Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








566 Hits in 3.5 sec

Secure Face Spoof Detection on Smartphone

Wakchaure Arti, Bamhane Swapnil, Bhor Ashwini, Varal Student
International Research Journal of Engineering and Technology   unpublished
However, face authentication is vulnerable to spoofing attacks, to address these issues with face authentication, we take the first step to design Secure Face Detection System On Smart-phone for device  ...  In proposed system, we focus on public-domain face spoof databases will show that the proposed approach is effective in face spoof detection for both cross-database and intra-database testing scenarios  ...  If system found real face liveness then it will unlock the smartphone otherwise doesn't open lock. By this way we will identify the real face liveness and spoof detection system on smartphone.  ... 
fatcat:p4dnbg5dknd4fcn7bfzp2mzxmi

SAFE: Secure authentication with Face and Eyes

Arman Boehm, Dongqu Chen, Mario Frank, Ling Huang, Cynthia Kuo, Tihomir Lolic, Ivan Martinovic, Dawn Song
2013 2013 International Conference on Privacy and Security in Mobile Systems (PRISMS)  
Face authentication is commonly offered as an alternative to passwords for device unlock. However, available face authentication systems are vulnerable to simple spoofing attacks.  ...  We demonstrate the impact of image quality on spoofing, using low resolution photo representative of those commonly posted online.  ...  To address the issues with face authentication, we take the first step to design a Secure Authentication system with Face and Eyes (SAFE) for device unlock.  ... 
doi:10.1109/prisms.2013.6927175 dblp:conf/prisms/BoehmCFHKLMS13 fatcat:u6aixhraljey7ckjxj2fnlqcbq

Empirical Study of Face Authentication Systems Under OSNFD Attacks

Yan Li, Yingjiu Li, Ke Xu, Qiang Yan, Robert H. Deng
2018 IEEE Transactions on Dependable and Secure Computing  
Face authentication has been widely available on smartphones, tablets, and laptops.  ...  We make the first attempt to quantitatively measure OSNFD threat to real-world face authentication systems on smartphones, tablets, and laptops.  ...  The study of Yingjiu Li on this subject is also funded through a research grant C220/MSS13C004 from MOE's AcRF Tier 1 funding support through Singapore Management University.  ... 
doi:10.1109/tdsc.2016.2550459 fatcat:rraw3rnnt5fwzgow5zx3wbxazm

Understanding OSN-based facial disclosure against face authentication systems

Yan Li, Ke Xu, Qiang Yan, Yingjiu Li, Robert H. Deng
2014 Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14  
We examine real-world face-authentication systems designed for both smartphones, tablets, and laptops.  ...  Although it has inherent vulnerability against spoofing attacks, it is generally considered sufficiently secure as an authentication factor for common access protection.  ...  Since there is only one security level in Face Unlock and the observed security strength of Face Unlock is comparable to the other systems in low security level, we classify its security level as low.  ... 
doi:10.1145/2590296.2590315 dblp:conf/ccs/LiXYLD14 fatcat:t6obkxqynzgn3e4kw4zix6w6si

Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security

Amal H. Alharbi, S. Karthick, K. Venkatachalam, Mohamed Abouhawwash, Doaa Sami Khafaga
2023 Intelligent Automation and Soft Computing  
In the existing spoofing detection algorithm, there was some loss in the recreation of images.  ...  This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of frames to overcome the above-said problems.  ...  Face locks are now supported by several Android smartphones, including Huawei's honor series. Customers place their faces in front of the inbuilt camera to unlock the phone.  ... 
doi:10.32604/iasc.2023.030763 fatcat:rfyheu3hvjghrono5ypuwhekj4

Face Spoof Detection With Image Distortion Analysis

Di Wen, Hu Han, Anil K. Jain
2015 IEEE Transactions on Information Forensics and Security  
We propose an efficient and rather robust face spoof detection algorithm based on Image Distortion Analysis (IDA).  ...  The proposed approach is extended to multi-frame face spoof detection in videos using a voting based scheme.  ...  ACKNOWLEDGMENT We would like to thank the Idiap and CASIA institutes for sharing their face spoof databases. This research was supported by CITeR grant (14S-04W-12).  ... 
doi:10.1109/tifs.2015.2400395 fatcat:cxjdqajhwfb6vimtfeadhuwn5u

Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns [article]

Man Zhou, Qian Wang, Shouhong Ding
2021 arXiv   pre-print
We study the security of existing face authentication services (e.g., Microsoft, Amazon, and Face++) and typical liveness detection approaches.  ...  ., the low-cost 3D projection attack that projects manipulated face videos on a 3D face model, which can easily evade these face authentication services and liveness detection approaches.  ...  Over 90% spoofed faces from different angles are detected as genuine ones by facial recognition services of Face++ and Amazon.  ... 
arXiv:2106.08013v1 fatcat:rhkx4l7unnbjpayapoj7mmfhri

Seeing Your Face Is Not Enough

Yan Li, Yingjiu Li, Qiang Yan, Hancong Kong, Robert H. Deng
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
Leveraging built-in cameras on smartphones and tablets, face authentication provides an attractive alternative of legacy passwords due to its memory-less authentication process.  ...  in detecting head pose changes during face authentication.  ...  The MFF poses a serious threat against face authentication systems as adversaries may forge or replay facial photos/videos to spoof face authentication.  ... 
doi:10.1145/2810103.2813612 dblp:conf/ccs/LiLYKD15 fatcat:mxtynjz74rgq3nr75nujxgwtcm

Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study

Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch
2022 ACM Transactions on Privacy and Security  
An attacker can launch a face PA by presenting a facial artifact on his or her own real face.  ...  As face presentation attacks (PAs) are realistic threats for unattended face verification systems, face presentation attack detection (PAD) has been intensively investigated in past years, and the recent  ...  PAs in the smartphone face unlocking process.  ... 
doi:10.1145/3491199 dblp:journals/tissec/QinPLRB22 fatcat:aawxqvdednbgdjnoyhcm5ouz6e

WearLock: Unlocking Your Phone via Acoustics Using Smartwatch

Shanhe Yi, Zhengrui Qin, Nancy Carter, Qun Li
2017 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)  
We leverage the motion sensor on the smartwatch to reduce the unlock frequency. We offload smartwatch tasks to the smartphone to speed up computation and save energy.  ...  Smartphone lock screens are implemented to reduce the risk of data loss or compromise given the fact that increasing amount of person data are accessible on smartphones nowadays.  ...  This technique potentially reduces the number of unlocks, thus easing the unlock burden on users but at the cost of information security.  ... 
doi:10.1109/icdcs.2017.183 dblp:conf/icdcs/YiQCL17 fatcat:zuutslvp6rbpjc4wg6egrjyntu

Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics [article]

Babins Shrestha, Manar Mohamed, Nitesh Saxena
2016 arXiv   pre-print
., a desktop computer) can be unlocked by the mere proximity of an authentication token (e.g., a smartphone).  ...  Second, we demonstrate that WUZIA offers a high degree of detection accuracy, based on multi-sensor and multi-device fusion.  ...  Our Approach: Walk-Unlock ZIA To protect the unlocking of V in the face of loss or theft of P in a ZIA scheme, we propose to authenticate the user based on a gait-based authentication system.  ... 
arXiv:1605.00766v1 fatcat:2xqtt7sbivgq3a2uiydefzh4wq

VibPath

Seokmin Choi, Junghwan Yim, Se Jun Kim, Yincheng Jin, Di Wu, Zhanpeng Jin
2023 Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies  
Technical advances in the smart device market have fixated smartphones at the heart of our lives, warranting an ever more secure means of authentication.  ...  To add a layer of security, two-factor authentication (2FA) has been implemented but has proven to be vulnerable to various attacks.  ...  For instance, vibration signals have been used to detect different surfaces, [2, 45] , recognize different finger gestures [11, 50] , distinguish the type of liquids with smartphone vibrations [24,  ... 
doi:10.1145/3610894 fatcat:w43klvtwhfdvlmbvof3fq3bm4a

Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain [article]

Vesal Ahsani, Ali Rahimi, Mehdi Letafati, Babak Hossein Khalaj
2023 arXiv   pre-print
In this article, the authors provide a comprehensive overview on three core pillars of metaverse-as-a-service (MaaS) platforms; privacy and security, edge computing, and blockchain technology.  ...  The authors address private and secure mechanisms for privatizing sensitive data attributes and securing machine learning algorithms running in a distributed manner within the metaverse platforms.  ...  They can then inject adversarial training sample to spoof the learning services within the MaaS products.  ... 
arXiv:2301.01221v2 fatcat:njzop26brrculbncsuxhhry6c4

Inkjet-Printed Carbon Nanotubes for Fabricating a Spoof Fingerprint on Paper

Veasna Soum, Sooyoung Park, Albertus Ivan Brilian, Yunpyo Kim, Madeline Y. Ryu, Taler Brazell, F. John Burpo, Kevin Kit Parker, Oh-Sun Kwon, Kwanwoo Shin
2019 ACS Omega  
A spoof fingerprint was fabricated on paper and applied for a spoofing attack to unlock a smartphone on which a capacitive array of sensors had been embedded with a fingerprint recognition algorithm.  ...  With this printed spoof fingerprint, we were able to unlock a smartphone successfully; this was due to the good quality of the printed CNT material, which provided electrical conductivities and structural  ...  Inkjet printing of the CNT ink: focusing on drop jetting from the printing nozzles (AVI) Unlock a smartphone with the printed spoof fingerprint (AVI)  ... 
doi:10.1021/acsomega.9b00936 pmid:31459951 pmcid:PMC6648154 fatcat:rn6ikk3rsvealib2gn36sakrxi

Face recognition for authentication on mobile devices

Esteban Vazquez-Fernandez, Daniel Gonzalez-Jimenez
2016 Image and Vision Computing  
In this paper, we discuss the use of face biometric technology and share our thoughts on key related issues and concerns: usability, security, robustness against spoofing attacks, and user privacy among  ...  devices has become mainstream nowadays; besides the clear benefits that mobility provides as a mean to improve efficiency, productivity and user convenience, it in turn does require proper methods for secure  ...  This problem motivates the recent efforts in liveness detection for a secure use of face biometrics [7] .  ... 
doi:10.1016/j.imavis.2016.03.018 fatcat:b4sir4yfwnhynaxhfvtkxhbrma
« Previous Showing results 1 — 15 out of 566 results