Detection of spoofing attacks for video-based authentication
First Claim
Patent Images
1. A method to perform video-based authentication, the method comprising:
- determining, by executing an instruction with a processor, whether a sequence of input images provided to perform video-based authentication of a subject exhibits a first region having pixel values that fluctuate across successive ones of at least some of the images in the sequence; and
determining, by executing an instruction with the processor, that the sequence of input images is associated with a spoofing attack in response to determining that the sequence of input images exhibits the first region having pixel values that fluctuate.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatus, systems and articles of manufacture detect spoofing attacks for video-based authentication are disclosed. Disclosed example method to perform video-based authentication include determining whether a sequence of input images provided to perform video-based authentication of a subject exhibits a first region having fluctuating pixel values. Such example methods also include determining that the sequence of input images is associated with a spoofing attack in response to determining that the sequence of input images exhibits the first region having fluctuating pixel values.
15 Citations
25 Claims
-
1. A method to perform video-based authentication, the method comprising:
-
determining, by executing an instruction with a processor, whether a sequence of input images provided to perform video-based authentication of a subject exhibits a first region having pixel values that fluctuate across successive ones of at least some of the images in the sequence; and determining, by executing an instruction with the processor, that the sequence of input images is associated with a spoofing attack in response to determining that the sequence of input images exhibits the first region having pixel values that fluctuate. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A tangible machine readable storage medium comprising machine readable instructions which, when executed, cause a machine to at least:
-
determine whether a sequence of input images provided to perform video-based authentication of a subject exhibits a first region having pixel values that fluctuate across successive ones of at least some of the images in the sequence; and determine that the sequence of input images is associated with a spoofing attack in response to determining that the sequence of input images exhibits the first region having pixel values that fluctuate. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An apparatus to perform video-based authentication, the apparatus comprising:
-
a fluctuating pixel detector to determine whether a sequence of input images provided to perform video-based authentication of a subject exhibits a first region having pixel values that fluctuate across successive ones of at least some of the images in the sequence; and a video sequence validator to determine that the sequence of input images is associated with a spoofing attack in response to determining that the sequence of input images exhibits the first region having pixel values that fluctuate. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A system to perform video-based authentication, the system comprising:
-
means for determining whether a sequence of input images provided to perform video-based authentication of a subject exhibits a first region having pixel values that fluctuate across successive ones of at least some of the images in the sequence; and means for determining that the sequence of input images is associated with a spoofing attack in response to determining that the sequence of input images exhibits the first region having pixel values that fluctuate. - View Dependent Claims (23, 24, 25)
-
Specification