Filters








2,814 Hits in 3.4 sec

Biometrics Evaluation Under Spoofing Attacks

Ivana Chingovska, Andre Rabello dos Anjos, Sebastien Marcel
2014 IEEE Transactions on Information Forensics and Security  
A novel evaluation framework for verification systems under spoofing attacks, called Expected Performance and Spoofability (EPS) framework, is the major contribution of this paper.  ...  convenience of the proposed open-source framework is demonstrated for the face mode, by comparing the security guarantee of four baseline face verification systems before and after they are secured with anti-spoofing  ...  anti-spoofing systems  ... 
doi:10.1109/tifs.2014.2349158 fatcat:ehcmbdhe7jcxjiaaxllnxc2foe

Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned

Abdenour Hadid, Nicholas Evans, Sebastien Marcel, Julian Fierrez
2015 IEEE Signal Processing Magazine  
It describes the vulnerabilities, presents an evaluation methodology for the assessment of spoofing and countermeasures, and outlines research priorities for the future. 1  ...  This tutorial article presents an introduction to spoofing and anti-spoofing research.  ...  EVALUATION METHODOLOGY: SPOOFING COUNTERMEASURES This section describes the extension of the evaluation methodology to assess spoofing countermeasures.  ... 
doi:10.1109/msp.2015.2437652 fatcat:npjlxalvj5c5jobfimejpriylq

Anti-spoofing, Voice Databases [chapter]

Nicholas Evans, Federico Alegre, Tomi Kinnunen, Zhizheng Wu, Junichi Yamagishi
2015 Encyclopedia of Biometrics  
and anti-spoofing in voice recognition is performed with databases of speech signals subjected to post-sensor spoofing attacks.  ...  Synonyms Speaker recognition spoofing; speaker recognition corpora Definition As with any task involving statistical pattern recognition, the assessment of spoofing and anti-spoofing approaches for voice  ...  Related Entries Anti-Spoofing: Voice Conversion Liveness Assurance in Voice Authentication NIST SREs (Speaker Recognition Evaluations) Liveness Detection Liveness: Voice Voice Authentication Speaker Recognition  ... 
doi:10.1007/978-1-4899-7488-4_9048 fatcat:gtw5ny754zdfhcvjlbe5fdboz4

Biometric Antispoofing Methods: A Survey in Face Recognition

Javier Galbally, Sebastien Marcel, Julian Fierrez
2014 IEEE Access  
INDEX TERMS Biometrics, security, anti-spoofing, face.  ...  The work covers theories, methodologies, state-of-the-art techniques, and evaluation databases and also aims at providing an outlook into the future of this very active field of research.  ...  FACE ANTI-SPOOFING EVALUATION AND DATABASES Based on the general context for anti-spoofing evaluation described above (see Sects.  ... 
doi:10.1109/access.2014.2381273 fatcat:2xnosh6ujjbmrg6hizx5rupiia

Anti-spoofing in Action: Joint Operation with a Verification System

Ivana Chingovska, Andre Anjos, Sebastien Marcel
2013 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops  
In this paper, we study techniques for decisionlevel and score-level fusion to integrate a recognition and anti-spoofing systems, using an open-source framework that handles the ternary classification  ...  Besides the recognition task, today's biometric systems need to cope with additional problem: spoofing attacks.  ...  The first one is concerned with evaluation methodology. Integrating the counter-measure to a recognition system will affect the performance of the latter.  ... 
doi:10.1109/cvprw.2013.22 dblp:conf/cvpr/ChingovskaAM13 fatcat:jqkg7fsxjngshl7il5onwichp4

A Smart Model for Web Phishing Detection Based on New Proposed Feature Selection Technique

Mohamed A. El-Rashidy
2021 Menoufia Journal of Electronic Engineering Research  
The proposed methodology of the web-phishing detection was also evaluated, it obtained the highest classification accuracy at the least possible time compared to the adaptive Neuro-fuzzy inference system  ...  It consists of three phases, the first phase uses a new proposed method for evaluating and ranking the features of URL, HTML and JavaScript code, text, images and domain name of the web page.  ...  The proposed methodology was also compared with recent algorithms to evaluate it.  ... 
doi:10.21608/mjeer.2021.146286 fatcat:htppaf75vzcinjqxxmr5v4z2ry

FACIAL VERIFICATION ALONG WITH SPOOF ATTACKS

Jherna Devi, Sajida Parveen, Nadeem Naeem, NidaHusan Abbas
2017 International Journal of Advanced Research  
Also there is need of facial verification database along with its spoof attacks for complete performance evaluation of verification system under the spoof attacks.  ...  In this paper, a database is designed to work for face verification and anti-spoofing technique.  ...  In Section III we present the methodology used in the collection of our own face spoofing database which should addressed several of the previously identified gaps.  ... 
doi:10.21474/ijar01/5291 fatcat:auynyye6endnzihakj7wqgcgri

