نتایج جستجو برای: spoofing order

تعداد نتایج: 910816  

2014
zhizheng wu haizhou li

A speaker verification system automatically accepts or rejects a claimed identity of a speaker based on a speech sample. Recently, a major progress was made in speaker verification which leads to mass market adoption, such as in smartphone and in online commerce for user authentication. A major concern when deploying speaker verification technology is whether a system is robust against spoofing...

2014
Giorgio Fumera Gian Luca Marcialis Battista Biggio Fabio Roli Stephanie Schuckers

While multimodal biometric systems were commonly believed to be intrinsically more robust to spoof attacks than unimodal systems, recent results provided clear evidence that they can be evaded by spoofing a single biometric trait. This pointed out that also multimodal systems require specific anti-spoofing measures. In this chapter we introduce the issue of multimodal anti-spoofing, and give an...

2017
Luka Malisa Kari Kostiainen Srdjan Capkun

Mobile application spoofing is an attack where a malicious mobile app mimics the visual appearance of another one. A common example of mobile application spoofing is a phishing attack where the adversary tricks the user into revealing her password to a malicious app that resembles the legitimate one. In this paper, we propose a novel spoofing detection approach, tailored to the protection of mo...

2016
Md. Sahidullah Héctor Delgado Massimiliano Todisco Hong Yu Tomi Kinnunen Nicholas W. D. Evans Zheng-Hua Tan

It is well known that automatic speaker verification (ASV) systems can be vulnerable to spoofing. The community has responded to the threat by developing dedicated countermeasures aimed at detecting spoofing attacks. Progress in this area has accelerated over recent years, partly as a result of the first standard evaluation, ASVspoof 2015, which focused on spoofing detection in isolation from A...

Journal: :International Journal of Computer Applications 2010

2016
S. MENAKA

In recent years face recognition has been the important factor in biometric authentication. Significant progress has been made in the area of face spoofing detection. In practical application, the problem of spoofing attacks can be threatened to face biometric systems which is used for authentication. Kernel Discriminate Analysis(KDA) is effective in detecting the face spoofing detection. Kerne...

2008
Gang Pan Zhaohui Wu

Biometrics is an emerging technology that enables uniquely recognizing humans based upon one or more intrinsic physiological or behavioral characteristics, such as faces, fingerprints, irises, voices (Ross et al., 2006). However, spoofing attack (or copy attack) is still a fatal threat for biometric authentication systems (Schukers, 2002). Liveness detection, which aims at recognition of human ...

Global Positioning System (GPS) spoofing could pose a major threat for GPS navigation ‎systems, so the GPS users have to gain a better understanding of the broader implications of ‎GPS.‎ In this paper, a plenary anti-spoofing approach based on correlation is proposed to distinguish spoofing effects. The suggested ‎method can be easily implemented in tracking loop of GPS receiver...

2006
Fang Qi Feng Bao Tieyan Li Weijia Jia Yongdong Wu

The anti-spoofing community has been intensively proposing new methods for defending against new spoofing techniques. It is still challenging for protecting näıve users from advanced spoofing attacks. In this paper, we analyze the problems within those anti-spoofing mechanisms and propose a new Automatic Detecting Security Indicator (ADSI) scheme. This paper describe the trust model in ADSI in ...

Journal: :Security and Communication Networks 2011
Fang Qi Zhe Tang Guojun Wang Jie Wu

The anti-spoofing community has been intensively proposing new methods for defending against new web-spoofing techniques. In this paper, we analyze the problems within current anti-spoofing mechanisms, and propose a new SSL protected trust model. Then, we describe the attacks on SSL protected trusted communication. In this paper, we also propose the new Automatic Detecting Security Indicator sc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید