Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks.
Zibo WangAbdul SerwaddaKiran S. BalaganiVir V. PhohaPublished in: BTAS (2012)
Keyphrases
- biometric template
- identity theft
- biometric authentication
- person identification
- countermeasures
- watermarking algorithm
- biometric systems
- biometric data
- biometric recognition
- malicious attacks
- security mechanisms
- pattern recognition
- magnetic field
- biometric identification
- personal identification
- cyber attacks
- human behavior
- cyber defense
- human identification
- behavioral model
- cyber physical
- facial recognition
- user authentication
- information systems
- signature verification
- iris recognition
- watermarking scheme
- traffic analysis
- security threats
- security protocols
- identity verification
- law enforcement
- privacy preserving
- cyber crime
- face recognition