Welcome to Antispoofing Wiki,
The Free Encyclopedia That Anyone Can Edit
Liveness Biometric Recent Articles
Danger of Fake Text News and Social Bots in Social Media Fake news has been considered a tangible threat since at least 2016, when the US presidential elections were affected by fake tweets, news articles, and blog posts coming from both inside and outside the country. Now, false information on social media is known to
8 min read
8 min read
What Are AI Worms A GenAI worm is a piece of malicious software that is tailor-made to target Generative AI. The term draws inspiration from the computer worms that first appeared in the 1980s, even though the idea dates back to when John von Neumann indirectly predicted this concept in 1949. GenAI worms focus on
8 min read
8 min read
Deepfake Forensics: Definition and Overview Deepfake forensics is a subset of digital forensics — a group of techniques and approaches to detect falsified content, especially content used for legal purposes. These methods have been in development since at least 2005, when researcher Hany Farid suggested using color filter array artifacts left by digital cameras to
8 min read
8 min read
Antispoofing — The Key to Safety in Digital and Real Worlds
Antispoofing is an amalgam of machine learning, anatomical studies, and behavioral psychology, which solves one essential issue: keeping people’s assets and private information safe in the era when biometric data can easily be peeped and replicated.
Our encyclopedia is dedicated to the Liveness detection, Spoofing attacks and Antispoofing measures. Spoofing is a set of malicious techniques, which allow an attacker to pose as someone else, fabricate liveness cues, or synthesize a completely falsified, non-existent person from scratch to gain access to sensitive data, target’s money, device or vehicle control, and so on. Spoofing attacks have become an especially common practice since the advent of mobile technology. Internet of Things, face recognition and other systems are also quite vulnerable in the light of this threat.Our goal is to select, review and propose the most effective and promising remedies against liveness spoofing.
Spoofing attack is a malicious practice, in which a biometric trait of a real, living person — voice, fingerprint, face, or even heart rate — is replicated to fool a biometrics-based security system.
Understanding Digital Watermarking Digital watermarking is a technique to protect authenticity of digital media: pictures, video, audio, as well as mixed media. The concept’s main idea is to insert a specific hidden signature into the media — such as a news footage — that is invisible to the viewer, yet identifiable by a system. The
7 min read
7 min read
Definition and Problem Overview As new applications for AI continue to expand, so does the concern over its potentially questionable — or even dangerous — applications. AI Ethics is a new field in the area of Artificial Intelligence which addresses these moral issues raised by AI innovations. While AI adds to the toolkit of malicious
Definition and Problem Overview Even though advanced Artificial Intelligence (AI) has been known to the broader public since at least 2017, the need for its legal control has been realized just recently, leading to a concept of Ethical AI. It asserts that successful AI legal regulation has five elements: AI has been acknowledged as a
The Criminal Methods
Together with that, professional culprits will adopt more sophisticated methods to bypass an antispoofing system. There’s a rich cornucopia of tactics, tools, and tricks to emulate liveness. A motivated fraudster is ready to invest months in social engineering, collecting training data to produce a high-quality deepfake, attempting reverse engineering or trying out novel attack methods.
These techniques at times show immense creativity. For example, liveness mimicry can be achieved with simple and easy-to-obtain components:
- 1Playdough.
- 2Body paint.
- 3Gelatin-based candy.
- 4Glue and construction paper.
- 5Many other widespread items.
Even though being cheap to produce, they sometimes succeed at bypassing even advanced security systems.
In a more challenging scenario, fraudsters basically resort to extreme solutions. These can include applying advanced movie-level makeup, producing highly realistic 3D masks that emulate body heat, severing a deceased person’s finger/extracting an eye, and even undergoing a plastic surgery.
Replay attacks are a type of Presentation Attacks (PAs), in which stolen media files are replayed from a portable device to fool a biometric authentication system. Attack tools include data, which belongs to a legitimate user and retains liveness of their voice, but is captured and used
9 min read
9 min read
In face liveness classification, obfuscation is a malevolent technique, which allows concealing a culprit’s true identity from a biometric recognition system based on both passive or active liveness detection. In essence, obfuscation is somewhat close to Presentation Attacks (PAs)
8 min read
8 min read
Importance of tackling fake media
Fake media detection is also an essential part of antispoofing. If not properly addressed and timely prevented, it can result in disastrous consequences: social instability, public opinion manipulation, defamation, etc. Plus, sociology experts indicate two negative phenomena induced by the rise of fake media: liar’s dividend and reality apathy.
Antispoofing techniques and liveness detection solutions are designed with all of these threats in mind. They encompass a wide range of concepts, ideas and visions. Voice, retina, iris, fingerprint, and facial recognition employ liveness parameters to tell a real person from a perpetrator, which is the main goal of antispoofing as such.
The antispoof checking analyzes the input data. Among which are
They help spot fake body parts, facial alterations, replay attacks and synthesized audiovisuals. Detecting them is the main goal of antispoofing as such.
In our articles, we discuss the most successful methods and the best antispoofing tools, as well as liveness detection techniques. We also focus on the international antispoofing and liveness standards, attack types and their classification, terminology, and other aspects of the matter. To validate the data presented, we quote scientific publications, as well as popular media, and news dedicated to liveness security and antispoofing.