Identities, forgeries and disguises
نویسندگان
چکیده
The preservation of your identity is a fundamental right. In many situations, you need to claim your identity and this claim needs to be verified somehow. The technology called biometrics may help. But, what if a deliberate impostor claims your identity? Will this forgery be always detected? Biometric identity verification is imperfect. This presentation will review some of the techniques that a deliberate impostor could use to defeat a biometric verification system. It will focuss on audio-visual forgeries using voice conversion and face animation. Such techniques also find useful applications in multimedia. In a second part, we’ll discuss the techniques which could be used if somebody wants to hide his/her identity. Again, voice conversion and face animation is quite efficient to disguise your identity. We’ll review some of the techniques to detect voice disguise which could be used in forensic applications. Finaly, we’ll take a look at ’cancellable biometrics’, a set of techniques to allow users renew their biometric templates and models in case these have been stolen and used by impostors.
منابع مشابه
Identities , forgeries and disguises Gérard Chollet and
The preservation of your identity could become a major concern. In many situations, you need to claim an identity and this claim needs to be verified somehow. The technology called biometrics may help. But, what if a deliberate impostor claims your identity? Will this forgery be always detected? Biometric identity verification is imperfect. This paper reviews some of the techniques that a delib...
متن کاملExamining the Ethical Foundations of Compensation for Mistakes and Forgeries in the Preparation of Official Documents
Background: Preparing a formal transaction document is one of the specific duties of notaries public, which requires the use and observance of various substantive and formal conditions. Failure to comply with any of these conditions can lead to the annulment of the document by the court and the responsibility to compensate the clerks. Compensation by the clerks in various articles such as Artic...
متن کاملTracking Email Reputation for Authenticated Sender Identities
With the amount of unsolicited emails on the rise, domain authentication schemes have been widely deployed to identify senders. Establishing a sender's identity does not guarantee its adherence to best practices. To maintain a history of sender activity, in our prior work, we had proposed RepuScore: a collaborative sender reputation framework and demonstrated its effectiveness using simulated l...
متن کاملCSCI 6270 COMPUTATIONAL VISION PROJECT Exposing Digital Forgeries in Complex Lighting Environments
The increase in sophistication of image manipulation software such as Adobe Photoshop, coupled with improvements in imaging algorithms, has given rise to digital forgeries that are very hard to detect. My project here is based on the paper ’Exposing Digital Forgeries in Complex Lighting Environments’ [4], wherein the authors detail a technique to identify digital forgeries via inconsistencies i...
متن کاملAutomatic Detection Of Handwriting Forgery Using A Fractal Number Estimate Of Wrinkliness
We investigate the detection of handwriting forged by novices. To facilitate document examination it is important to develop an automated system to identify forgeries, or at least to identify those handwritings that are likely to be forged. Because forgers often carefully copy or trace genuine handwriting, we hypothesize that good forgeries – those that retain the shape and size of genuine writ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJITM
دوره 11 شماره
صفحات -
تاریخ انتشار 2012