89 Citations
Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
- Computer ScienceArXiv
- 2020
It is found that arbitrary impersonation attacks, wherein an arbitrary attacker impersonates an arbitrary target, are hard if imperceptibility is an auxiliary goal, and security countermeasures that can dramatically reduce the exploitability of DNN-based FR systems are suggested.
Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos
- Computer ScienceUSENIX Security Symposium
- 2016
A novel approach to bypass modern face authentication systems by leveraging a handful of pictures of the target user taken from social media is introduced, showing how to create realistic, textured, 3D facial models that undermine the security of widely used face authentication solutions.
Handbook of Biometric Anti-Spoofing
- Computer ScienceAdvances in Computer Vision and Pattern Recognition
- 2014
This Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems and in deriving countermeasures to these attacks.
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
- Computer ScienceUSENIX Security Symposium
- 2022
This paper presents LiveBugger, a new deepfake-powered attack framework that enables customizable, automated security evaluation of FLV, and proposes a customized, two-stage approach that can boost the attack success rate by up to 70%.
Robust Human Face Authentication Leveraging Acoustic Sensing on Smartphones
- Computer ScienceIEEE Transactions on Mobile Computing
- 2022
EchoPrint actively emits almost inaudible acoustic signals from the earpiece speaker to “illuminate” the user's face and authenticates the user by the unique features extracted from the echoes bouncing off the 3D facial contour.
Introduction to Presentation Attack Detection in Iris Biometrics and Recent Advances
- Computer ScienceArXiv
- 2021
This chapter introduces iris Presentation Attack Detection (PAD) methods that have been developed to reduce the risk posed by presentation attacks and presents a taxonomy of Presentation attack Detection methods as a brief introduction to this very active research area.
VLAD-VSA: Cross-Domain Face Presentation Attack Detection with Vocabulary Separation and Adaptation
- Computer ScienceACM Multimedia
- 2021
The VLAD aggregation method is adopted to quantize local features with visual vocabulary locally partitioning the feature space, and hence preserve the local discriminability, and the proposed vocabulary separation and adaptation method imitates the maximization step of the k-means algorithm in the end-to-end training.
Efficiently Updating ECG-Based Biometric Authentication Based on Incremental Learning
- Computer ScienceSensors
- 2021
An adaptive ECG-based authentication method that performs incremental learning to identify ECG signals from a subject under a variety of measurement conditions is proposed and an incremental support vector machine (SVM) is adopted for authentication implementing incremental learning.
Auditory perception vs. face based systems for human age estimation in unsupervised environments: from countermeasure to multimodality
- Computer SciencePattern Recognit. Lett.
- 2021
A Usable and Robust Continuous Authentication Framework Using Wearables
- Computer ScienceIEEE Transactions on Mobile Computing
- 2021
A usable and reliable Wearable-Assisted Continuous Authentication (WACA), which relies on the sensor-based keystroke dynamics and the authentication data is acquired through the built-in sensors of a wearable while the user is typing.
References
SHOWING 1-10 OF 22 REFERENCES
Biometrics
- Computer ScienceThe American Naturalist
- 1914
To have a multimodal biometric system like a combination of fingerprint, retinal prints and so on, will not only avoid problems arising due to hacking of single point data but can also be useful in situations where one parameter cannot be used for one or the other reason.
Identification of human faces
- Computer Science
- 1971
These studies form a foundation for continuing research on real-time man-machine interaction for computer classification and identification of multidimensional vectors specified by noisy components.
Face recognition using Eigenfaces
- Computer Science2011 3rd International Conference on Computer Research and Development
- 2011
The paper presents a methodology for face recognition based on information theory approach of coding and decoding the face image using Principle Component Analysis and recognition using the feed forward back propagation Neural Network.
A tutorial on Principal Components Analysis
- Computer Science
- 2002
PCA is a useful statistical technique that has found application in fields such as face recognition and image compression, and is a common technique for finding patterns in data of high dimension.
Image Analysis for Face Recognition
- Computer Science
- 2005
A number of typical algorithms for face recognition are presented, being categorized into appearancebased and model-based schemes, and future research directions based on the current recognition results are pointed out.
FRVT 2006 and ICE 2006 large-scale results
- Computer Science
- 2007
On the FRVT 2006 and the ICE 2006 datasets, recognition performance was comparable for all three biometrics and the best-performing face recognition algorithms were more accurate than humans.
Face Authentication System for Information Security
- Computer Science
- 2005
This paper proposes the combination two facial feature methods and probabilistic neural network for facial recognition and adopts wavelet transform to extract low frequency coefficients from 1-D energy profile signal and statistical distribution of facial gray images as feature vectors, which is applied with probabilism neural network in facial identification and facial matching.
Biometric Face Authentication Using Pixel-Based Weak Classifiers
- Computer ScienceECCV Workshop BioAW
- 2004
This paper investigates the use of AdaBoost for face authentication to boost weak classifiers based simply on pixel values and shows that boosting only hundreds of classifiers achieved near state-of-the-art results.