Vulnerability of Face age Verification to Replay Attacks.
Pavel KorshunovAnjith GeorgeGökhan ÖzbulakSébastien MarcelPublished in: ICASSP (2024)
Keyphrases
- face verification
- security vulnerabilities
- denial of service
- buffer overflow
- dos attacks
- security risks
- java card
- countermeasures
- multimodal biometrics
- person identification
- face images
- facial expressions
- model checking
- human faces
- cryptographic protocols
- watermarking scheme
- recognition algorithm
- malicious attacks
- attack graphs
- security threats
- asynchronous circuits
- facial features
- gender recognition
- face detection