• Corpus ID: 16008582

Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba

@inproceedings{Duc2009YourFI,
  title={Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba},
  author={Nguyen Minh Duc},
  year={2009}
}

Measurement-driven Security Analysis of Imperceptible Impersonation Attacks

It is found that arbitrary impersonation attacks, wherein an arbitrary attacker impersonates an arbitrary target, are hard if imperceptibility is an auxiliary goal, and security countermeasures that can dramatically reduce the exploitability of DNN-based FR systems are suggested.

Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos

A novel approach to bypass modern face authentication systems by leveraging a handful of pictures of the target user taken from social media is introduced, showing how to create realistic, textured, 3D facial models that undermine the security of widely used face authentication solutions.

Handbook of Biometric Anti-Spoofing

This Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems and in deriving countermeasures to these attacks.

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era

This paper presents LiveBugger, a new deepfake-powered attack framework that enables customizable, automated security evaluation of FLV, and proposes a customized, two-stage approach that can boost the attack success rate by up to 70%.

Robust Human Face Authentication Leveraging Acoustic Sensing on Smartphones

EchoPrint actively emits almost inaudible acoustic signals from the earpiece speaker to “illuminate” the user's face and authenticates the user by the unique features extracted from the echoes bouncing off the 3D facial contour.

Introduction to Presentation Attack Detection in Iris Biometrics and Recent Advances

This chapter introduces iris Presentation Attack Detection (PAD) methods that have been developed to reduce the risk posed by presentation attacks and presents a taxonomy of Presentation attack Detection methods as a brief introduction to this very active research area.

VLAD-VSA: Cross-Domain Face Presentation Attack Detection with Vocabulary Separation and Adaptation

The VLAD aggregation method is adopted to quantize local features with visual vocabulary locally partitioning the feature space, and hence preserve the local discriminability, and the proposed vocabulary separation and adaptation method imitates the maximization step of the k-means algorithm in the end-to-end training.

Efficiently Updating ECG-Based Biometric Authentication Based on Incremental Learning

An adaptive ECG-based authentication method that performs incremental learning to identify ECG signals from a subject under a variety of measurement conditions is proposed and an incremental support vector machine (SVM) is adopted for authentication implementing incremental learning.

A Usable and Robust Continuous Authentication Framework Using Wearables

A usable and reliable Wearable-Assisted Continuous Authentication (WACA), which relies on the sensor-based keystroke dynamics and the authentication data is acquired through the built-in sensors of a wearable while the user is typing.
...

References

SHOWING 1-10 OF 22 REFERENCES

A morphable model for the synthesis of 3D faces

  • M. Turk
  • Computer Science
    SIGGRAPH 1999
  • 1999

Biometrics

  • R. Pearl
  • Computer Science
    The American Naturalist
  • 1914
To have a multimodal biometric system like a combination of fingerprint, retinal prints and so on, will not only avoid problems arising due to hacking of single point data but can also be useful in situations where one parameter cannot be used for one or the other reason.

Identification of human faces

These studies form a foundation for continuing research on real-time man-machine interaction for computer classification and identification of multidimensional vectors specified by noisy components.

Face recognition using Eigenfaces

The paper presents a methodology for face recognition based on information theory approach of coding and decoding the face image using Principle Component Analysis and recognition using the feed forward back propagation Neural Network.

A tutorial on Principal Components Analysis

PCA is a useful statistical technique that has found application in fields such as face recognition and image compression, and is a common technique for finding patterns in data of high dimension.

Image Analysis for Face Recognition

A number of typical algorithms for face recognition are presented, being categorized into appearancebased and model-based schemes, and future research directions based on the current recognition results are pointed out.

FRVT 2006 and ICE 2006 large-scale results

On the FRVT 2006 and the ICE 2006 datasets, recognition performance was comparable for all three biometrics and the best-performing face recognition algorithms were more accurate than humans.

Face Authentication System for Information Security

This paper proposes the combination two facial feature methods and probabilistic neural network for facial recognition and adopts wavelet transform to extract low frequency coefficients from 1-D energy profile signal and statistical distribution of facial gray images as feature vectors, which is applied with probabilism neural network in facial identification and facial matching.

Biometric Face Authentication Using Pixel-Based Weak Classifiers

This paper investigates the use of AdaBoost for face authentication to boost weak classifiers based simply on pixel values and shows that boosting only hundreds of classifiers achieved near state-of-the-art results.