A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Face Spoof Detection on Smartphone
International Research Journal of Engineering and Technology
unpublished
However, face authentication is vulnerable to spoofing attacks, to address these issues with face authentication, we take the first step to design Secure Face Detection System On Smart-phone for device ...
In proposed system, we focus on public-domain face spoof databases will show that the proposed approach is effective in face spoof detection for both cross-database and intra-database testing scenarios ...
If system found real face liveness then it will unlock the smartphone otherwise doesn't open lock. By this way we will identify the real face liveness and spoof detection system on smartphone. ...
fatcat:p4dnbg5dknd4fcn7bfzp2mzxmi
SAFE: Secure authentication with Face and Eyes
2013
2013 International Conference on Privacy and Security in Mobile Systems (PRISMS)
Face authentication is commonly offered as an alternative to passwords for device unlock. However, available face authentication systems are vulnerable to simple spoofing attacks. ...
We demonstrate the impact of image quality on spoofing, using low resolution photo representative of those commonly posted online. ...
To address the issues with face authentication, we take the first step to design a Secure Authentication system with Face and Eyes (SAFE) for device unlock. ...
doi:10.1109/prisms.2013.6927175
dblp:conf/prisms/BoehmCFHKLMS13
fatcat:u6aixhraljey7ckjxj2fnlqcbq
Empirical Study of Face Authentication Systems Under OSNFD Attacks
2018
IEEE Transactions on Dependable and Secure Computing
Face authentication has been widely available on smartphones, tablets, and laptops. ...
We make the first attempt to quantitatively measure OSNFD threat to real-world face authentication systems on smartphones, tablets, and laptops. ...
The study of Yingjiu Li on this subject is also funded through a research grant C220/MSS13C004 from MOE's AcRF Tier 1 funding support through Singapore Management University. ...
doi:10.1109/tdsc.2016.2550459
fatcat:rraw3rnnt5fwzgow5zx3wbxazm
Understanding OSN-based facial disclosure against face authentication systems
2014
Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14
We examine real-world face-authentication systems designed for both smartphones, tablets, and laptops. ...
Although it has inherent vulnerability against spoofing attacks, it is generally considered sufficiently secure as an authentication factor for common access protection. ...
Since there is only one security level in Face Unlock and the observed security strength of Face Unlock is comparable to the other systems in low security level, we classify its security level as low. ...
doi:10.1145/2590296.2590315
dblp:conf/ccs/LiXYLD14
fatcat:t6obkxqynzgn3e4kw4zix6w6si
Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security
2023
Intelligent Automation and Soft Computing
In the existing spoofing detection algorithm, there was some loss in the recreation of images. ...
This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of frames to overcome the above-said problems. ...
Face locks are now supported by several Android smartphones, including Huawei's honor series. Customers place their faces in front of the inbuilt camera to unlock the phone. ...
doi:10.32604/iasc.2023.030763
fatcat:rfyheu3hvjghrono5ypuwhekj4
Face Spoof Detection With Image Distortion Analysis
2015
IEEE Transactions on Information Forensics and Security
We propose an efficient and rather robust face spoof detection algorithm based on Image Distortion Analysis (IDA). ...
The proposed approach is extended to multi-frame face spoof detection in videos using a voting based scheme. ...
ACKNOWLEDGMENT We would like to thank the Idiap and CASIA institutes for sharing their face spoof databases. This research was supported by CITeR grant (14S-04W-12). ...
doi:10.1109/tifs.2015.2400395
fatcat:cxjdqajhwfb6vimtfeadhuwn5u
Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns
[article]
2021
arXiv
pre-print
We study the security of existing face authentication services (e.g., Microsoft, Amazon, and Face++) and typical liveness detection approaches. ...
., the low-cost 3D projection attack that projects manipulated face videos on a 3D face model, which can easily evade these face authentication services and liveness detection approaches. ...
Over 90% spoofed faces from different angles are detected as genuine ones by facial recognition services of Face++ and Amazon. ...
arXiv:2106.08013v1
fatcat:rhkx4l7unnbjpayapoj7mmfhri
Seeing Your Face Is Not Enough
2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15
Leveraging built-in cameras on smartphones and tablets, face authentication provides an attractive alternative of legacy passwords due to its memory-less authentication process. ...
in detecting head pose changes during face authentication. ...
