6,826 Hits in 3.4 sec

Robust Framework for Antispoofing Face Recognition Mechanism for Mitigating Image Attacks

Jignesh N Solanki
2018 International Journal for Research in Applied Science and Engineering Technology  
The lack of protection against biometric spoofing attacks is not exclusive to face biometrics [2].  ...  Moreover, due to the increasing popularity of social network websites, a great deal of multimedia content, specially videos and photographs, is available on the web that can be used to spoof a face authentication  ...  of the system without caring whether the matched face is from a live human or not [1] .  ... 
doi:10.22214/ijraset.2018.3222 fatcat:edxqohd7dvaudeanyik2w2bkym

Spoofing and Anti-spoofing Technologies of Global Navigation Satellite System: A Survey

Zhijun Wu, Yun Zhang, Yiming Yang, Cheng Liang, Rusen Liu
2020 IEEE Access  
The implementation of this spoofing type is relatively simple.  ...  It can be seen from the analysis in Table XII that this type of spoofing detection method usually needs to be combined with other spoofing detection methods to ensure antispoofing performance.  ... 
doi:10.1109/access.2020.3022294 fatcat:crv2g4ebpzbddkphu3i6mifk44

A Unique Glottal Flow Parameters based Features for Anti-spoofing Countermeasures in Automatic Speaker Verification

Ankita Chadha, Azween Abdullah, Lorita Angeline
2021 International Journal of Advanced Computer Science and Applications  
Inspite of this, the system is liable to spoofing attacks in the form of synthetic or replayed speech.  ...  In order to achieve this goal, we are proposing estimation of Glottal Flow Parameters (GFP) from speech of genuine speech and synthetic spoof samples.  ...  Also, a genuine appreciation for School of Computer Science and Engineering for their support.  ... 
doi:10.14569/ijacsa.2021.0120894 fatcat:lnjsoyfbuzbwxnzbs43tgnys2e

Use of Supervised Machine Learning for GNSS Signal Spoofing Detection with Validation on Real-World Meaconing and Spoofing Data—Part I

Silvio Semanjski, Ivana Semanjski, Wim De De Wilde, Alain Muls
2020 Sensors  
The vulnerability of the Global Navigation Satellite System (GNSS) open service signals to spoofing and meaconing poses a risk to the users of safety-of-life applications.  ...  datasets were used for the validation of the supervised machine learning algorithms for the detection of the GNSS spoofing and meaconing.  ...  The second dataset is a result of an SDR-based spoofing attack dataset generated in a successful noncovered-type of spoofing attack.  ... 
doi:10.3390/s20041171 pmid:32093342 pmcid:PMC7070933 fatcat:yyaxgnnrkfezboheyqfqvy2zry

Understanding the efficacy of deployed internet source address validation filtering

Robert Beverly, Arthur Berger, Young Hyun, k claffy
2009 Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference - IMC '09  
IP source address forgery, or "spoofing," is a long-recognized consequence of the Internet's lack of packet-level authenticity.  ...  Of clients able to test their provider's source-address filtering rules, we find 31% able to successfully spoof an arbitrary, routable source address, while 77% of clients otherwise unable to spoof can  ...  fraction of Ark destinations receiving each type of spoofed source probe.  ... 
doi:10.1145/1644893.1644936 dblp:conf/imc/BeverlyBHc09 fatcat:lmyxkrbwcvgongqhfffcibj2fu

Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [article]

Jordan Landford, Rich Meier, Richard Barella, Xinghui Zhao, Eduardo Cotilla-Sanchez, Robert B. Bass, Scott Wallace
2015 arXiv   pre-print
A correlation coefficient characterization and machine learning methodology are proposed to detect and identify injection of spoofed data signals.  ...  Several spoofing schemes have been developed to qualitatively and quantitatively demonstrate detection capabilities.  ...  specific target type of spoof.  ... 
arXiv:1509.05086v1 fatcat:c33tmiuhrjedjmpzid5u3zd6t4

Spoofing-Aware Speaker Verification with Unsupervised Domain Adaptation [article]

Xuechen Liu, Md Sahidullah, Tomi Kinnunen
2022 arXiv   pre-print
In this paper, we initiate the concern of enhancing the spoofing robustness of the automatic speaker verification (ASV) system, without the primary presence of a separate countermeasure module.  ...  on bonafide and spoofed cases, respectively.  ...  CORAL+ with both types of data for adaptation maintains the best performance on both bonafide and the spoofed evaluation sets across all systems.  ... 
arXiv:2203.10992v2 fatcat:dn56nhmshnhzbkzdev7x3diaam

Techniques of Face Spoof Detection: A Review

Ramandeep Kaur, P. S.
2017 International Journal of Computer Applications  
Keywords Face recognition, spoof detection, image distortion analysis and svm classifier.  ...  are variety of face spoof detection techniques are proposed, their generalization ability has not been adequately addressed.  ...  spoofing in numerous type of attacks things, beating the state of art results.  ... 
doi:10.5120/ijca2017913569 fatcat:xqiah3ll5zbalfadck4cpyu5oa

