DETECTION OF SPOOFING ATTACKS FOR VIDEO-BASED AUTHENTICATION
First Claim
Patent Images
1. A method to perform video-based authentication, the method comprising:
- determining, with a processor, whether a sequence of input images provided to perform video-based authentication of a subject exhibits a first region having fluctuating pixel values; and
determining, with the processor, that the sequence of input images is associated with a spoofing attack in response to determining that the sequence of input images exhibits the first region having fluctuating pixel values.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatus, systems and articles of manufacture detect spoofing attacks for video-based authentication are disclosed. Disclosed example method to perform video-based authentication include determining whether a sequence of input images provided to perform video-based authentication of a subject exhibits a first region having fluctuating pixel values. Such example methods also include determining that the sequence of input images is associated with a spoofing attack in response to determining that the sequence of input images exhibits the first region having fluctuating pixel values.
-
Citations
25 Claims
-
1. A method to perform video-based authentication, the method comprising:
-
determining, with a processor, whether a sequence of input images provided to perform video-based authentication of a subject exhibits a first region having fluctuating pixel values; and determining, with the processor, that the sequence of input images is associated with a spoofing attack in response to determining that the sequence of input images exhibits the first region having fluctuating pixel values. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A tangible machine readable storage medium comprising machine readable instructions which, when executed, cause a machine to at least:
-
determine whether a sequence of input images provided to perform video-based authentication of a subject exhibits a first region having fluctuating pixel values; and determine that the sequence of input images is associated with a spoofing attack in response to determining that the sequence of input images exhibits the first region having fluctuating pixel values. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An apparatus to perform video-based authentication, the apparatus comprising:
-
a fluctuating pixel detector to determine whether a sequence of input images provided to perform video-based authentication of a subject exhibits a first region having fluctuating pixel values; and a video sequence validator to determine that the sequence of input images is associated with a spoofing attack in response to determining that the sequence of input images exhibits the first region having fluctuating pixel values. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. An system to perform video-based authentication, the system comprising:
-
means for determining whether a sequence of input images provided to perform video-based authentication of a subject exhibits a first region having fluctuating pixel values; and means for determining that the sequence of input images is associated with a spoofing attack in response to determining that the sequence of input images exhibits the first region having fluctuating pixel values. - View Dependent Claims (23, 24, 25)
-
Specification