Information Fusion in Biometrics
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
Comparison of Face Verification Results on the XM2VTS Database
ICPR '00 Proceedings of the International Conference on Pattern Recognition - Volume 4
Human Recognition of Familiar and Unfamiliar People in Naturalistic Video
AMFG '03 Proceedings of the IEEE International Workshop on Analysis and Modeling of Faces and Gestures
Face recognition: A literature survey
ACM Computing Surveys (CSUR)
Secure distributed human computation
Proceedings of the 6th ACM conference on Electronic commerce
Overview of the Face Recognition Grand Challenge
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 1 - Volume 01
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Protecting Users Against Phishing Attacks with AntiPhish
COMPSAC '05 Proceedings of the 29th Annual International Computer Software and Applications Conference - Volume 01
Security and Usability
Stronger password authentication using browser extensions
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Audio-visual speech recognition using lip information extracted from side-face images
EURASIP Journal on Audio, Speech, and Music Processing
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Video-based face recognition using adaptive hidden markov models
CVPR'03 Proceedings of the 2003 IEEE computer society conference on Computer vision and pattern recognition
Modeling and preventing phishing attacks
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
An audio-visual imposture scenario by talking face animation
Nonlinear Speech Modeling and Applications
Comparing Human and Automatic Face Recognition Performance
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Face Recognition Algorithms Surpass Humans Matching Faces Over Changes in Illumination
IEEE Transactions on Pattern Analysis and Machine Intelligence
Proceedings of the 2013 workshop on New security paradigms workshop
Hi-index | 0.00 |
Identity fraud (IDF) may be defined informally as exploitation of credential information using some form of impersonation or misrepresentation of identity, in the context of transactions. Thus, IDF may be viewed as a combination of two old problems: user authentication and transaction authorization. We propose an innovative approach to detect IDF attempts, by combining av-certificates (digitally-signed audiovisual recordings in which users identify themselves) with av-signatures (audiovisual recordings showing users' explicit consent for unique transaction details). Av- certificates may be used in on-site transactions, to confirm user identity. In the case of remote (e.g. web-based) transactions, both av-certificates and av-signatures may be used to authenticate users and verify their consent for transaction details. Conventional impersonation attacks, whereby credentials (e.g. passwords, biometrics, or signing keys) are used without the consent of their legitimate users, fail against VideoTicket. The proposed solution assumes that identity thieves have access to such credentials.