نتایج جستجو برای: spoofing order
تعداد نتایج: 910816 فیلتر نتایج به سال:
This paper describes the application of deep neural networks (DNN), trained to discriminate between human and spoofed speech signals, to improve the performance of spoofing detection. In this work we use amplitude, phase, linear prediction residual, and combined amplitude phase-based acoustic level features. First we train a DNN on the spoofing challenge training data to discriminate between hu...
Anti-spoofing is attracting growing interest in biometrics, considering the variety of fake materials and new means to attack biometric recognition systems. New unseen materials continuously challenge state-of-the-art spoofing detectors, suggesting for additional systematic approaches to target anti-spoofing. By incorporating liveness scores into the biometric fusion process, recognition accura...
In this paper, an improved secure address resolution protocol is presented where ARP spoofing attack is prevented. The proposed methodology is a centralised methodology for preventing ARP spoofing attack. In the proposed model there is a central server on a network or subnet which prevents ARP spoofing attack.
Automated border cont rol (ABC) is concerned with fast and secure processing for intelligence-led ident if icat ion. The FastPass proj ect aims to build a harmonised, modular reference system for future European ABC. When biometrics is taken on board as ident it y, spoofing at tacks become a concern. This paper presents current research in algorithm development for counter-spoofing at tacks in ...
Biometric system have evolved very well in last few years and in this digital era secure automatic solution for face spoofing is needed. Combining existing anti-spoofing approaches to come up with more robust mechanism is needed for preventing system from various spoofing types. In this paper, detecting face from image and extracting data from it and then optimizing that information with datase...
SPM (Spoofing Prevention Method) proposed a peer-to-peer anti-spoofing method which could effectively filter spoofed packets and support incremental deployment. However, mechanism of SPM key updating has some serious problems: (1) heavy management cost; (2) risk of becoming the target of DOS/DDOS attacks during the key updating; (3) limitation of the scale of the SPM union; (4) impossibility of...
The vulnerability of automatic speaker verification systems to imposture or spoofing is widely acknowledged. This paper shows that extremely high false alarm rates can be provoked by simple spoofing attacks with artificial, non-speech-like signals and highlights the need for spoofing countermeasures. We show that two new, but trivial countermeasures based on higher-level, dynamic features and v...
The endless spoofing interference affects the credibility of navigation system seriously. In order to suppress forward which is more threatening military signals in GNSS, this paper proposes a suppression algorithm based on angle arrival estimation and multi-satellite fusion. On basis successfully suppressing signal, improves accuracy forwarded reduces attenuation carrier noise ratio real satel...
Internet attacks often use IP spoofing to forge the source IP address of packets, and thereby hide the identity of the source. It causes many serious security problems such as the difficulty of packet authenticity and IP traceback. While many IP spoofing prevention techniques have been proposed apart from ingress filtering, none have achieved widespread real-world use. One main reason is the la...
In this paper, initially, the impact of mask spoofing on face recognition is analyzed. For this purpose, one baseline technique is selected for both 2D and 3D face recognition. Next, novel countermeasures, which are based on the analysis of different shape, texture and reflectance characteristics of real faces and mask faces, are proposed to detect mask spoofing. In this paper, countermeasures ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید