Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








358 Hits in 6.4 sec

On the Robustness of Face Recognition Algorithms Against Attacks and Bias [article]

Richa Singh, Akshay Agarwal, Maneet Singh, Shruti Nagpal, Mayank Vatsa
2020 arXiv   pre-print
Different types of attacks such as physical presentation attacks, disguise/makeup, digital adversarial attacks, and morphing/tampering using GANs have been discussed.  ...  Despite the enhanced accuracies, robustness of these algorithms against attacks and bias has been challenged.  ...  Nagpal is supported via the TCS PhD fellowship. M. Vatsa is also supported through the Swarnajayanti Fellowship by the Government of India,  ... 
arXiv:2002.02942v1 fatcat:d54z6d47hbe5pgij4y4p7nwf2m

On the Robustness of Face Recognition Algorithms Against Attacks and Bias

Richa Singh, Akshay Agarwal, Maneet Singh, Shruti Nagpal, Mayank Vatsa
2020 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
Different types of attacks such as physical presentation attacks, disguise/makeup, digital adversarial attacks, and morphing/tampering using GANs have been discussed.  ...  Despite the enhanced accuracies, robustness of these algorithms against attacks and bias has been challenged.  ...  Nagpal is supported via the TCS PhD fellowship. M. Vatsa is also supported through the Swarnajayanti Fellowship by the Government of India,  ... 
doi:10.1609/aaai.v34i09.7085 fatcat:i5ffpurug5divotc65x6kb346q

3D Face Anti-spoofing with Factorized Bilinear Coding [article]

Shan Jia, Xin Li, Chuanbo Hu, Guodong Guo, Zhengquan Xu
2020 arXiv   pre-print
We have witnessed rapid advances in both face presentation attack models and presentation attack detection (PAD) in recent years.  ...  Our method, based on factorized bilinear coding of multiple color channels (namely MC\_FBC), targets at learning subtle fine-grained differences between real and fake images.  ...  A network based on transfer learning using a pre-trained VGG-16 model architecture is presented in [42] to recognize photo, video and 3D mask attacks.  ... 
arXiv:2005.06514v3 fatcat:whvinwbehfap5o4dtm5u54i2qa

Periocular Biometrics: A Modality for Unconstrained Scenarios [article]

Fernando Alonso-Fernandez, Josef Bigun, Julian Fierrez, Naser Damer, Hugo Proença, Arun Ross
2023 arXiv   pre-print
, and detection; (b) identity recognition, including combination with other modalities and use of various spectra; and (c) ocular soft-biometric analysis.  ...  The COVID-19 pandemic has further highlighted its importance, as the ocular region remained the only visible facial area even in controlled settings due to the widespread use of masks.  ...  The most common attack, presentation attack (also known as spoofing), consists in presenting a fake biometric sample to the sensor.  ... 
arXiv:2212.13792v2 fatcat:ydn3pfcfrrho7fzojzoxwcnaxe

Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor

2019 KSII Transactions on Internet and Information Systems  
In this study, we propose a fast and robust method to detect face-spoofing attacks based on the analysis of spatial frequency differences between the real and fake videos.  ...  However, the security system that uses face recognition as the login method are vulnerable to face-spoofing attacks, from using printed photo or video of the valid user.  ...  Repesentation [42] 0.75 - 0.00 - Codebook [45] - 2.75 14.00 8.00 29.87 Deep dictionary via greedy learning (DDGL) [46] - 0.00 1.3 0.00 16.50 Proposed method 0.00 0.00 0.00 2.44 26.00  ... 
doi:10.3837/tiis.2019.02.022 fatcat:benkum63q5gnhpntmuf6xn4wnq

Breakthrough Silicon Scanning Discovers Backdoor in Military Chip [chapter]

Sergei Skorobogatov, Christopher Woods
2012 Lecture Notes in Computer Science  
The backdoor was found amongst additional JTAG functionality and exists on the silicon itself, it was not present in any firmware loaded onto the chip.  ...  This way an attacker can extract all the configuration data from the chip, reprogram crypto and access keys, modify low-level silicon features, access unencrypted configuration bitstream or permanently  ...  This permits a new and disturbing possibility of a large scale Stuxnet-type attack via a network or the Internet on the silicon itself.  ... 
doi:10.1007/978-3-642-33027-8_2 fatcat:tbcqe3s6ubhnnfholsxc6v5du4

Face Recognition: A Novel Multi-Level Taxonomy based Survey [article]

Alireza Sepas-Moghaddam, Fernando Pereira, Paulo Lobato Correia
2019 arXiv   pre-print
Following the proposed taxonomy, a comprehensive survey of representative face recognition solutions is presented.  ...  , electronic devices displaying a face or silicon face masks.  ...  This may facilitate the deployment of deep face models on resource-constrained embedded devices such as mobile devices [97] .  Face presentation attack detection for face recognition security -Despite  ... 
arXiv:1901.00713v1 fatcat:ofks5jqf6fca3e4l27nph6eiri

AI/ML Algorithms and Applications in VLSI Design and Technology [article]

