The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can le...The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication.展开更多
Face anti-spoofing is a relatively important part of the face recognition system,which has great significance for financial payment and access control systems.Aiming at the problems of unstable face alignment,complex ...Face anti-spoofing is a relatively important part of the face recognition system,which has great significance for financial payment and access control systems.Aiming at the problems of unstable face alignment,complex lighting,and complex structure of face anti-spoofing detection network,a novel method is presented using a combination of convolutional neural network and brightness equalization.Firstly,multi-task convolutional neural network(MTCNN)based on the cascade of three convolutional neural networks(CNNs),P-net,R-net,and O-net are used to achieve accurate positioning of the face,and the detected face bounding box is cropped by a specified multiple,then brightness equalization is adopted to perform brightness compensation on different brightness areas of the face image.Finally,data features are extracted and classification is given by utilizing a 12-layer convolution neural network.Experiments of the proposed algorithm were carried out on CASIA-FASD.The results show that the classification accuracy is relatively high,and the half total error rate(HTER)reaches 1.02%.展开更多
The development of artificial intelligence makes the application of face recognition more and more extensive,which also leads to the security of face recognition technology increasingly prominent.How to design a face ...The development of artificial intelligence makes the application of face recognition more and more extensive,which also leads to the security of face recognition technology increasingly prominent.How to design a face anti-spoofing method with high accuracy,strong generalization ability and meeting practical needs is the focus of current research.This paper introduces the research progress of face anti-spoofing algorithm,and divides the existing face anti-spoofing methods into two categories:methods based on manual feature expression and methods based on deep learning.Then,the typical algorithms included in them are classified twice,and the basic ideas,advantages and disadvantages of these algorithms are analyzed.Finally,the methods of face anti-spoofing are summarized,and the existing problems and future prospects are expounded.展开更多
Along with the rapid development of biometric authentication technology,face recognition has been commercially used in many industries in recent years.However,it cannot be ignored that face recognition-based authentic...Along with the rapid development of biometric authentication technology,face recognition has been commercially used in many industries in recent years.However,it cannot be ignored that face recognition-based authentication techniques can be easily spoofed using various types of attacks such photographs,videos or forged 3D masks.In order to solve this problem,this work proposed a face anti-fraud algorithm based on the fusion of thermal infrared images and visible light images.The normal temperature distribution of the human face is stable and characteristic,and the important physiological information of the human body can be observed by the infrared thermal images.Therefore,based on the thermal infrared image,the pixel value of the pulse sensitive area of the human face is collected,and the human heart rate signal is detected to distinguish between real faces and spoofing faces.In order to better obtain the texture features of the face,an image fusion algorithm based on DTCWT and the improved Roberts algorithm is proposed.Firstly,DTCWT is used to decompose the thermal infrared image and visible light image of the face to obtain high-and low-frequency subbands.Then,the method based on region energy and the improved Roberts algorithm are then used to fuse the coefficients of the high-and low-frequency subbands.Finally,the DTCWT inverse transform is used to obtain the fused image containing the facial texture features.Face recognition is carried out on the fused image to realize identity authentication.Experimental results show that this algorithm can effectively resist attacks from photos,videos or masks.Compared with the use of visible light images alone for face recognition,this algorithm has higher recognition accuracy and better robustness.展开更多
Anti-spoofing is becoming a crucial technique for applications with high navigation accuracy and reliability requirements.Anti-spoofing technique based on Receiver Autonomous Integrity Monitoring(RAIM)is a good choice...Anti-spoofing is becoming a crucial technique for applications with high navigation accuracy and reliability requirements.Anti-spoofing technique based on Receiver Autonomous Integrity Monitoring(RAIM)is a good choice for most Global Navigation Satellite System(GNSS)receivers because it does not require any change to the hardware of the receiver.However,the conventional RAIM method can only detect and mitigate a single spoofing signal.Some improved RAIM methods can deal with more spoofing signals,but the computational complexity increases dramatically when the number of satellites in view increase or need additional information.This paper proposes a new RAIM method,called the SRV-RAIM method,which has a very low computation complexity regardless of the number of satellites in view and can deal with any number of spoofing signals.The key to the new method is the spatial distribution characteristic of the Satellites'Residual Vectors(SRV).In replay or generative spoofing scenarios,the pseudorange measurements of spoofing signals are consistent,the residual vectors of real satellites and those of spoofing satellites have good separation characteristics in spatial distribution.Based on this characteristic,the SRV-RAIM method is proposed,and the simulation results show that the method can separate the real signals and the spoofing signals with an average probability of 86.55%in the case of 12 visible satellites,regardless of the number of spoofing signals.Compared to the conventional traversal-RAIM method,the performance is only reduced by 3.59%,but the computational cost is reduced by 98.3%,so most of the GNSS receivers can run the SRV-RAIM algorithm in time.展开更多
