A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey on Unknown Presentation Attack Detection for Fingerprint
[article]
2020
arXiv
pre-print
In this survey paper, we present a comprehensive survey on existing PAD algorithms for fingerprint recognition systems, specifically from the standpoint of detecting unknown PAD. ...
Biometrics Researchers have developed Presentation Attack Detection (PAD) methods as a countermeasure to PA. ...
Our survey on fingerprint Presentation Attack Detection (FPAD) presents the following: -Comprehensive survey of existing methods for FPAD for unknown attacks. ...
arXiv:2005.08337v1
fatcat:i7bg3ipotzhxvb7jfwwfavxspq
On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
2021
Sensors
Based on a dataset comprising 42 different PAI species, the results showed remarkable performance in detecting most attack presentations with an APCER = 2.89% in a user-friendly scenario specified by a ...
In this work, a fingerprint capture device based on thin film transistor (TFT) technology has been modified to additionally acquire the impedances of the presented fingers. ...
Using a training set, this approach was able to detect additional unknown attacks due to their similarity to known attacks. ...
doi:10.3390/s21175686
pmid:34502576
pmcid:PMC8433742
fatcat:sn7j6cuunfbt7lgk75blmozdcm
A comprehensive survey of fingerprint presentation attack detection
2021
Journal of Surveillance, Security and Safety
In this review, we investigate fingerprint presentation attack detection by highlighting the recent advances in this field and addressing all the disadvantages of the utilization of fingerprints as a biometric ...
Given that biometric authentication systems are now widely employed, fingerprint presentation attack detection has become crucial. ...
A generic presentation attack detection scheme.
based presentation attack detector EER of 12% on the LivDet 2011 and of 12.7% on the LivDet 2013 Lu et al. ...
doi:10.20517/jsss.2021.07
fatcat:arkgqtjmhfgqzgmwiuo4pc3squ
Network attacks: Taxonomy, tools and systems
2014
Journal of Network and Computer Applications
In this survey, we provide a taxonomy of attack tools in a consistent way for the benefit of network security researchers. ...
This paper also presents a comprehensive and structured survey of existing tools and systems that can support both attackers and network defenders. ...
It depends on (a) a misuse detection mobile agent to detect known attacks and (b) an anomaly detection mobile agent to detect unknown attacks. ...
doi:10.1016/j.jnca.2013.08.001
fatcat:gfvxtbbki5c7xis2wjaj37izsm
Biometric Presentation Attack Detection: Beyond the Visible Spectrum
[article]
2019
arXiv
pre-print
purposes (i.e., unknown attacks). ...
The biometrics community has thus made a considerable effort to the development of automatic Presentation Attack Detection (PAD) mechanisms, for instance through the international LivDet competitions. ...
Tolosana is supported by a FPU Fellowship from Spanish MECD. ...
arXiv:1902.11065v1
fatcat:twsstgevknfqzjxkfbtcotxfjy
Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection
2021
IEEE Transactions on Biometrics Behavior and Identity Science
Therefore, presentation attack detection (PAD) methods are used to determine whether samples stem from a bona fide subject or from a presentation attack instrument (PAI). ...
In particular, this applies for unsupervised applications, where new attacks unknown to the system operator may occur. ...
As a consequence, biometric systems require automated presentation attack detection (PAD) modules in order to distinguish bona fide presentations from attack presentations [3] . ...
doi:10.1109/tbiom.2021.3050036
fatcat:pkokcmdagrgfzghau3xsl2tm3i
Presentation Attack Detection for Finger Recognition
[chapter]
2019
Advances in Computer Vision and Pattern Recognition
This fact makes them relevant not only for recognition purposes but especially for Presentation Attack Detection (PAD), for instance, in combination with fingerprint recognition. ...
In this chapter, we make use of this combination and present a finger vein-based PAD algorithm to detect presentation attacks targeting fingerprint recognition. ...
We would also like to thank our colleagues at USC for the data collection efforts. ...
doi:10.1007/978-3-030-27731-4_14
fatcat:hyx33rbatvgqbhzxzcryg6ymyu
Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection
[article]
2020
arXiv
pre-print
Therefore, presentation attack detection (PAD) methods are used to determine whether samples stem from a bona fide subject or from a presentation attack instrument (PAI). ...
