Attacks on Heartbeat-Based Security Using Remote Photoplethysmography
نویسندگان
چکیده
منابع مشابه
Remote photoplethysmography with constrained ICA using periodicity and chrominance constraints
BACKGROUND Remote photoplethysmography (rPPG) has been in the forefront recently for measuring cardiac pulse rates from live or recorded videos. It finds advantages in scenarios requiring remote monitoring, such as medicine and fitness, where contact based monitoring is limiting and cumbersome. The blood volume pulse, defined as the pulsative flow of arterial blood, gives rise to periodic chang...
متن کاملSecurity Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during postmanufacturing test has been shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures against hardware Trojans by either preventing Tr...
متن کاملRemote User Authentication Using VMM-based Security Manager
As the Internet becomes a popular means of business transactions, online social engineering has been used to commit fraud, identity theft, etc. The current solutions to remote user authentication are vulnerable to Social engineering attacks, because the base of these schemes, the security of the password, is no longer hold. In this paper, we present a new remote authentication scheme using the ...
متن کاملUsing the CORAL System to Discover Attacks on Security Protocols
Inductive theorem provers are frequently employed in the verification of programs, algorithms and protocols. Programs and algorithms often contain bugs, and protocols may be flawed, causing the proof attempt to fail. However, it can be hard to interpret a failed proof attempt: it may be that some additional lemmas need to be proved or a generalisation made. In this situation, a tool which can n...
متن کاملSimulation of Security Protocols based on Scenarios of Attacks
In this paper we offer a methodology allowing for simulation of security protocols, implemented in the higher-level language Estelle, using scenarios designed for external attacks. To this aim we apply a translation of specifications of security protocols from Common Syntax to Estelle and an encoding of schemes of attacks into Estelle scenarios. We show that such an intelligent simulation may e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Journal of Biomedical and Health Informatics
سال: 2018
ISSN: 2168-2194,2168-2208
DOI: 10.1109/jbhi.2017.2691282