48 research outputs found

    Система виявлення та запобігання спуфінг-атакам під час біометричної ідентифікації за обличчям людини

    Get PDF
    Магістерська дисертація містить 122 сторінку, 58 рисунків, 34 таблиць, 8 додатків, 67 джерел. Тема: Тема магістерської дисертації “ Система виявлення та запобігання спуфінг-атакам під час біометричної ідентифікації за обличчям людини”. Актуальність: Актуальність магістерської дисертації полягає в тому, що сучасні системи захисту смартфонів та ноутбуків все частіше використовують біометричні дані користувача для ідентифікації та автентифікації, в тому числі обличчя людини. Такі світові корпорації як Apple, Samsung та Google використовують підсистеми ідентифікації користувача за обличчям у своїх пристроях, в тому числі смартфонах, що мають доступ до банківських даних людей, через системи Apple Pay та Google Pay, тому захист таких систем ідентифікації є вкрай важливим на сьогоднішній день. Мета: Метою роботи є створення системи з виявлення та протидії спуфнінг- атакам, яка б надавала показник HTER менше 1%, а також могла працювати як незалежна система напряму з сенсором, так і в заємодіїї з іншими системами через відповідний інтерфейс. Задачі: задачами роботи для досягнення мети є: - Дослідження існуючих видів спуфінг-атак; - Аналіз існучих алгоритмів виявлення спуфінг-атак, їх порівняння; - Розробка власної систему виявлення спуфінг-атак; - Тестування та порівння системи з існуючими рішеннями. Об’єкт: Об’єктом дослідження є спуфінг-атаки на системи ідентифікації за біометрією обличчя. Предмет дослідження: Предметом дослідження є системи виявлення та протидія спуфінг-атакам у системах ідентифікації за біометрією обличчя.The master's thesis contains 122 pages, 58 figures, 34 tables, 8 appendices, 67 sources. The topic of the master's thesis " System for detecting and preventing face spoofing attacks". Relevance: The relevance of the master's thesis lies in the fact that modern smartphone and laptop protection systems increasingly use the user's biometric data for identification and authentication, including a person's face. Global corporations such as Apple, Samsung, and Google use subsystems of user identification based on their faces in their devices, including smartphones, which have access to people's banking data through the Apple Pay and Google Pay systems, so the protection of such identification systems is extremely important today. Purpose: The purpose of the work is to create a system for detecting and countering spoofing attacks, which would provide an HTER rate of less than 1% and could also work as an independent system directly with a sensor, and also in interaction with other systems through the appropriate interface. The tasks: to achieve the goal there are several tasks for the work: - Research of existing types of spoofing attacks; - Analysis of existing algorithms for detecting spoofing attacks, comparing them according to the HTER indicator and the number of types of attacks they can detect; - Development of own spoofing attack detection system; - Testing and comparing the system with existing solutions. Object: The object of the study is spoofing attacks on facial biometric identification systems. Subject: The subject of the study is detection systems and countermeasures against spoofing attacks in facial biometrics identification systems

    Recent Application in Biometrics

    Get PDF
    In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices. The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. The book was reviewed by editors Dr. Jucheng Yang and Dr. Norman Poh. We deeply appreciate the efforts of our guest editors: Dr. Girija Chetty, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers

    Pattern Recognition

    Get PDF
    Pattern recognition is a very wide research field. It involves factors as diverse as sensors, feature extraction, pattern classification, decision fusion, applications and others. The signals processed are commonly one, two or three dimensional, the processing is done in real- time or takes hours and days, some systems look for one narrow object class, others search huge databases for entries with at least a small amount of similarity. No single person can claim expertise across the whole field, which develops rapidly, updates its paradigms and comprehends several philosophical approaches. This book reflects this diversity by presenting a selection of recent developments within the area of pattern recognition and related fields. It covers theoretical advances in classification and feature extraction as well as application-oriented works. Authors of these 25 works present and advocate recent achievements of their research related to the field of pattern recognition

    Biometrics

    Get PDF
    Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The book consists of 13 chapters, each focusing on a certain aspect of the problem. The book chapters are divided into three sections: physical biometrics, behavioral biometrics and medical biometrics. The key objective of the book is to provide comprehensive reference and text on human authentication and people identity verification from both physiological, behavioural and other points of view. It aims to publish new insights into current innovations in computer systems and technology for biometrics development and its applications. The book was reviewed by the editor Dr. Jucheng Yang, and many of the guest editors, such as Dr. Girija Chetty, Dr. Norman Poh, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park, Dr. Sook Yoon and so on, who also made a significant contribution to the book

    Robust Modular Feature-Based Terrain-Aided Visual Navigation and Mapping

    Get PDF
    The visual feature-based Terrain-Aided Navigation (TAN) system presented in this thesis addresses the problem of constraining inertial drift introduced into the location estimate of Unmanned Aerial Vehicles (UAVs) in GPS-denied environment. The presented TAN system utilises salient visual features representing semantic or human-interpretable objects (roads, forest and water boundaries) from onboard aerial imagery and associates them to a database of reference features created a-priori, through application of the same feature detection algorithms to satellite imagery. Correlation of the detected features with the reference features via a series of the robust data association steps allows a localisation solution to be achieved with a finite absolute bound precision defined by the certainty of the reference dataset. The feature-based Visual Navigation System (VNS) presented in this thesis was originally developed for a navigation application using simulated multi-year satellite image datasets. The extension of the system application into the mapping domain, in turn, has been based on the real (not simulated) flight data and imagery. In the mapping study the full potential of the system, being a versatile tool for enhancing the accuracy of the information derived from the aerial imagery has been demonstrated. Not only have the visual features, such as road networks, shorelines and water bodies, been used to obtain a position ’fix’, they have also been used in reverse for accurate mapping of vehicles detected on the roads into an inertial space with improved precision. Combined correction of the geo-coding errors and improved aircraft localisation formed a robust solution to the defense mapping application. A system of the proposed design will provide a complete independent navigation solution to an autonomous UAV and additionally give it object tracking capability

    Multimedia Forensics

    Get PDF
    This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field
    corecore