Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Vehicle mounted single-antenna GNSS spoofing detection method based on motion trajectory
AbstractThe application of global navigation satellite system in vehicle navigation imposes high requirements on its safety, which makes it extremely important to detect deceptive interference (DI). The integration of prior road position information is ...
- research-articleApril 2024
GNSS spoofing detection method based on the intersection angle between two directions of arrival (IA‑DOA) for single-antenna receivers
AbstractThe application field of global navigation satellite systems continues to expand, and their security and stability have received widespread attention. Navigation spoofing has the characteristics of solid concealment and significant harm, posing a ...
- research-articleOctober 2023
JS-SpoofNet: A jointly supervised parallel branched neural network for spoof detection
AbstractSpoof detection in complex real-world conditions has always been challenging for the face anti-spoofing research community. Most existing datasets need more practical variations for spoof detection in the wild and thus generate the ...
- research-articleOctober 2023
DNN controlled adaptive front-end for replay attack detection systems
Highlights- Conventional methods fall short in detecting replay spoofing attacks effectively.
- Auditory-based dynamic filters can detect artefacts in high-quality replayed signals.
- Deep neural networks can adaptively learn filter traits based ...
Developing robust countermeasures to protect automatic speaker verification systems against replay spoofing attacks is a well-recognized challenge. Current approaches to spoofing detection are generally based on a fixed front-end, typically a ...
- research-articleJuly 2023
SFincBuster: Spoofed fingerprint buster via incremental learning using leverage bagging classifier
AbstractThe fingerprint presentation attack detection (PAD) studies are extensively explored by investigators to augment the security aspects of human authentication in biometric systems. Although existing approaches yield promising results ...
Highlights- An incremental learning-based model for fingerprint spoof detection is presented.
-
- research-articleJune 2023
Fully supervised contrastive learning in latent space for face presentation attack detection
- Madini O. Alassafi,
- Muhammad Sohail Ibrahim,
- Imran Naseem,
- Rayed AlGhamdi,
- Reem Alotaibi,
- Faris A. Kateb,
- Hadi Mohsen Oqaibi,
- Abdulrahman A. Alshdadi,
- Syed Adnan Yusuf
Applied Intelligence (KLU-APIN), Volume 53, Issue 19Pages 21770–21787https://doi.org/10.1007/s10489-023-04619-zAbstractThe vulnerability of conventional face recognition systems to face presentation or face spoofing attacks has attracted a great deal of attention from information security, forensic, and biometric communities during the past few years. With the ...
- research-articleMay 2023
Anti-spoofing study on palm biometric features
Expert Systems with Applications: An International Journal (EXWA), Volume 218, Issue Chttps://doi.org/10.1016/j.eswa.2023.119546Highlights- A dual-wavelength synchronous acquisition system is proposed.
- Static (palmprint, vein) and dynamic (SpO2, pulse) biometrics acquired at same time.
- Most multispectrum systems are upgradeable for liveness info with minimal ...
Spoofing attacks severely threaten the security of biometric recognition systems. Two concerns are raised regarding palm biometrics. First, the anti-spoofing ability of the palm vein as a subcutaneous feature needs further exploration. In-depth ...
- ArticleOctober 2022
Multi-branch Network with Circle Loss Using Voice Conversion and Channel Robust Data Augmentation for Synthetic Speech Detection
AbstractSynthesized speech in internet and telephone communications is often difficult to detect by traditional systems due to channel coding. Moreover, traditional systems limited by training data tend to perform poorly on specific synthetic attacks. ...
- ArticleMarch 2022
Audiovisual Liveness Detection
AbstractAlthough multi-modal (e.g. voice and face) biometric verification systems were in active development and showed impressive performance they need to be protected from spoofing attacks. In this paper we present methods for verifying face liveness ...
- research-articleNovember 2021
Using residual images with BSIF for iris liveness detection
Expert Systems with Applications: An International Journal (EXWA), Volume 182, Issue Chttps://doi.org/10.1016/j.eswa.2021.115266Highlights- A new method is proposed for iris liveness detection using residual images with BSIF.
Deploying iris recognition systems in several security areas emphasized the importance of developing iris liveness methods. These methods verify if the iris sample acquired for authentication is fake or real. Recently, Binarized ...
