Search
Search Results
-
A replay attack detection scheme based on perceptual image hashing
Perceptual image hashing has mainly been used in the literature to authenticate images or to identify similar contents for image copy detection. In...
-
Modulated Audio Replay Attack and Dual-Domain Defense
Automatic speech recognition (ASR) systems have been widely deployed in modern smart devices to provide convenient and diverse voice-controlled... -
Lightweight 3D-StudentNet for defending against face replay attacks
Biometric face and lip-reading systems are susceptible to face replay attacks. Where the intruder presents a recorded video of a legitimate user or...
-
A One-class Model for Voice Replay Attack Detection
Replay attack poses a serious security concern for automatic speaker verification systems. Most of the existing replay detection methods cast the... -
A Novel Stochastic Event-Based Feedback Watermark for Replay Attack Detection
The security of cyber physical systems (CPSs) is the premise of resource sharing in modern industry, which has attracted considerable attention of... -
Detection Against Replay Attack: A Feedback Watermark Approach
Since malicious cyber attacks are common in modern industry, cyber security has become an important issue. Motivated by this, a novel feedback... -
Replay spoof detection for speaker verification system using magnitude-phase-instantaneous frequency and energy features
Spoofing attack detection is one of the essential components in automatic speaker verification (ASV) systems. The success of\ ASV-2015 shows a great...
-
An improved feature extraction for Hindi language audio impersonation attack detection
Audio impersonation attacks offer a substantial risk to voice-based authentication systems and various speech recognition applications. Hence, there...
-
Domain Generalization via Ensemble Stacking for Face Presentation Attack Detection
Face presentation attack detection (PAD) plays a pivotal role in securing face recognition systems against spoofing attacks. Although great progress...
-
A new face presentation attack detection method based on face-weighted multi-color multi-level texture features
Biometric data (facial, voice, fingerprint, and retinal scans, for example) are widely used in identification due to their unique and irreversible...
-
Voice spoofing countermeasure for voice replay attacks using deep learning
In our everyday lives, we communicate with each other using several means and channels of communication, as communication is crucial in the lives of...
-
HsIrisNet: Histogram Based Iris Recognition to Allay Replay and Template Attack Using Deep Learning Perspective
AbstractIris biometric is a widely deployed tool for biometric based user authentication. Its success has paved path for several security related...
-
Face presentation attack detection performances of facial regions with multi-block LBP features
Biometric recognition systems are frequently used in daily life although they are vulnerable to attacks. Today, especially the increasing use of face...
-
-
A survey on face presentation attack detection mechanisms: hitherto and future perspectives
The advances in human face recognition (FR) systems have recorded sublime success for automatic and secured authentication in diverse domains....
-
Time Is on My Side: Forward-Replay Attacks to TOTP Authentication
Time-based One-Time Password (TOTP) is a widely used method for two-factor authentication, whose operation relies on one-time codes generated from... -
An empirical study of attack-related events in DeFi projects development
Decentralized Finance (DeFi) offers users decentralized financial services that are associated with the security of their assets. If DeFi is...
-
Deep Learning for Biometric Attack Detection and Recognition
Integration of biometric systems is essential for develo** effective security and authentication strategies. These systems are nevertheless... -
SCPAD: An approach to explore optical characteristics for robust static presentation attack detection
Presentation attack detection approaches have achieved great progress on various attack types while adversarial learning technology has become a new...
-
Fully supervised contrastive learning in latent space for face presentation attack detection
The vulnerability of conventional face recognition systems to face presentation or face spoofing attacks has attracted a great deal of attention from...