Wyniki wyszukiwania dla: PLAYBACK ATTACK DETECTION - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: PLAYBACK ATTACK DETECTION

Wyniki wyszukiwania dla: PLAYBACK ATTACK DETECTION

  • Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features

    Publikacja

    - Rok 2017

    Automatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Playback detection using machine learning with spectrogram features approach

    Publikacja

    This paper presents 2D image processing approach to playback detection in automatic speaker verification (ASV) systems using spectrograms as speech signal representation. Three feature extraction and classification methods: histograms of oriented gradients (HOG) with support vector machines (SVM), HAAR wavelets with AdaBoost classifier and deep convolutional neural networks (CNN) were compared on different data partitions in respect...

    Pełny tekst do pobrania w portalu

  • Texture Features for the Detection of Playback Attacks: Towards a Robust Solution

    This paper describes the new version of a method that is capable of protecting automatic speaker verification (ASV) systems from playback attacks. The presented approach uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. Our goal is to make the algorithm independent from the contents of the training set as much as possible; we look for the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Deep learning techniques for biometric security: A systematic review of presentation attack detection systems

    Publikacja

    - ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE - Rok 2024

    Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Rafał Leszczyna dr hab. inż.

    Dr hab. inż. Rafał Leszczyna jest profesorem uczelni na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej. W lipcu 2020 r., na podstawie osiągnięcia naukowego w obszarze zarządzania cyberbezpieczeństwem infrastruktur krytycznych w sektorze elektroenergetycznym, uzyskał stopień doktora habilitowanego w dziedzinie nauk inżynieryjno-technicznych, dyscyplina informatyka techniczna i telekomunikacja. W latach 2004–2008 pracował...

  • Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym

    Niniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...

  • System wykrywania i przeciwdziałania spoofingowi GPS

    Publikacja

    - Rok 2016

    Spoofing w systemach nawigacji satelitarnej jest atakiem elektronicznym, który polega na nieuprawnionej emisji sygnałów stanowiących imitacje rzeczywistych sygnałów odbieranych z satelitów. Powoduje on wyznaczenie nieprawidłowych informacji o czasie, położeniu i prędkości odbiornika. Z uwagi na trudność jego wykrycia, spoofing stanowi poważniejsze zagrożenie niż proste zagłuszanie sygnałów zakłóceniem o dużej mocy (ang. jamming)....

  • Change Detection in Signals 2023

    Kursy Online
    • J. Kozłowski

    Change Detection in Signals - files for students.

  • Adversarial attack algorithm for traffic sign recognition

    Publikacja

    - MULTIMEDIA TOOLS AND APPLICATIONS - Rok 2022

    Deep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Evaluation of Six Degrees of Freedom 3D Audio Orchestra Recording and Playback using multi-point Ambisonic interpolation

    Publikacja
    • T. Ciotucha
    • A. Rumiński
    • T. Żernicki
    • B. Mróz

    - Scopus - Rok 2021

    This paper describes a strategy for recording sound and enabling six-degrees-of-freedom playback, making use of multiple simultaneous and synchronized Higher Order Ambisonics (HOA) recordings. Such a strategy enables users to navigate in a simulated 3D space and listen to the six-degrees-of-freedom recordings from different perspectives. For the evaluation of the proposed approach, an Unreal Engine-based navigable 3D audiovisual...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange

    This paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...

  • High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks

    Publikacja
    • G. Savva
    • K. Manousakis
    • J. Rak
    • I. Tomkos
    • G. Ellinas

    - IEEE Access - Rok 2021

    This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...

    Pełny tekst do pobrania w portalu

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Publikacja

    - Rok 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Pełny tekst do pobrania w portalu

  • CANCER DETECTION AND PREVENTION

    Czasopisma

    ISSN: 0361-090X

  • Biomolecular Detection and Quantification

    Czasopisma

    eISSN: 2214-7535

  • A game-theoretic study of CSMA/CA under a backoff attack

    Analizowany jest rozdział pasma realizowany przez protokół CSMA/CA w obecności anonimowych stacji egoistycznych, atakujących wykładniczy mechanizm odczekania. Przy założeniu ruchu nasycającego sieć pokazuje się, że powstaje w ten sposób niekooperacyjna gra o strukturze wypłat wieloosobowego dylematu więźnia. Wykorzystując własności macierzy wypłat zaproponowano strategię dla odpowiedniej gry wieloetapowej, zapewniającą asymptotyczne...

  • Solvability of a Markovian model of an IEEE 802.11 LANunder a backoff attack

    Publikacja

    - Rok 2005

    Przedstawiono ulepszony model jakościowy mechanizmu CSMA/CA dla bezprzewodowych sieci lokalnych z indywidualną konfiguracją okien rywalizacji. Sformułowano warunki dostateczne rozwiązywalności modelu oraz wykazano obecność bezwarunkowej motywacji do zmniejszania okien rywalizacji.

  • Performance of an ad-hoc 802.11 LAN under a backoff attack

    Publikacja

    - Rok 2005

    Samowolna rekonfiguracja wartości okien rywalizacji w protokole MAC sieci bezprzewodowych 802.11 może prowadzić do niesprawiedliwego rozdziału dostępnego pasma transmisyjnego. Dla dużego obciążenia ruchowego sformułowano prosty model markowowski umożliwiający szybką symulację Monte Carlo dla oceny udziału w pasmie poszczególnych stacji sieci. Traktując otrzymane wielkości jako wypłaty w grze niekoalicyjnej przedstawiono niektóre...

  • Improving listeners' experience for movie playback through enhancing dialogue clarity in soundtracks

    This paper presents a method for improving users' quality of experience through processing of movie soundtracks. The dialogue clarity enhancement algorithms were introduced for detecting dialogue in movie soundtrack mixes and then for amplifying the dialogue components. The front channel signals (left, right, center) are analyzed in the frequency domain. The selected partials in the center channel signal, which yield high disparity...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection

    Publikacja

    - Rok 2013

    GPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...

  • Radiation Detection Technology and Methods

    Czasopisma

    ISSN: 2509-9930 , eISSN: 2509-9949

  • A random access protocol under backoff attack: performance and game-theoretic deterrent

    Publikacja

    - Rok 2005

    Przedstawiono metodę obrony przed atakiem na protokół CSMA/CA, opartą na generacji sekwencji zagłuszających z wykorzystaniem wzajemnej słyszalności stacji. Na podstawie analizy wypłat odpowiedniej gry w formie rozwiniętej pokazano możliwość osiągania punktu równowagi odpowiadającego standardowym ustawieniom protokołu.

  • Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System

    Publikacja

    - FLUCTUATION AND NOISE LETTERS - Rok 2015

    A recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...

    Pełny tekst do pobrania w portalu

  • A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing

    Publikacja

    - SENSORS - Rok 2019

    This article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...

    Pełny tekst do pobrania w portalu

  • Cascade Object Detection and Remote Sensing Object Detection Method Based on Trainable Activation Function

    Publikacja
    • S. N. Shivappriya
    • M. J. P. Priyadarsini
    • A. Stateczny
    • C. Puttamadappa
    • B. D. Parameshachari

    - Remote Sensing - Rok 2021

    Object detection is an important process in surveillance system to locate objects and it is considered as major application in computer vision. The Convolution Neural Network (CNN) based models have been developed by many researchers for object detection to achieve higher performance. However, existing models have some limitations such as overfitting problem and lower efficiency in small object detection. Object detection in remote...

    Pełny tekst do pobrania w portalu

  • Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents

    Automation of complex social behavior analysis of experimental animals would allow for faster, more accurate and reliable research results in many biological, pharmacological, and medical fields. However, there are behaviors that are not only difficult to detect for the computer, but also for the human observer. Here, we present an analysis of the method for identifying aggressive behavior in thermal images by detecting traces...

    Pełny tekst do pobrania w portalu

  • Optimizing of target detection and tracking processes realized on consoles of passive sonar with linear towed antenna

    Publikacja

    - HYDROACOUSTICS - Rok 2016

    The long-range passive towed sonar was first modernised a few years ago. Building on operator experience over that period, a concept was developed of optimising the tasks performed by sonar operators, and improving forms of imaging to inform about object detection and support object tracking. The concept was implemented and successfully tested during ships’ manoeuvres. The optimisation of operator tasks was designed to keep listening...

    Pełny tekst do pobrania w portalu

  • Detection of damages in a rivetted plate

    Publikacja

    The paper presents the results of damage detection in a riveted aluminium plate. The detection method has been based on Lamb wave propagation. The plate has been analysed numerically and experimentally. Numerical calculations have been carried out by the use of the time-domain spectral finite element method, while for the experimental analysis laser scanning Doppler vibrometry (LSDV) has been utilised. The panel has been excited...