A STRIDE Model based Threat Modelling using Unified and-Or Fuzzy Operator for Computer Network Securit

Salman A. Khan
2017 International Journal of Computing and Network Technology  
An strategy has been proposed which takes the number and types of attacks as input and applies a fuzzy logic based threat assessment approach to assess the level of attack.  ...  STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privileges) is a model which covers numerous existing threats that are related to all security properties  ...  Acknowledgment The author thanks the Deanship of Scientific Research at University of Bahrain for supporting this work under Project # 24/2015.  ... 
doi:10.12785/ijcnt/050103 fatcat:mun23tayvnaxnidfzrefqyahsi

Face Spoofing Detection using Enhanced Local Binary Pattern

2019 International Journal of Engineering and Advanced Technology  
Spoofing is defined as the capability of making fool of a system that is biometric for finding out the unauthorised customers as an actual one by the various ways of representing version of synthetic forged  ...  However, the security of such systems may be a crucial issue since it is proved in many studies that face identification systems are susceptible to various attacks, out of which spoofing attacks are one  ...  Based on this analysis, it is concluded that the integration of modified LBP descriptor along with CNN is suitable and robust approach for detection of face spoofing attacks.  ... 
doi:10.35940/ijeat.b3834.129219 fatcat:wskgg7gfwvffdddidrrzfzd2ze

Competition on counter measures to 2-D facial spoofing attacks

Murali Mohan Chakka, Andre Anjos, Sebastien Marcel, Roberto Tronci, Daniele Muntoni, Gianluca Fadda, Maurizio Pili, Nicola Sirena, Gabriele Murgia, Marco Ristori, Fabio Roli, Junjie Yan (+12 others)
2011 2011 International Joint Conference on Biometrics (IJCB)  
Use of one or multiple techniques from motion, texture analysis and liveness detection appears to be the common trend in this competition.  ...  Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems.  ...  This type of analysis can be performed also frame by frame.  ... 
doi:10.1109/ijcb.2011.6117509 dblp:conf/icb/ChakkaAMTMFPSMRRYYLZLSRPLSMHP11 fatcat:h3aee3te2fbardzqaivhgdfpru

Secured Icmp Based Ip Traceback Scheme To Trace The Spoofed Ip Locations

V. Mariyammal
2016 International Journal Of Engineering And Computer Science  
These results are capable of expose the spoofed IP locations.  ...  IP spoofing is the creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of thrashing the identity of the sender or an attacker can make it appear that the packet  ...  Non-Blind Spoofing : This type of attack takes place when the attacker is on the same subnet as the victim.  ... 
doi:10.18535/ijecs/v5i10.02 fatcat:iszvxclo45eb5cmlanm35oryvm

Analyzing large DDoS attacks using multiple data sources

Z. Morley Mao, Vyas Sekar, Oliver Spatscheck, Jacobus van der Merwe, Rangarajan Vasudevan
2006 Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense - LSAD '06  
analysis.  ...  While much of the community's current understanding of DDoS attacks result from indirect measurements, our analysis suggests that such studies do not give a comprehensive view of DDoS attacks witnessed  ...  We would like to thank Brian Rexroad for his insightful comments on an earlier version of this paper. The work is partially supported by NSF grants CNS-0430204, CNS-0433540, and ANI-0331653.  ... 
doi:10.1145/1162666.1162675 fatcat:f6o2omydxrh7vdewie5rt4hrgm

Physics-Guided Spoof Trace Disentanglement for Generic Face Anti-Spoofing [article]

Yaojie Liu, Xiaoming Liu
2020 arXiv   pre-print
Yet, this is a challenging task due to the diversity of spoof types and the lack of ground truth in spoof traces.  ...  of spoof detection.  ...  ACKNOWLEDGMENTS This research is based upon work supported by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA), via IARPA R&D Contract  ... 
arXiv:2012.05185v1 fatcat:zyp2aahyp5eavj4lqf7ll7y6ie

IoT Cloud-Based Framework for Face Spoofing Detection with Deep Multicolor Feature Learning Model

Sajad Einy, Cemil Oz, Yahya Dorostkar Navaei, Yunze He
2021 Journal of Sensors  
A face-based authentication system has become an important topic in various fields of IoT applications such as identity validation for social care, crime detection, ATM access, computer security, etc.  ...  Finally, the extracted deep color-based features of the face image are used for face spoofing detection in a cloud environment.  ...  different types of attacks on the ROSE-Youtu database.  ... 
doi:10.1155/2021/5047808 fatcat:xmffuxu36zg2tppn4pbzpvd63a
« Previous Showing results 1 — 15 out of 6,826 results