Filters








5,829 Hits in 7.1 sec

A Survey on Unknown Presentation Attack Detection for Fingerprint [article]

Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra
2020 arXiv   pre-print
In this survey paper, we present a comprehensive survey on existing PAD algorithms for fingerprint recognition systems, specifically from the standpoint of detecting unknown PAD.  ...  Biometrics Researchers have developed Presentation Attack Detection (PAD) methods as a countermeasure to PA.  ...  Our survey on fingerprint Presentation Attack Detection (FPAD) presents the following: -Comprehensive survey of existing methods for FPAD for unknown attacks.  ... 
arXiv:2005.08337v1 fatcat:i7bg3ipotzhxvb7jfwwfavxspq

On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection

Jascha Kolberg, Daniel Gläsner, Ralph Breithaupt, Marta Gomez-Barrero, Jörg Reinhold, Arndt von Twickel, Christoph Busch
2021 Sensors  
Based on a dataset comprising 42 different PAI species, the results showed remarkable performance in detecting most attack presentations with an APCER = 2.89% in a user-friendly scenario specified by a  ...  In this work, a fingerprint capture device based on thin film transistor (TFT) technology has been modified to additionally acquire the impedances of the presented fingers.  ...  Using a training set, this approach was able to detect additional unknown attacks due to their similarity to known attacks.  ... 
doi:10.3390/s21175686 pmid:34502576 pmcid:PMC8433742 fatcat:sn7j6cuunfbt7lgk75blmozdcm

A comprehensive survey of fingerprint presentation attack detection

Konstantinos Karampidis, Minas Rousouliotis, Euangelos Linardos, Ergina Kavallieratou
2021 Journal of Surveillance, Security and Safety  
In this review, we investigate fingerprint presentation attack detection by highlighting the recent advances in this field and addressing all the disadvantages of the utilization of fingerprints as a biometric  ...  Given that biometric authentication systems are now widely employed, fingerprint presentation attack detection has become crucial.  ...  A generic presentation attack detection scheme. based presentation attack detector EER of 12% on the LivDet 2011 and of 12.7% on the LivDet 2013 Lu et al.  ... 
doi:10.20517/jsss.2021.07 fatcat:arkgqtjmhfgqzgmwiuo4pc3squ

Network attacks: Taxonomy, tools and systems

N. Hoque, Monowar H. Bhuyan, R.C. Baishya, D.K. Bhattacharyya, J.K. Kalita
2014 Journal of Network and Computer Applications  
In this survey, we provide a taxonomy of attack tools in a consistent way for the benefit of network security researchers.  ...  This paper also presents a comprehensive and structured survey of existing tools and systems that can support both attackers and network defenders.  ...  It depends on (a) a misuse detection mobile agent to detect known attacks and (b) an anomaly detection mobile agent to detect unknown attacks.  ... 
doi:10.1016/j.jnca.2013.08.001 fatcat:gfvxtbbki5c7xis2wjaj37izsm

Biometric Presentation Attack Detection: Beyond the Visible Spectrum [article]

Ruben Tolosana and Marta Gomez-Barrero and Christoph Busch and Javier Ortega-Garcia
2019 arXiv   pre-print
purposes (i.e., unknown attacks).  ...  The biometrics community has thus made a considerable effort to the development of automatic Presentation Attack Detection (PAD) mechanisms, for instance through the international LivDet competitions.  ...  Tolosana is supported by a FPU Fellowship from Spanish MECD.  ... 
arXiv:1902.11065v1 fatcat:twsstgevknfqzjxkfbtcotxfjy

Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection

Jascha Kolberg, Marcel Grimmer, Marta Gomez-Barrero, Christoph Busch
2021 IEEE Transactions on Biometrics Behavior and Identity Science  
Therefore, presentation attack detection (PAD) methods are used to determine whether samples stem from a bona fide subject or from a presentation attack instrument (PAI).  ...  In particular, this applies for unsupervised applications, where new attacks unknown to the system operator may occur.  ...  As a consequence, biometric systems require automated presentation attack detection (PAD) modules in order to distinguish bona fide presentations from attack presentations [3] .  ... 
doi:10.1109/tbiom.2021.3050036 fatcat:pkokcmdagrgfzghau3xsl2tm3i

Presentation Attack Detection for Finger Recognition [chapter]

Jascha Kolberg, Marta Gomez-Barrero, Sushma Venkatesh, Raghavendra Ramachandra, Christoph Busch
2019 Advances in Computer Vision and Pattern Recognition  
This fact makes them relevant not only for recognition purposes but especially for Presentation Attack Detection (PAD), for instance, in combination with fingerprint recognition.  ...  In this chapter, we make use of this combination and present a finger vein-based PAD algorithm to detect presentation attacks targeting fingerprint recognition.  ...  We would also like to thank our colleagues at USC for the data collection efforts.  ... 
doi:10.1007/978-3-030-27731-4_14 fatcat:hyx33rbatvgqbhzxzcryg6ymyu

Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection [article]

