We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 6,878 results
  1. A replay attack detection scheme based on perceptual image hashing

    Perceptual image hashing has mainly been used in the literature to authenticate images or to identify similar contents for image copy detection. In...

    Maamar Hamadouche, Zebbiche Khalil, ... Youcef ZAFOUNE in Multimedia Tools and Applications
    Article 12 June 2023
  2. Modulated Audio Replay Attack and Dual-Domain Defense

    Automatic speech recognition (ASR) systems have been widely deployed in modern smart devices to provide convenient and diverse voice-controlled...
    Chapter 2024
  3. Lightweight 3D-StudentNet for defending against face replay attacks

    Biometric face and lip-reading systems are susceptible to face replay attacks. Where the intruder presents a recorded video of a legitimate user or...

    Preethi Jayappa Seegehalli, B. Niranjana Krupa in Signal, Image and Video Processing
    Article 13 June 2024
  4. A One-class Model for Voice Replay Attack Detection

    Replay attack poses a serious security concern for automatic speaker verification systems. Most of the existing replay detection methods cast the...
    **ngliang Cheng, Lantian Li, ... Thomas Fang Zheng in Handbook of Biometric Anti-Spoofing
    Chapter 2023
  5. A Novel Stochastic Event-Based Feedback Watermark for Replay Attack Detection

    The security of cyber physical systems (CPSs) is the premise of resource sharing in modern industry, which has attracted considerable attention of...
    Xudong Zhao, **nyu Wang, ... Yuhan Wang in Sensor Systems and Software
    Conference paper 2023
  6. Detection Against Replay Attack: A Feedback Watermark Approach

    Since malicious cyber attacks are common in modern industry, cyber security has become an important issue. Motivated by this, a novel feedback...
    Xudong Zhao, Le Liu, ... Wei **ng in Science and Technologies for Smart Cities
    Conference paper 2022
  7. Replay spoof detection for speaker verification system using magnitude-phase-instantaneous frequency and energy features

    Spoofing attack detection is one of the essential components in automatic speaker verification (ASV) systems. The success of\ ASV-2015 shows a great...

    K. P. Bharath, M. Rajesh Kumar in Multimedia Tools and Applications
    Article 29 April 2022
  8. An improved feature extraction for Hindi language audio impersonation attack detection

    Audio impersonation attacks offer a substantial risk to voice-based authentication systems and various speech recognition applications. Hence, there...

    Nidhi Chakravarty, Mohit Dua in Multimedia Tools and Applications
    Article 24 January 2024
  9. Domain Generalization via Ensemble Stacking for Face Presentation Attack Detection

    Face presentation attack detection (PAD) plays a pivotal role in securing face recognition systems against spoofing attacks. Although great progress...

    Usman Muhammad, Jorma Laaksonen, ... Mourad Oussalah in International Journal of Computer Vision
    Article Open access 25 June 2024
  10. A new face presentation attack detection method based on face-weighted multi-color multi-level texture features

    Biometric data (facial, voice, fingerprint, and retinal scans, for example) are widely used in identification due to their unique and irreversible...

    Uğur Turhal, Asuman Günay Yılmaz, Vasif Nabiyev in The Visual Computer
    Article 28 May 2023
  11. Voice spoofing countermeasure for voice replay attacks using deep learning

    In our everyday lives, we communicate with each other using several means and channels of communication, as communication is crucial in the lives of...

    **cheng Zhou, Tao Hai, ... Cresantus Biamba in Journal of Cloud Computing
    Article Open access 24 September 2022
  12. HsIrisNet: Histogram Based Iris Recognition to Allay Replay and Template Attack Using Deep Learning Perspective

    Abstract

    Iris biometric is a widely deployed tool for biometric based user authentication. Its success has paved path for several security related...

    Richa Gupta, Priti Sehgal in Pattern Recognition and Image Analysis
    Article 01 October 2020
  13. Face presentation attack detection performances of facial regions with multi-block LBP features

    Biometric recognition systems are frequently used in daily life although they are vulnerable to attacks. Today, especially the increasing use of face...

    Asuman Günay Yılmaz, Uğur Turhal, Vasif Nabiyev in Multimedia Tools and Applications
    Article 30 March 2023
  14. Replay Attack

    Living reference work entry 2021
  15. A survey on face presentation attack detection mechanisms: hitherto and future perspectives

    The advances in human face recognition (FR) systems have recorded sublime success for automatic and secured authentication in diverse domains....

    Deepika Sharma, Arvind Selwal in Multimedia Systems
    Article 20 March 2023
  16. Time Is on My Side: Forward-Replay Attacks to TOTP Authentication

    Time-based One-Time Password (TOTP) is a widely used method for two-factor authentication, whose operation relies on one-time codes generated from...
    Giuseppe Bianchi, Lorenzo Valeriani in Security and Privacy in Social Networks and Big Data
    Conference paper 2023
  17. An empirical study of attack-related events in DeFi projects development

    Decentralized Finance (DeFi) offers users decentralized financial services that are associated with the security of their assets. If DeFi is...

    Dongming **ang, Yuanchang Lin, ... Yang Liu in Empirical Software Engineering
    Article 23 February 2024
  18. Deep Learning for Biometric Attack Detection and Recognition

    Integration of biometric systems is essential for develo** effective security and authentication strategies. These systems are nevertheless...
    Mohd. Maaz Khan, Arijeet Chandra Sen, ... K. Anbazhagan in Recent Trends in Image Processing and Pattern Recognition
    Conference paper 2024
  19. SCPAD: An approach to explore optical characteristics for robust static presentation attack detection

    Presentation attack detection approaches have achieved great progress on various attack types while adversarial learning technology has become a new...

    Chen Dang, Zhaoqiang **a, ... **aoyi Feng in Multimedia Tools and Applications
    Article 27 June 2023
  20. Fully supervised contrastive learning in latent space for face presentation attack detection

    The vulnerability of conventional face recognition systems to face presentation or face spoofing attacks has attracted a great deal of attention from...

    Madini O. Alassafi, Muhammad Sohail Ibrahim, ... Syed Adnan Yusuf in Applied Intelligence
    Article 10 June 2023
Did you find what you were looking for? Share feedback.