Detecting real-time deep-fake videos using active illumination

CR Gerstner, H Farid - … of the IEEE/CVF Conference on …, 2022 - openaccess.thecvf.com
While many have grown suspicious of viral images and videos found online, there is a
general sense that we can and should trust that the person on the other end of our video …

Building Secure and Engaging Video Communication by Using Monitor Illumination

JM Choi, J Leung, N Frahm… - Proceedings of the …, 2024 - openaccess.thecvf.com
In this paper we develop a neural network that can detect a mismatch between the light
emitted from a monitor and the light reflected from the face of a user sitting in front of a …

Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns

M Zhou, Q Wang, Q Li, W Zhou… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Face authentication usually utilizes deep learning models to verify users with high accuracy.
However, it is vulnerable to various attacks that cheat the models by manipulating the digital …

Sonarguard: Ultrasonic face liveness detection on mobile devices

D Zhang, J Meng, J Zhang, X Deng… - … on Circuits and …, 2023 - ieeexplore.ieee.org
Liveness detection has been widely applied in face authentication systems to combat
malicious attacks. However, existing methods purely depending on visual frames become …

Counterfactual Reward Estimation for Credit Assignment in Multi-agent Deep Reinforcement Learning over Wireless Video Transmission

Y Wenhan, L Qian, TJ Chua… - 2024 IEEE 44th …, 2024 - ieeexplore.ieee.org
This study investigates frame-wise optimization in Mobile Edge Computing (MEC) for video
transmission, emphasizing dynamic adaptation to diverse frame complexities and efficient …

Principles of Designing Robust Remote Face Anti-Spoofing Systems

X Xu, T Zhao, Z Zhang, Z Li, J Wu, A Achille… - arXiv preprint arXiv …, 2024 - arxiv.org
Protecting digital identities of human face from various attack vectors is paramount, and face
anti-spoofing plays a crucial role in this endeavor. Current approaches primarily focus on …

[PDF][PDF] 远程办公系统安全综述

杨泽霖, 王基策, 徐斐, 黄宇航, 艾铭超, 马慧… - Journal of Cyber …, 2022 - jcs.iie.ac.cn
摘要受新型冠状病毒肺炎的影响, 远程办公这种新型办公方式在短时间内迅速发展并被社会广泛
应用, 由此引发的远程办公系统的安全问题显得越发急迫和突出. 目前, 远程办公系统安全的相关 …

[PDF][PDF] Build a Computationally Efficient Strong Defense Against Adversarial Example Attacks.

C Liu, L DiValentin, A Ding, MB Salem - ICISSP, 2024 - scitepress.org
Input transformation techniques have been proposed to defend against adversarial example
attacks in imageclassification systems. However, recent works have shown that, although …

A Novel Face Spoofing Detection Using hand crafted MobileNet

S Zahra, M Khan, K Abid, N Aslam… - VFAST Transactions on …, 2023 - vfast.org
There are several uses for face spoofing detection, including human-robot communication,
business, film, hotel services, and even politics. Despite the adoption of numerous …

[HTML][HTML] Evolution of Attacks on Intelligent Surveillance Systems and Effective Detection Techniques

D Nagothu, N Poredi, Y Chen - Intelligent Video Surveillance-New …, 2022 - intechopen.com
Intelligent surveillance systems play an essential role in modern smart cities to enable
situational awareness. As part of the critical infrastructure, surveillance systems are often …