  • A study of nighttime vehicle detection algorithms

    Dane Badawcze
    wersja 1.0 open access

    This dataset is from my master's thesis "A study of nighttime vehicle detection algorithms". It contains both raw data and preprocessed dataset ready to use. In the pictures below you can see how images were annotated.

  • Transient detection for speech coding applications

    Signal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Detection and segmentation of moving vehicles and trains using Gaussian mixtures, shadow detection and morphological processing

    Publikacja

    Solution presented in this paper combines background modelling, shadow detection and morphological and temporal processing into one system responsible for detection and segmentation of moving objects recorded with a static camera. Vehicles and trains are detected based on their pixellevel difference from the continually updated background model utilizing a Gaussian mixture calculated separately for every pixel. The shadow detection...

  • OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems

    Publikacja
    • S. S. Narayana Chintapalli
    • S. Prakash Singh
    • J. Frnda
    • B. P. Divakarachar
    • V. L. Sarraju
    • P. Falkowski-Gilski

    - Heliyon - Rok 2024

    Currently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...

    Pełny tekst do pobrania w portalu

  • Visual Features for Endoscopic Bleeding Detection

    Aims: To define a set of high-level visual features of endoscopic bleeding and evaluate their capabilities for potential use in automatic bleeding detection. Study Design: Experimental study. Place and Duration of Study: Department of Computer Architecture, Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, between March 2014 and May 2014. Methodology: The features have...

    Pełny tekst do pobrania w portalu

  • Camera sabotage detection for surveillance systems

    Publikacja

    Camera dysfunction detection algorithms and their utilization in realtime video surveillance systems are described. The purpose of using the proposed analysis is explained. Regarding image tampering three algorithms for focus loss, scene obstruction and camera displacement detection are implemented and presented. Features of each module are described and certain scenarios for best performance are depicted. Implemented solutions...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Automatic audio-visual threat detection

    Publikacja

    - Rok 2010

    The concept, practical realization and application of a system for detection and classification of hazardous situations based on multimodal sound and vision analysis are presented. The device consists of new kind multichannel miniature sound intensity sensors, digital Pan Tilt Zoom and fixed cameras and a bundle of signal processing algorithms. The simultaneous analysis of multimodal signals can significantly improve the accuracy...

  • Direct detection of quantum entanglement

    Publikacja

    - PHYSICAL REVIEW LETTERS - Rok 2002

    Basing on positive maps separability criterion we propose the experimentally viable, direct detection of quantum entanglement. It is efficient and does not require any a priori knowledge about the state. For two qubits it provides a sharp (i.e., “if and only if”) separability test and estimation of amount of entanglement. We view this method as a new form of quantum computation, namely, as a decision problem with quantum data structure.

  • Comparison of edge detection algorithms for electric wire recognition

    Publikacja

    Edge detection is the preliminary step in image processing for object detection and recognition procedure. It allows to remove useless information and reduce amount of data before further analysis. The paper contains the comparison of edge detection algorithms optimized for detection of horizontal edges. For comparison purposes the algorithms were implemented in the developed application dedicated to detection of electric line...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Molecularly imprinted polymers for the detection of volatile biomarkers

    Publikacja

    - TRAC-TRENDS IN ANALYTICAL CHEMISTRY - Rok 2024

    In the field of cancer detection, the development of affordable, quick, and user-friendly sensors capable of detecting various cancer biomarkers, including those for lung cancer (LC), holds utmost significance. Sensors are expected to play a crucial role in the early-stage diagnosis of various diseases. Among the range of options, sensors emerge as particularly appealing for the diagnosis of various diseases, owing to their cost-effectiveness,...

    Pełny tekst do pobrania w portalu

  • Rating by detection: an artifact detection protocol for rating EEG quality with average event duration

    Publikacja
    • D. Węsierski
    • M. R. Rufuie
    • O. Milczarek
    • W. Ziembla
    • P. Ogniewski
    • A. Kołodziejak
    • P. Niedbalski

    - Journal of Neural Engineering - Rok 2023

    Quantitative evaluation protocols are critical for the development of algorithms that remove artifacts from real EEG optimally. However, visually inspecting the real EEG to select the top-performing artifact removal pipeline is infeasible while hand-crafted EEG data allow assessing artifact removal configurations only in a simulated environment. This study proposes a novel, principled approach for quantitatively evaluating algorithmically...