In particular, this applies for unsupervised applications, where new attacks unknown to the system operator may occur. ...
Research Center for Applied Cybersecurity ATHENE. ...
arXiv:2008.07989v2
fatcat:5x5wmd6fvncadbbpuhlo3odgre
A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles
[article]
2022
arXiv
pre-print
There are some surveys with a limited discussion on Attacks Detection and Prevention Systems (ADPS), but such surveys provide only partial coverage of different types of ADPS for CAVs. ...
However, the importance of attacks detection and prevention approaches for CAVs has not been discussed extensively in the state-of-the-art surveys, and there is a clear gap in the existing literature on ...
We thank LTA colleagues and project team members for their helpful input. ...
arXiv:2203.14965v1
fatcat:4orttcmbjfei5dbhsjnaovmm7a
Machine Learning for Security in Vehicular Networks: A Comprehensive Survey
[article]
2021
arXiv
pre-print
In this paper, we present a comprehensive survey of ML-based techniques for different security issues in vehicular networks. ...
In this regard, ML and its variants are gaining popularity to detect attacks and deal with different kinds of security issues in vehicular communication. ...
A survey is presented in [199] which highlights the problem of an adversarial attack on DL as a serious issue for networks. ...
arXiv:2105.15035v2
fatcat:5z6aqlvosjgf3o3amts3k6toxu
Machine Learning for the Detection and Identification of Internet of Things (IoT) Devices: A Survey
[article]
2021
arXiv
pre-print
In this paper, we provide a comprehensive survey on machine learning technologies for the identification of IoT devices along with the detection of compromised or falsified ones from the viewpoint of passive ...
The first step in securing the IoT is detecting rogue IoT devices and identifying legitimate ones. ...
In this paper, we focus on a more specific point by providing a comprehensive survey of machine learning for the detection and identification of devices in IoT using passively collected traffic traces ...
arXiv:2101.10181v1
fatcat:in5x7tp5fbdernmlzyvv52muke
Analysis of Fingerprinting Techniques for Tor Hidden Services
2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society - WPES '17
In this work, we propose a novel two-phase approach for fingerprinting hidden services that does not rely on malicious Tor nodes. ...
In our attack, the adversary merely needs to be on the link between the client and the first anonymization node. In the first phase, we detect a connection to a hidden service. ...
ACKNOWLEDGMENTS The authors would like to thank Markus Peuhkuri from Aalto University in Finnland for helping them with accessing the PlanetLab testbed. ...
doi:10.1145/3139550.3139564
dblp:conf/wpes/PanchenkoMHLWE17
fatcat:qkwn3e5tyreobcdhsesoxikkoe
Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach
[article]
2020
arXiv
pre-print
presentation attack detection (PAD) methods. ...
Specifically, we build on top of any CNN-based architecture trained for fingerprint spoof detection combined with cross-material spoof generalization using a style transfer network wrapper. ...
Government is authorized to reproduce and distribute reprints for governmental purposes notwithstanding any copyright annotation therein. ...
arXiv:2004.02941v1
fatcat:lnf4vwqmfzcwrkhr4ofgfjeteu
Device Fingerprinting in Wireless Networks: Challenges and Opportunities
[article]
2015
arXiv
pre-print
One promising approach toward thwarting these attacks is through the extraction of unique fingerprints that can provide a reliable and robust means for device identification. ...
In this paper, the first unified and comprehensive tutorial in the area of wireless device fingerprinting for security applications is presented. ...
CONCLUSIONS In this paper, we have provided a comprehensive survey on device fingerprinting for enhancing wireless network security. ...
arXiv:1501.01367v1
fatcat:xjzysezfjfbylce2227vzydhwm
A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets
[article]
2021
arXiv
pre-print
With this goal in mind, a promising research field emerged focusing on creating and managing fingerprints that model the behavior of both the device actions and its components. ...
This article also provides researchers with a review of the most relevant characteristics of existing datasets as most of the novel processing techniques are based on machine learning and deep learning ...
ACKNOWLEDGMENT This work has been partially supported by the Swiss Federal Office for Defence Procurement (armasuisse) (project code Aramis R-3210/047-31), and the Irish Research Council, under the government ...
arXiv:2008.03343v2
fatcat:ujj7ka2txvfj7fbawyhloloac4
« Previous
Showing results 1 — 15 out of 5,829 results