Face anti-spoofing aims at detecting whether the input is a real photo of a user(living)or a fake(spoofing)image.As new types of attacks keep emerging,the detection of unknown attacks,known as Zero-Shot Face Anti-Spoo...Face anti-spoofing aims at detecting whether the input is a real photo of a user(living)or a fake(spoofing)image.As new types of attacks keep emerging,the detection of unknown attacks,known as Zero-Shot Face Anti-Spoofing(ZSFA),has become increasingly important in both academia and industry.Existing ZSFA methods mainly focus on extracting discriminative features between spoofing and living faces.However,the nature of the spoofing faces is to trick anti-spoofing systems by mimicking the livings,therefore the deceptive features between the known attacks and the livings,which have been ignored by existing ZSFA methods,are essential to comprehensively represent the livings.Therefore,existing ZSFA models are incapable of learning the complete representations of living faces and thus fall short of effectively detecting newly emerged attacks.To tackle this problem,we propose an innovative method that effectively captures both the deceptive and discriminative features distinguishing between genuine and spoofing faces.Our method consists of two main components:a two-against-all training strategy and a semantic autoencoder.The two-against-all training strategy is employed to separate deceptive and discriminative features.To address the subsequent invalidation issue of categorical functions and the dominance disequilibrium issue among different dimensions of features after importing deceptive features,we introduce a modified semantic autoencoder.This autoencoder is designed to map all extracted features to a semantic space,thereby achieving a balance in the dominance of each feature dimension.We combine our method with the feature extraction model ResNet50,and experimental results show that the trained ResNet50 model simultaneously achieves a feasible detection of unknown attacks and comparably accurate detection of known spoofing.Experimental results confirm the superiority and effectiveness of our proposed method in identifying the living with the interference of both known and unknown spoofing types.展开更多
The BeiDou system(BDS)plays a significant role in people’s lives,but its security is easily affected by spoofing attacks.The radio determination satellite service(RDSS)is a special service of BDS that provides two-wa...The BeiDou system(BDS)plays a significant role in people’s lives,but its security is easily affected by spoofing attacks.The radio determination satellite service(RDSS)is a special service of BDS that provides two-way communication,positioning,and timing services independently of the traditional radio navigation satellite service(RNSS).It can additionally be combined with RNSS to provide a comprehensive RDSS(CRDSS)service.In RDSS,after receiving a signal from the master station,the user needs to send a response signal back to the master station through a satellite.Therefore,the RDSS signal is difficult to spoof.In this study,based on the security feature of RDSS signals,an anti-spoofing method based on CRDSS is proposed to detect and mitigate spoofing attacks,verifying the advantages of the BeiDou system over other satellite navigation systems.展开更多
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)。
文摘The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication.
基金Project(61671204)supported by National Natural Science Foundation of ChinaProject(2016WK2001)supported by Hunan Provincial Key R&D Plan,China。
文摘Face anti-spoofing is a relatively important part of the face recognition system,which has great significance for financial payment and access control systems.Aiming at the problems of unstable face alignment,complex lighting,and complex structure of face anti-spoofing detection network,a novel method is presented using a combination of convolutional neural network and brightness equalization.Firstly,multi-task convolutional neural network(MTCNN)based on the cascade of three convolutional neural networks(CNNs),P-net,R-net,and O-net are used to achieve accurate positioning of the face,and the detected face bounding box is cropped by a specified multiple,then brightness equalization is adopted to perform brightness compensation on different brightness areas of the face image.Finally,data features are extracted and classification is given by utilizing a 12-layer convolution neural network.Experiments of the proposed algorithm were carried out on CASIA-FASD.The results show that the classification accuracy is relatively high,and the half total error rate(HTER)reaches 1.02%.
基金supported by National Natural Science Foundation of China(62072250).
文摘The development of artificial intelligence makes the application of face recognition more and more extensive,which also leads to the security of face recognition technology increasingly prominent.How to design a face anti-spoofing method with high accuracy,strong generalization ability and meeting practical needs is the focus of current research.This paper introduces the research progress of face anti-spoofing algorithm,and divides the existing face anti-spoofing methods into two categories:methods based on manual feature expression and methods based on deep learning.Then,the typical algorithms included in them are classified twice,and the basic ideas,advantages and disadvantages of these algorithms are analyzed.Finally,the methods of face anti-spoofing are summarized,and the existing problems and future prospects are expounded.
基金This research was funded by the Hebei Science and Technology Support Program Project(Grant No.19273703D)the Hebei Higher Education Science and Technology Research Project(Grant No.ZD2020318).
文摘Along with the rapid development of biometric authentication technology,face recognition has been commercially used in many industries in recent years.However,it cannot be ignored that face recognition-based authentication techniques can be easily spoofed using various types of attacks such photographs,videos or forged 3D masks.In order to solve this problem,this work proposed a face anti-fraud algorithm based on the fusion of thermal infrared images and visible light images.The normal temperature distribution of the human face is stable and characteristic,and the important physiological information of the human body can be observed by the infrared thermal images.Therefore,based on the thermal infrared image,the pixel value of the pulse sensitive area of the human face is collected,and the human heart rate signal is detected to distinguish between real faces and spoofing faces.In order to better obtain the texture features of the face,an image fusion algorithm based on DTCWT and the improved Roberts algorithm is proposed.Firstly,DTCWT is used to decompose the thermal infrared image and visible light image of the face to obtain high-and low-frequency subbands.Then,the method based on region energy and the improved Roberts algorithm are then used to fuse the coefficients of the high-and low-frequency subbands.Finally,the DTCWT inverse transform is used to obtain the fused image containing the facial texture features.Face recognition is carried out on the fused image to realize identity authentication.Experimental results show that this algorithm can effectively resist attacks from photos,videos or masks.Compared with the use of visible light images alone for face recognition,this algorithm has higher recognition accuracy and better robustness.
基金supported by the National Key R&D Program of China(No.2021YFA0716603).
文摘Anti-spoofing is becoming a crucial technique for applications with high navigation accuracy and reliability requirements.Anti-spoofing technique based on Receiver Autonomous Integrity Monitoring(RAIM)is a good choice for most Global Navigation Satellite System(GNSS)receivers because it does not require any change to the hardware of the receiver.However,the conventional RAIM method can only detect and mitigate a single spoofing signal.Some improved RAIM methods can deal with more spoofing signals,but the computational complexity increases dramatically when the number of satellites in view increase or need additional information.This paper proposes a new RAIM method,called the SRV-RAIM method,which has a very low computation complexity regardless of the number of satellites in view and can deal with any number of spoofing signals.The key to the new method is the spatial distribution characteristic of the Satellites'Residual Vectors(SRV).In replay or generative spoofing scenarios,the pseudorange measurements of spoofing signals are consistent,the residual vectors of real satellites and those of spoofing satellites have good separation characteristics in spatial distribution.Based on this characteristic,the SRV-RAIM method is proposed,and the simulation results show that the method can separate the real signals and the spoofing signals with an average probability of 86.55%in the case of 12 visible satellites,regardless of the number of spoofing signals.Compared to the conventional traversal-RAIM method,the performance is only reduced by 3.59%,but the computational cost is reduced by 98.3%,so most of the GNSS receivers can run the SRV-RAIM algorithm in time.
基金supported by the National Natural Science Foundation of China under Grant Nos.62072427 and 12227901the Project of Stable Support for Youth Team in Basic Research Field of Chinese Academy of Sciences under Grant No.YSBR-005the Academic Leaders Cultivation Program of University of Science and Technology of China.
文摘Face anti-spoofing aims at detecting whether the input is a real photo of a user(living)or a fake(spoofing)image.As new types of attacks keep emerging,the detection of unknown attacks,known as Zero-Shot Face Anti-Spoofing(ZSFA),has become increasingly important in both academia and industry.Existing ZSFA methods mainly focus on extracting discriminative features between spoofing and living faces.However,the nature of the spoofing faces is to trick anti-spoofing systems by mimicking the livings,therefore the deceptive features between the known attacks and the livings,which have been ignored by existing ZSFA methods,are essential to comprehensively represent the livings.Therefore,existing ZSFA models are incapable of learning the complete representations of living faces and thus fall short of effectively detecting newly emerged attacks.To tackle this problem,we propose an innovative method that effectively captures both the deceptive and discriminative features distinguishing between genuine and spoofing faces.Our method consists of two main components:a two-against-all training strategy and a semantic autoencoder.The two-against-all training strategy is employed to separate deceptive and discriminative features.To address the subsequent invalidation issue of categorical functions and the dominance disequilibrium issue among different dimensions of features after importing deceptive features,we introduce a modified semantic autoencoder.This autoencoder is designed to map all extracted features to a semantic space,thereby achieving a balance in the dominance of each feature dimension.We combine our method with the feature extraction model ResNet50,and experimental results show that the trained ResNet50 model simultaneously achieves a feasible detection of unknown attacks and comparably accurate detection of known spoofing.Experimental results confirm the superiority and effectiveness of our proposed method in identifying the living with the interference of both known and unknown spoofing types.
文摘The BeiDou system(BDS)plays a significant role in people’s lives,but its security is easily affected by spoofing attacks.The radio determination satellite service(RDSS)is a special service of BDS that provides two-way communication,positioning,and timing services independently of the traditional radio navigation satellite service(RNSS).It can additionally be combined with RNSS to provide a comprehensive RDSS(CRDSS)service.In RDSS,after receiving a signal from the master station,the user needs to send a response signal back to the master station through a satellite.Therefore,the RDSS signal is difficult to spoof.In this study,based on the security feature of RDSS signals,an anti-spoofing method based on CRDSS is proposed to detect and mitigate spoofing attacks,verifying the advantages of the BeiDou system over other satellite navigation systems.