4 more
openaire   +1 more source

Terahertz detection of fingerprint spoofing

2020 45th International Conference on Infrared, Millimeter, and Terahertz Waves (IRMMW-THz), 2020
Currently, spoofing attacks using imitations of legitimate user fingerprints compromise biometric systems. Five representative spoofing materials and a group of 16 adults with different age and gender were selected for tests. We used the terahertz time domain spectroscopy in reflection configuration to distinguish a real finger from its imitation. Both
Norbert Palka, Marcin Kowalski
openaire   +1 more source

Detection and mitigation of pilot spoofing attack

2017 51st Asilomar Conference on Signals, Systems, and Computers, 2017
In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary (spoofer) also sends identical training (pilot) signal as that of the legitimate receiver.
openaire   +1 more source

Detecting ARP Spoofing: An Active Technique

2005
The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man in the middle and session hijacking.
Vivek Ramachandran, Sukumar Nandi
openaire   +1 more source

Biometric Spoofing and Deepfake Detection

Advances in Multidisciplinary and scientific Research Journal Publication, 2022
Biometrics have increasingly become most suited mechanisms for identification and authentication in the use of diverse technologies and systems. However, much they prove to be more robust than other identification and authentication mechanisms, there is also an upsurge with privacy and security concerns.
openaire   +1 more source

Spoofing URL Detection

2022 International Conference on Futuristic Technologies (INCOFT), 2022
Prema Sahane   +4 more
openaire   +1 more source

Face Spoofing Detection Using Dynamic Texture

2013
While there is a significant number of works addressing e.g. pose and illumination variation problems in face recognition, the vulnerabilities to spoofing attacks were mostly unexplored until very recently when an increasing attention is started to be paid to this threat.
Komulainen Jukka   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy