Essays about: "Presentation Attacks"
Showing result 1 - 5 of 7 essays containing the words Presentation Attacks.
-
1. The Portrayal of Incel Violence : A Thematical Comparative Case Study of US and Swedish Media’s Presentation on Incel Attacks
University essay from Malmö universitet/Institutionen för globala politiska studier (GPS)Abstract : The research conducted in this thesis will focus on incels’ violence, the media coverage of it, and incels’ debatable connection to extremism. Using a comparative case study on incel violence enables an examination of how media presents the coverage, identifying similarities, differences, and patterns from a transnational perspective by analyzing news articles from two selected newspapers in the US and two newspapers from Sweden over a specific period. READ MORE
-
2. Identifying anti-forensics : Attacks on the digital forensic process
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The area of digital forensics might be old but the idea that criminals or other organisations are actively working to hide their steps is somewhat new. Roughly a year ago, a company announced that they can actively exploit security flaws in a popular digital forensics suite, thus raising questions of validity of evidence submitted to court. READ MORE
-
3. Investigation on how presentation attack detection can be used to increase security for face recognition as biometric identification : Improvements on traditional locking system
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : Biometric identification has already been applied to society today, as today’s mobile phones use fingerprints and other methods like iris and the face itself. With growth for technologies like computer vision, the Internet of Things, Artificial Intelligence, The use of face recognition as a biometric identification on ordinary doors has become increasingly common. READ MORE
-
4. Biometric Authentication and Penetration of Smartphones
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric security. READ MORE
-
5. SIP Security Threats and Countermeasures
University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)Abstract : With the emergence of multimedia applications and the upcoming age of Voice over IP (VoIP), Voice setup and resources control protocols such as SIP and H.323 over the Internet are becoming increasingly attractive applications. READ MORE