Deepthi Amuru, Harsha V. Vudumula, Pavan K. Cherupally, Sushanth R. Gurram, Amir Ahmad, Andleeb Zahra, Zia Abbas
2023 arXiv   pre-print
Employing AI and machine learning (ML) algorithms in VLSI design and manufacturing reduces the time and effort for understanding and processing the data within and across different abstraction levels via  ...  automated learning algorithms.  ...  ML can aid in detecting hardware attacks and could take necessary counter-attacks with suitable design [319] .  ... 
arXiv:2202.10015v2 fatcat:ej3pdqucqna3hlxbiq4mzmbl5y

Emerging Biometrics: Deep Inference and Other Computational Intelligence [article]

Svetlana Yanushkevich, Shawn Eastwood, Kenneth Lai, Vlad Shmerko
2020 arXiv   pre-print
Biometric-enabled systems are evolving towards deep learning and deep inference using the principles of adaptive computing, - the front tides of the modern computational intelligence domain.  ...  The authors of [108] have introduced a novel detector of the facial silicone mask presentation attack based on a multilevel deep dictionary via greedy learning.  ...  Good performance is reported in various tasks, in particular, in silicon face mask detection [108] and hair style recognition [135] .  ... 
arXiv:2006.11971v1 fatcat:k6aunuoxc5apbb347vy2lj7bsq

2020 Index IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems Vol. 39

2020 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
Chang, W., +, TCAD Aug. 2020 1662-1673 SRAF Insertion via Supervised Dictionary Learning.  ...  Seghaier, I., +, TCAD Feb. 2020 294-307 SRAF Insertion via Supervised Dictionary Learning.  ...  ., +, TCAD Dec. 2020 4828-4841 High-Level Synthesis Design Space Exploration: Past, Present, and Future. Schafer, B.C., +, TCAD Oct. 2020  ... 
doi:10.1109/tcad.2021.3054536 fatcat:wsw3olpxzbeclenhex3f73qlw4

Dictionary Based Renovation from Minuzie to Image

2015 International Journal of Science and Research (IJSR)  
The orientation patch dictionary is used to renovate the orientation field from minuzie, while the continuous phase patch dictionary is used to renovate the ridge pattern.  ...  In this paper, the previous experience about fingerprint ridge structures is conceal in terms of orientation patch and continuous phase patch dictionaries to improve the fingerprint renovation.  ...  While the introduction of compact silicon chip-based sensors that capture only part of the fingerprint has made this problem important from a commercial perspective, there is also considerable interest  ... 
doi:10.21275/v4i11.27101501 fatcat:o4ib2qwclfclnb5d3yi3ye2pc4

BIOSIG 2020 - Komplettband

2020 Biometrics and Electronic Signatures  
We address that by presenting a specifically collected database containing three session, each with three different capture instructions, to simulate realistic use cases.  ...  However, the pandemic led to the wide use of face masks, essential to keep the pandemic under control.  ...  Acknowledgments This research is based upon work supported by the Ministry of Electronics and Information Technology (MeitY), Government of India, under Grant (No.4 (13)/2019-ITEA).  ... 
dblp:conf/biosig/X20 fatcat:hkqvegujqbatdlopbzclkxdive

Camera Invariant Feature Learning for Generalized Face Anti-spoofing [article]

Baoliang Chen, Wenhan Yang, Haoliang Li, Shiqi Wang, Sam Kwong
2021 arXiv   pre-print
The first branch aims to learn the camera invariant spoofing features via feature level decomposition in the high frequency domain.  ...  There has been an increasing consensus in learning based face anti-spoofing that the divergence in terms of camera models is causing a large domain gap in real application scenarios.  ...  In [35] , a multi-level deep dictionary learning based method was proposed especially for the silicone mask attacks.  ... 
arXiv:2101.10075v1 fatcat:3obmibbf6rbgjbroajpej2at44

Machine Learning-Based Condition Monitoring for PV Systems: State of the Art and Future Prospects

Tarek Berghout, Mohamed Benbouzid, Toufik Bentrcia, Xiandong Ma, Siniša Djurović, Leïla-Hayet Mouss
2021 Energies  
Accordingly, this review primarily investigates the different learning architectures used (i.e., ordinary, hybrid, and ensemble) in relation to their learning frameworks (i.e., traditional and deep learning  ...  A just-in-time task to deal with several naturally occurring faults can be correctly undertaken via the cooperation of effective detection, diagnosis, and prognostic analyses.  ...  [67] suggested a supervised and unsupervised dictionary learning approach to detect disconnect (open-circuit) faults in PV modules.  ... 
doi:10.3390/en14196316 fatcat:4ul3nm3sdza7vk5tynyup2cmiq

Systematic Literature Review of EM-SCA Attacks on Encryption [article]

Muhammad Rusyaidi Zunaidi and Asanka Sayakkara and Mark Scanlon
2024 arXiv   pre-print
Electromagnetic side-channel analysis (EM-SCA) gathers information by monitoring EM radiation, capable of retrieving encryption keys and detecting malicious activity.  ...  Cryptography is vital for data security, but cryptographic algorithms can still be vulnerable to side-channel attacks (SCAs), physical assaults exploiting power consumption and EM radiation.  ...  Device Type EM Capture Machine Learning Deep Learning Key Recovery  ... 
arXiv:2402.10030v1 fatcat:xumgsh3owve7loebtcr7lbmxf4
« Previous Showing results 1 — 15 out of 358 results