Zobrazeno 1 - 10
of 2 081
pro vyhledávání: '"presentation attacks"'
Autor:
Khan, Awais, Malik, Khalid Mahmood
Automatic Speaker Verification (ASV) systems are increasingly used in voice bio-metrics for user authentication but are susceptible to logical and physical spoofing attacks, posing security risks. Existing research mainly tackles logical or physical
Externí odkaz:
http://arxiv.org/abs/2309.10560
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Gonzalez-Garcia, Carlos, Tolosana, Ruben, Vera-Rodriguez, Ruben, Fierrez, Julian, Ortega-Garcia, Javier
Applications based on biometric authentication have received a lot of interest in the last years due to the breathtaking results obtained using personal traits such as face or fingerprint. However, it is important not to forget that these biometric s
Externí odkaz:
http://arxiv.org/abs/2302.08320
Autor:
Ametefe, Divine Senanu, Sarnin, Suzi Seroja, Ali, Darmawaty Mohd, Muhamad, Wan Norsyafizan W., Ametefe, George Dzorgbenya, John, Dah, Aliu, Abdulmalik Adozuka
Publikováno v:
Journal of the Institution of Engineers (India): Series B; Oct2024, Vol. 105 Issue 5, p1451-1467, 17p
Publikováno v:
In Pattern Recognition Letters July 2023 171:192-200
Publikováno v:
IEEE Transactions on Information Forensics and Security (2021)
The diffusion of fingerprint verification systems for security applications makes it urgent to investigate the embedding of software-based presentation attack detection algorithms (PAD) into such systems. Companies and institutions need to know wheth
Externí odkaz:
http://arxiv.org/abs/2110.10567
Publikováno v:
2021 International Conference on Computer Vision
Advances in deep learning, combined with availability of large datasets, have led to impressive improvements in face presentation attack detection research. However, state-of-the-art face antispoofing systems are still vulnerable to novel types of at
Externí odkaz:
http://arxiv.org/abs/2108.12081
Fake fingerprint representation pose a severe threat for fingerprint based authentication systems. Despite advances in presentation attack detection technologies, which are often integrated directly into the fingerprint scanner devices, many fingerpr
Externí odkaz:
http://arxiv.org/abs/2012.00606
Facial cosmetics have the ability to substantially alter the facial appearance, which can negatively affect the decisions of a face recognition. In addition, it was recently shown that the application of makeup can be abused to launch so-called makeu
Externí odkaz:
http://arxiv.org/abs/2006.05074
Autor:
Mishra, Shlok Kumar, Sengupta, Kuntal, Horowitz-Gelb, Max, Chu, Wen-Sheng, Bouaziz, Sofien, Jacobs, David
Publikováno v:
2022 IEEE international joint conference on biometrics (IJCB) (ORAL)
Presentation attack detection (PAD) is a critical component in secure face authentication. We present a PAD algorithm to distinguish face spoofs generated by a photograph of a subject from live images. Our method uses an image decomposition network t
Externí odkaz:
http://arxiv.org/abs/2103.12201