Spoofing and anti-spoofing measures

SAC Schuckers - Information Security technical report, 2002 - Elsevier
… authentication devices can be susceptible to spoof attacks, different anti-spoofing techniques
… Anti-spoofing methods include addition of supervision, password, smart card, enrollment of …

Spoof detection schemes

KA Nixon, V Aimale, RK Rowe - Handbook of biometrics, 2008 - Springer
… and condition (enroll or verify, image from microscope or from an iris sensor), acceptance …
100% under certain conditions. Another method used to successfully spoof some iris sensors …

An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol

SR Arashloo, J Kittler, W Christmas - IEEE access, 2017 - ieeexplore.ieee.org
… The new evaluation protocol better reflects the realistic conditions in spoofing attempts …
The common approach to detecting spoofing attacks is to collect both real and fake data (spoofing

GNSS spoofing and detection

ML Psiaki, TE Humphreys - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
… ’s detection system. As will be discussed in Section III, certain spoofing detection methods
… This is the situation shown in the bottom panel of Fig. 1. Note that the horizontal axes in all …

Face spoof detection with image distortion analysis

D Wen, H Han, AK Jain - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
… to new imaging conditions and environments. In this paper, we study the cross-database
face spoof detection problem and propose a face spoof detection approach based on Image …

Detecting spoofing attacks in mobile wireless environments

J Yang, Y Chen, W Trappe - … on Sensor, Mesh and Ad Hoc …, 2009 - ieeexplore.ieee.org
… attack or one physical node under a normal situation, we develop the ALignment Prediction
(ALP) algorithm that makes use of the temporal constraints inherited from the RSS readings …

The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithms

B Tan, A Lewicke, D Yambay… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
… In other words, the current algorithms work well on the spoof attacks … spoofing techniques.
To improve robustness of our liveness detection algorithm to spoofing attacks, the new spoof

A survey of spoofing and counter‐measures

C Günther - NAVIGATION: Journal of the Institute of Navigation, 2014 - Wiley Online Library
… navigation made spoofing unlikely. Thus it was not publicly discussed. The situation changed
… In this section we will develop options for detecting the presence of a spoofing signal. This …

Detecting ARP spoofing: An active technique

V Ramachandran, S Nandi - … , ICISS 2005, Kolkata, India, December 19-21 …, 2005 - Springer
… In a situation where the ARP spoofing began before the … To overcome problems in
earlier techniques, we present a new ARP spoofing detection technique. Our …

Signal quality monitoring applied to spoofing detection

M Pini, M Fantino, A Cavaleri, S Ugazio… - Proceedings of the 24th …, 2011 - ion.org
spoofing detectors have been proposed for civilian GPS receivers. Starting from signal quality
monitoring techniques applied to multipath detection… the detection of intermediate spoofing