    Pełny tekst do pobrania w portalu

  • Toward Robust Pedestrian Detection With Data Augmentation

    Publikacja

    In this article, the problem of creating a safe pedestrian detection model that can operate in the real world is tackled. While recent advances have led to significantly improved detection accuracy on various benchmarks, existing deep learning models are vulnerable to invisible to the human eye changes in the input image which raises concerns about its safety. A popular and simple technique for improving robustness is using data...

    Pełny tekst do pobrania w portalu

  • Faults and Fault Detection Methods in Electric Drives

    Publikacja

    The chapter presents a review of faults and fault detection methods in electric drives. Typical faults are presented that arises for the induction motor, which is valued in the industry for its robust construction and cost-effective production. Moreover, a summary is presented of detectable faults in conjunction with the required physical information that allow a detection of specific faults. In order to address faults of a complete...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Molecular detection of Candida krusei

    The species identification of fungi belonging to genus Candida is an important issue as this genus becomes the emerging problem of nosocomial infections. As Candida krusei presents intrinsicresistance to the fluconazole that is the drug of the first choice in case of invasive candidiasis the PCR identifying the DNA of C. krusei was elaborated. The analytical sensitivity of the assay on spiked blood samples was estimated at 3-5...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • PCR detection of Scopulariopsis brevicaulis

    Scopulariopsis brevicaulis is known as a most common etiological factor of the mould toenail infections. There are also reports indicating that S. brevicaulis could cause organ and disseminated infections. Nowadays microscopic observations from the direct sample and culture are crucial for the appropriate recognition of the infection. In this paper is presented a PCR-based method for S. brevicaulis detection. The specificity of...

    Pełny tekst do pobrania w portalu

  • A framework for automatic detection of abandoned luggage in airport terminal

    Publikacja

    A framework for automatic detection of events in a video stream transmitted from a monitoring system is presented. The framework is based on the widely used background subtraction and object tracking algorithms. The authors elaborated an algorithm for detection of left and removed objects based on mor-phological processing and edge detection. The event detection algorithm collects and analyzes data of all the moving objects in...

  • Face detection algorithms evaluation for the bank client verification

    Publikacja

    Results of investigation of face detection algorithms in the video sequences are presented in the paper. The recordings were made with a miniature industrial USB camera in real conditions met in three bank operating rooms. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide as much as possible user interaction...

  • Direct spectrum detection based on Bayesian approach

    The paper investigates the Bayesian framework's performance for a direct detection of spectrum parameters from the compressive measurements. The reconstruction signal stage is eliminated in by the Bayesian Compressive Sensing algorithm, which causes that the computational complexity and processing time are extremely reduced. The computational efficiency of the presented procedure is significantly...

    Pełny tekst do pobrania w portalu

  • Automatic Incident Detection at Intersections with Use of Telematics

    While there are many examples of Intelligent Transport System deployments in Poland, more attention should be paid to traffic incident management and detection on dual-carriageways and urban street networks. One of the aims of CIVITAS DYN@MO, a European Union funded project, is to use TRISTAR (an Urban Transport Management System) detection modules to detect incidents at junctions equipped with traffic signals. First part of paper...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Detection of impulsive disturbances in archive audio signals

    Publikacja

    In this paper the problem of detection of impulsive disturbances in archive audio signals is considered. It is shown that semi-causal/noncausal solutions based on joint evaluation of signal prediction errors and leave-one-out signal interpolation errors, allow one to noticeably improve detection results compared to the prediction-only based solutions. The proposed approaches are evaluated on a set of clean audio signals contaminated...

    Pełny tekst do pobrania w portalu

  • Magnetic and infrared thermography methods in detection of antipersonnel landmines

    In this paper the two alternative methods of antipersonnel landmine detection are shown: the magnetic method and the active infrared thermography. The experimental results of the detection of selected, plastic mines using both methods are also presented.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Weighted Clustering for Bees Detection on Video Images

    Publikacja

    This work describes a bee detection system to monitor bee colony conditions. The detection process on video images has been divided into 3 stages: determining the regions of interest (ROI) for a given frame, scanning the frame in ROI areas using the DNN-CNN classifier, in order to obtain a confidence of bee occurrence in each window in any position and any scale, and form one detection window from a cloud of windows provided by...

    Pełny tekst do pobrania w portalu