Jascha Kolberg and Marcel Grimmer and Marta Gomez-Barrero and Christoph Busch
2020 arXiv   pre-print
Therefore, presentation attack detection (PAD) methods are used to determine whether samples stem from a bona fide subject or from a presentation attack instrument (PAI).  ...  In particular, this applies for unsupervised applications, where new attacks unknown to the system operator may occur.  ...  Research Center for Applied Cybersecurity ATHENE.  ... 
arXiv:2008.07989v2 fatcat:5x5wmd6fvncadbbpuhlo3odgre

A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles [article]

Trupil Limbasiya, Ko Zheng Teng, Sudipta Chattopadhyay, Jianying Zhou
2022 arXiv   pre-print
There are some surveys with a limited discussion on Attacks Detection and Prevention Systems (ADPS), but such surveys provide only partial coverage of different types of ADPS for CAVs.  ...  However, the importance of attacks detection and prevention approaches for CAVs has not been discussed extensively in the state-of-the-art surveys, and there is a clear gap in the existing literature on  ...  We thank LTA colleagues and project team members for their helpful input.  ... 
arXiv:2203.14965v1 fatcat:4orttcmbjfei5dbhsjnaovmm7a

Machine Learning for Security in Vehicular Networks: A Comprehensive Survey [article]

Anum Talpur, Mohan Gurusamy
2021 arXiv   pre-print
In this paper, we present a comprehensive survey of ML-based techniques for different security issues in vehicular networks.  ...  In this regard, ML and its variants are gaining popularity to detect attacks and deal with different kinds of security issues in vehicular communication.  ...  A survey is presented in [199] which highlights the problem of an adversarial attack on DL as a serious issue for networks.  ... 
arXiv:2105.15035v2 fatcat:5z6aqlvosjgf3o3amts3k6toxu

Machine Learning for the Detection and Identification of Internet of Things (IoT) Devices: A Survey [article]

Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
2021 arXiv   pre-print
In this paper, we provide a comprehensive survey on machine learning technologies for the identification of IoT devices along with the detection of compromised or falsified ones from the viewpoint of passive  ...  The first step in securing the IoT is detecting rogue IoT devices and identifying legitimate ones.  ...  In this paper, we focus on a more specific point by providing a comprehensive survey of machine learning for the detection and identification of devices in IoT using passively collected traffic traces  ... 
arXiv:2101.10181v1 fatcat:in5x7tp5fbdernmlzyvv52muke

Analysis of Fingerprinting Techniques for Tor Hidden Services

Andriy Panchenko, Asya Mitseva, Martin Henze, Fabian Lanze, Klaus Wehrle, Thomas Engel
2017 Proceedings of the 2017 on Workshop on Privacy in the Electronic Society - WPES '17  
In this work, we propose a novel two-phase approach for fingerprinting hidden services that does not rely on malicious Tor nodes.  ...  In our attack, the adversary merely needs to be on the link between the client and the first anonymization node. In the first phase, we detect a connection to a hidden service.  ...  ACKNOWLEDGMENTS The authors would like to thank Markus Peuhkuri from Aalto University in Finnland for helping them with accessing the PlanetLab testbed.  ... 
doi:10.1145/3139550.3139564 dblp:conf/wpes/PanchenkoMHLWE17 fatcat:qkwn3e5tyreobcdhsesoxikkoe

Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach [article]

Steven A. Grosz, Tarang Chugh, Anil K. Jain
2020 arXiv   pre-print
presentation attack detection (PAD) methods.  ...  Specifically, we build on top of any CNN-based architecture trained for fingerprint spoof detection combined with cross-material spoof generalization using a style transfer network wrapper.  ...  Government is authorized to reproduce and distribute reprints for governmental purposes notwithstanding any copyright annotation therein.  ... 
arXiv:2004.02941v1 fatcat:lnf4vwqmfzcwrkhr4ofgfjeteu

Device Fingerprinting in Wireless Networks: Challenges and Opportunities [article]

Qiang Xu, Rong Zheng, Walid Saad, Zhu Han
2015 arXiv   pre-print
One promising approach toward thwarting these attacks is through the extraction of unique fingerprints that can provide a reliable and robust means for device identification.  ...  In this paper, the first unified and comprehensive tutorial in the area of wireless device fingerprinting for security applications is presented.  ...  CONCLUSIONS In this paper, we have provided a comprehensive survey on device fingerprinting for enhancing wireless network security.  ... 
arXiv:1501.01367v1 fatcat:xjzysezfjfbylce2227vzydhwm

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets [article]

Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez
2021 arXiv   pre-print
With this goal in mind, a promising research field emerged focusing on creating and managing fingerprints that model the behavior of both the device actions and its components.  ...  This article also provides researchers with a review of the most relevant characteristics of existing datasets as most of the novel processing techniques are based on machine learning and deep learning  ...  ACKNOWLEDGMENT This work has been partially supported by the Swiss Federal Office for Defence Procurement (armasuisse) (project code Aramis R-3210/047-31), and the Irish Research Council, under the government  ... 
arXiv:2008.03343v2 fatcat:ujj7ka2txvfj7fbawyhloloac4
« Previous Showing results 1 — 15 out of 5,829 results