- research-articleJuly 2021
Your Eyes Show What Your Eyes See (Y-EYES): Challenge-Response Anti-Spoofing Method for Mobile Security Using Corneal Specular Reflections
MAISP'21: Proceedings of the 1st Workshop on Security and Privacy for Mobile AIPages 25–30https://doi.org/10.1145/3469261.3469408As the need for contactless biometric authentication becomes more significant during COVID-19, and beyond, the popular biometric authentication method for mobile devices, iris detection, and facial recognition confronts various usability, security, and ...
- research-articleApril 2021
Presentation attack detection system for fake Iris: a review
Multimedia Tools and Applications (MTAA), Volume 80, Issue 10Pages 15193–15214https://doi.org/10.1007/s11042-020-10378-7AbstractThe real-time solicitations of biometric systems have been extensively used for several things with the growing necessities of higher security level. There are numerous biometric traits used for person identification. In recent years, iris ...
- research-articleMarch 2021
Speech frame selection for spoofing detection with an application to partially spoofed audio-data
International Journal of Speech Technology (SPIJST), Volume 24, Issue 1Pages 193–203https://doi.org/10.1007/s10772-020-09785-wAbstractIn this paper, we introduce a frame selection strategy for improved detection of spoofed speech. A countermeasure (CM) system typically uses a Gaussian mixture model (GMM) based classifier for computing the log-likelihood scores. The average log-...
- research-articleOctober 2020
Voice liveness detection under feature fusion and cross-environment scenario
Multimedia Tools and Applications (MTAA), Volume 79, Issue 37-38Pages 26951–26967https://doi.org/10.1007/s11042-020-09281-yAbstractDetecting playback spoofing attacks in speaker verification system is a big challenge. Recent studies on ASVspoof challenges show that replay attacks are the most difficult to recognize. Reasonable performance is expected from such antispoofing ...
- research-articleJanuary 2020
Anti-spoofing in face recognition-based biometric authentication using Image Quality Assessment
Multimedia Tools and Applications (MTAA), Volume 79, Issue 1-2Pages 865–889https://doi.org/10.1007/s11042-019-08115-wAbstractDespite the rapid growth of face recognition-based biometrics for both authentication and identification, the security of face biometric systems against presentation attacks (also called spoofing attacks) remains a great concern. Indeed, Face ...
- ArticleDecember 2019
Identity Independent Face Anti-spoofing Based on Random Scan Patterns
AbstractConventional face anti-spoofing paradigms tend to operate on plain facial profiles and learn either the natural face space alone (one-class training problem) or both the natural face space as well as the spoof sample space (2-class training ...
- research-articleSeptember 2019
High-accurate and robust fingerprint anti-spoofing system using Optical Coherence Tomography
Expert Systems with Applications: An International Journal (EXWA), Volume 130, Issue CPages 31–44https://doi.org/10.1016/j.eswa.2019.03.053Highlights- A high-accurate and robust fingerprint anti-spoofing system using OCT is proposed.
Traditional commercial automated fingerprint recognition systems (AFRSs) are vulnerable to fake attacks by the use of artificial fingerprints, due to its limitation on resolution and the difficulty of obtaining depth information. ...
- ArticleAugust 2019
Light CNN Architecture Enhancement for Different Types Spoofing Attack Detection
AbstractThe widely acknowledged vulnerability of automatic speaker verification systems (ASV) to various spoofing attacks requires the development of countermeasures robust to unforeseen spoofing trials. In this paper we consider deep learning approach ...
- articleOctober 2018
Efficient spoofing identification using baseline vector information of multiple receivers
In a spoofing environment, a Global Navigation Satellite System (GNSS) receiver must employ anti-spoofing techniques for obtaining a normal navigation solution from the GNSS signal. We propose a new method for identifying spoofing signals using the norm ...
- articleAugust 2018
A study on vulnerability and presentation attack detection in palmprint verification system
Pattern Analysis & Applications (PAAS), Volume 21, Issue 3Pages 769–782https://doi.org/10.1007/s10044-017-0606-yAs biometric systems become ubiquitous in the domain of personal authentication, it is of utmost importance that these systems are secured against attacks. Among various types of attacks on biometric systems, the presentation attack, which involves ...