Auditory Perception Based Anti-Spoofing System for Human Age Verification

Muhammad Ilyas, Alice Othmani, Régis Fournier, Amine Nait-ali
2019 Electronics  
The proposed auditory perception based anti-spoofing system was evaluated with 770 trials conducted by many subjects of each gender and age range (12–65 years of age).  ...  In this article, we propose an anti-spoofing system based on auditory perception responses.  ...  Summary The performance evaluation methods presented in this article were based on standard methodologies existing in the state-of-the-art for anti-spoofing systems.  ... 
doi:10.3390/electronics8111313 fatcat:k7u6ild2vvfnvhsx3hpemsn66m

A Smart Model for Web Phishing Detection Based on New Proposed Feature Selection Technique

Mohamed El-Rashidy
2020 Menoufia Journal of Electronic Engineering Research  
The proposed methodology of the web-phishing detection was also evaluated, it obtained the highest classification accuracy at the least possible time compared to the adaptive Neuro-fuzzy inference system  ...  It consists of three phases, the first phase uses a new proposed method for evaluating and ranking the features of URL, HTML and JavaScript code, text, images and domain name of the web page.  ...  The proposed methodology was also compared with recent algorithms to evaluate it.  ... 
doi:10.21608/mjeer.2020.32404.1021 fatcat:tfk6wwd2zzhkpjqwdayexc5q4e

Performance evaluation of front- and back-end techniques for ASV spoofing detection systems based on deep features

Alejandro Gomez-Alanis, Antonio M. Peinado, José Andrés González López, Angel M. Gomez
2018 IberSPEECH 2018  
To prevent this, a number of anti-spoofing countermeasures have been developed for detecting these high technology attacks.  ...  Experimental evaluation is carried out on the standard ASVSpoof2015 data corpus.  ...  Details about the methodology followed for training and testing are also given in this section.  ... 
doi:10.21437/iberspeech.2018-10 dblp:conf/iberspeech/AlanisPLG18 fatcat:ck733lgvyfftjljimyadynwgmi

Tackling Spoofing-Aware Speaker Verification with Multi-Model Fusion [article]

Haibin Wu, Jiawen Kang, Lingwei Meng, Yang Zhang, Xixin Wu, Zhiyong Wu, Hung-yi Lee, Helen Meng
2022 arXiv   pre-print
solely on the standalone anti-spoofing tasks, and ignore the subsequent speaker verification process.  ...  matches the expectation of a reliable, spoofing-robust ASV system.  ...  anti-spoofing model.  ... 
arXiv:2206.09131v1 fatcat:v7bxwwohj5cwnkc4fulcbqqwqy

A Deep Identity Representation for Noise Robust Spoofing Detection

Alejandro Gómez Alanís, Antonio M. Peinado, Jose A. Gonzalez, Angel Gomez
2018 Interspeech 2018  
However, the performance of anti-spoofing systems degrades significantly in noisy conditions.  ...  Experimental evaluation is carried out on both a clean and a noisy version of the ASVSpoof2015 corpus.  ...  In this work, we are interested in providing anti-spoofing measures against spoofing attacks based on either VC or TTS.  ... 
doi:10.21437/interspeech.2018-1909 dblp:conf/interspeech/AlanisP0G18 fatcat:g6pljwnfsfeolk6hjlhfvoqbzi

A Performance Evaluation of Convolutional Neural Networks for Face Anti Spoofing [article]

Chaitanya Nagpal, Shiv Ram Dubey
2019 arXiv   pre-print
This paper does a performance evaluation of CNNs for face anti-spoofing. The Inception and ResNet CNN architectures are used in this study.  ...  The favorable results are obtained using these CNN architectures for face anti-spoofing in different settings.  ...  EXPERIMENTAL SETUP This section describes the performance evaluation experimental setup in terms of the face anti-spoofing framework using CNN, hyperparameter settings, evaluation criteria and face spoofing  ... 
arXiv:1805.04176v2 fatcat:ddxoaaeecnfzbdmmt2i2h4gnqm

Umbrella: A routing choice feedback based distributed inter-domain anti-spoofing solution

Jie Li, Jun Bi, Jianping Wu
2012 2012 20th IEEE International Conference on Network Protocols (ICNP)  
In general, this makes anti-spoofing mechanisms inefficient and does not adapt to incremental deployment.  ...  By introducing routing choice feedback, we propose a distributed inter-domain anti-spoofing solution (Umbrella).  ...  Using path authentication, therefore, is a clever way of defeating spoofing attacks. In this paper, we propose a distributed inter-domain anti-spoofing solution, called Umbrella.  ... 
doi:10.1109/icnp.2012.6459939 dblp:conf/icnp/LiBW12 fatcat:5e67nwnf2jdrjjeclpy5q74evy

On Disentangling Spoof Trace for Generic Face Anti-Spoofing [article]

Yaojie Liu, Joel Stehouwer, Xiaoming Liu
2020 arXiv   pre-print
Designing a generic anti-spoofing model to estimate those spoof traces can improve not only the generalization of the spoof detection, but also the interpretability of the model's decision.  ...  Prior studies show that the key to face anti-spoofing lies in the subtle image pattern, termed "spoof trace", e.g., color distortion, 3D mask edge, Moire pattern, and many others.  ...  anti-spoofing).  ... 
arXiv:2007.09273v1 fatcat:ep25wv3jxfgc5fs5fa2lm3b7my
« Previous Showing results 1 — 15 out of 2,814 results