Attacks on Heartbeat-Based Security Using Remote Photoplethysmography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remote photoplethysmography with constrained ICA using periodicity and chrominance constraints

BACKGROUND Remote photoplethysmography (rPPG) has been in the forefront recently for measuring cardiac pulse rates from live or recorded videos. It finds advantages in scenarios requiring remote monitoring, such as medicine and fitness, where contact based monitoring is limiting and cumbersome. The blood volume pulse, defined as the pulsative flow of arterial blood, gives rise to periodic chang...

متن کامل

Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation

Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during postmanufacturing test has been shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures against hardware Trojans by either preventing Tr...

متن کامل

Remote User Authentication Using VMM-based Security Manager

As the Internet becomes a popular means of business transactions, online social engineering has been used to commit fraud, identity theft, etc. The current solutions to remote user authentication are vulnerable to Social engineering attacks, because the base of these schemes, the security of the password, is no longer hold. In this paper, we present a new remote authentication scheme using the ...

متن کامل

Using the CORAL System to Discover Attacks on Security Protocols

Inductive theorem provers are frequently employed in the verification of programs, algorithms and protocols. Programs and algorithms often contain bugs, and protocols may be flawed, causing the proof attempt to fail. However, it can be hard to interpret a failed proof attempt: it may be that some additional lemmas need to be proved or a generalisation made. In this situation, a tool which can n...

متن کامل

Simulation of Security Protocols based on Scenarios of Attacks

In this paper we offer a methodology allowing for simulation of security protocols, implemented in the higher-level language Estelle, using scenarios designed for external attacks. To this aim we apply a translation of specifications of security protocols from Common Syntax to Estelle and an encoding of schemes of attacks into Estelle scenarios. We show that such an intelligent simulation may e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Journal of Biomedical and Health Informatics

سال: 2018

ISSN: 2168-2194,2168-2208

DOI: 10.1109/jbhi.2017.2691282