The MFF poses a serious threat against face authentication systems as adversaries may forge or replay facial photos/videos to spoof face authentication. ...
doi:10.1145/2810103.2813612
dblp:conf/ccs/LiLYKD15
fatcat:mxtynjz74rgq3nr75nujxgwtcm
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study
2022
ACM Transactions on Privacy and Security
An attacker can launch a face PA by presenting a facial artifact on his or her own real face. ...
As face presentation attacks (PAs) are realistic threats for unattended face verification systems, face presentation attack detection (PAD) has been intensively investigated in past years, and the recent ...
PAs in the smartphone face unlocking process. ...
doi:10.1145/3491199
dblp:journals/tissec/QinPLRB22
fatcat:aawxqvdednbgdjnoyhcm5ouz6e
WearLock: Unlocking Your Phone via Acoustics Using Smartwatch
2017
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
We leverage the motion sensor on the smartwatch to reduce the unlock frequency. We offload smartwatch tasks to the smartphone to speed up computation and save energy. ...
Smartphone lock screens are implemented to reduce the risk of data loss or compromise given the fact that increasing amount of person data are accessible on smartphones nowadays. ...
This technique potentially reduces the number of unlocks, thus easing the unlock burden on users but at the cost of information security. ...
doi:10.1109/icdcs.2017.183
dblp:conf/icdcs/YiQCL17
fatcat:zuutslvp6rbpjc4wg6egrjyntu
Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics
[article]
2016
arXiv
pre-print
., a desktop computer) can be unlocked by the mere proximity of an authentication token (e.g., a smartphone). ...
Second, we demonstrate that WUZIA offers a high degree of detection accuracy, based on multi-sensor and multi-device fusion. ...
Our Approach: Walk-Unlock ZIA To protect the unlocking of V in the face of loss or theft of P in a ZIA scheme, we propose to authenticate the user based on a gait-based authentication system. ...
arXiv:1605.00766v1
fatcat:2xqtt7sbivgq3a2uiydefzh4wq
Technical advances in the smart device market have fixated smartphones at the heart of our lives, warranting an ever more secure means of authentication. ...
To add a layer of security, two-factor authentication (2FA) has been implemented but has proven to be vulnerable to various attacks. ...
For instance, vibration signals have been used to detect different surfaces, [2, 45] , recognize different finger gestures [11, 50] , distinguish the type of liquids with smartphone vibrations [24, ...
doi:10.1145/3610894
fatcat:w43klvtwhfdvlmbvof3fq3bm4a
Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain
[article]
2023
arXiv
pre-print
In this article, the authors provide a comprehensive overview on three core pillars of metaverse-as-a-service (MaaS) platforms; privacy and security, edge computing, and blockchain technology. ...
The authors address private and secure mechanisms for privatizing sensitive data attributes and securing machine learning algorithms running in a distributed manner within the metaverse platforms. ...
They can then inject adversarial training sample to spoof the learning services within the MaaS products. ...
arXiv:2301.01221v2
fatcat:njzop26brrculbncsuxhhry6c4
Inkjet-Printed Carbon Nanotubes for Fabricating a Spoof Fingerprint on Paper
2019
ACS Omega
A spoof fingerprint was fabricated on paper and applied for a spoofing attack to unlock a smartphone on which a capacitive array of sensors had been embedded with a fingerprint recognition algorithm. ...
With this printed spoof fingerprint, we were able to unlock a smartphone successfully; this was due to the good quality of the printed CNT material, which provided electrical conductivities and structural ...
Inkjet printing of the CNT ink: focusing on drop jetting from the printing nozzles (AVI) Unlock a smartphone with the printed spoof fingerprint (AVI) ...
doi:10.1021/acsomega.9b00936
pmid:31459951
pmcid:PMC6648154
fatcat:rn6ikk3rsvealib2gn36sakrxi
Face recognition for authentication on mobile devices
2016
Image and Vision Computing
In this paper, we discuss the use of face biometric technology and share our thoughts on key related issues and concerns: usability, security, robustness against spoofing attacks, and user privacy among ...
devices has become mainstream nowadays; besides the clear benefits that mobility provides as a mean to improve efficiency, productivity and user convenience, it in turn does require proper methods for secure ...
This problem motivates the recent efforts in liveness detection for a secure use of face biometrics [7] . ...
doi:10.1016/j.imavis.2016.03.018
fatcat:b4sir4yfwnhynaxhfvtkxhbrma
« Previous
Showing results 1 — 15 out of 566 results