• Title/Summary/Keyword: anti-spoofing

Search Result 34, Processing Time 0.023 seconds

Anti-Spoofing Method Using Double Peak Detection in the Two-Dimensional C/A Code Search Space (이차원 C/A 코드 검색 공간에서의 이중피크 검출을 이용한 기만신호 대응 기법)

  • Kwon, Keum-Cheol;Yang, Cheol-Kwan;Shim, Duk-Sun
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.2
    • /
    • pp.157-164
    • /
    • 2013
  • In the presence of spoofing signal the GPS signal having the same PRN with the spoofer is hard to be acquired since the power of spoofing signal is usually stronger than that of GPS signal. If a spoofing signal exists for the same PRN, there are double peaks in two-dimensional space of frequency and code phase in acquisition stage. Using double peak information it is possible to detect spoofing signal and acquire GPS information through separate channel tracking. In this paper we introduce an anti-spoofing method using double peak detection, and thus can acquire GPS navigation data after two-channel tracking for the same PRN as the spoofing signal.

A Novel GNSS Spoofing Detection Technique with Array Antenna-Based Multi-PRN Diversity

  • Lee, Young-Seok;Yeom, Jeong Seon;Noh, Jae Hee;Lee, Sang Jeong;Jung, Bang Chul
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.10 no.3
    • /
    • pp.169-177
    • /
    • 2021
  • In this paper, we propose a novel global navigation satellite system (GNSS) spoofing detection technique through an array antenna-based direction of arrival (DoA) estimation of satellite and spoofer. Specifically, we consider a sophisticated GNSS spoofing attack scenario where the spoofer can accurately mimic the multiple pseudo-random number (PRN) signals since the spoofer has its own GNSS receiver and knows the location of the target receiver in advance. The target GNSS receiver precisely estimates the DoA of all PRN signals using compressed sensing-based orthogonal matching pursuit (OMP) even with a small number of samples, and it performs spoofing detection from the DoA estimation results of all PRN signals. In addition, considering the initial situation of a sophisticated spoofing attack scenario, we designed the algorithm to have high spoofing detection performance regardless of the relative spoofing signal power. Therefore, we do not consider the assumption in which the power of the spoofing signal is about 3 dB greater than that of the authentic signal. Then, we introduce design parameters to get high true detection probability and low false alarm probability in tandem by considering the condition for the presence of signal sources and the proximity of the DoA between authentic signals. Through computer simulations, we compare the DoA estimation performance between the conventional signal direction estimation method and the OMP algorithm in few samples. Finally, we show in the sophisticated spoofing attack scenario that the proposed spoofing detection technique using OMP-based estimated DoA of all PRN signals outperforms the conventional spoofing detection scheme in terms of true detection and false alarm probability.

A Study on Multiple Modalities for Face Anti-Spoofing (얼굴 스푸핑 방지를 위한 다중 양식에 관한 연구)

  • Wu, Chenmou;Lee, Hyo Jong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.651-654
    • /
    • 2021
  • Face anti-spoofing (FAS) techniques play a significant role in the defense of facial recognition systems against spoofing attacks. Existing FAS methods achieve the great performance depending on annotated additional modalities. However, labeling these high-cost modalities need a lot of manpower, device resources and time. In this work, we proposed to use self-transforming modalities instead the annotated modalities. Three different modalities based on frequency domain and temporal domain are applied and analyzed. Intuitive visualization analysis shows the advantages of each modality. Comprehensive experiments in both the CNN-based and transformer-based architecture with various modalities combination demonstrate that self-transforming modalities improve the vanilla network a lot. The codes are available at https://github.com/chenmou0410/FAS-Challenge2021.

Face Anti-Spoofing Based on Combination of Luminance and Chrominance with Convolutional Neural Networks (합성곱 신경망 기반 밝기-색상 정보를 이용한 얼굴 위변조 검출 방법)

  • Kim, Eunseok;Kim, Wonjun
    • Journal of Broadcast Engineering
    • /
    • v.24 no.6
    • /
    • pp.1113-1121
    • /
    • 2019
  • In this paper, we propose the face anti-spoofing method based on combination of luminance and chrominance with convolutional neural networks. The proposed method extracts luminance and chrominance features independently from live and fake faces by using stacked convolutional neural networks and auxiliary networks. Unlike previous methods, an attention module has been adopted to adaptively combine extracted features instead of simply concatenating them. In addition, we propose a new loss function, called the contrast loss, to learn the classifier more efficiently. Specifically, the contrast loss improves the discriminative power of the features by maximizing the distance of the inter-class features while minimizing that of the intra-class features. Experimental results demonstrate that our method achieves the significant improvement for face anti-spoofing compared to existing methods.

A Spoofing Detection Scheme Based on Elevation Masked-Relative Received Power in GPS Receivers using Multi-band Array Antenna

  • Junwoo Jung;Hyunhee Won;Sungyeol Park;Haengik Kang;Seungbok Kwon;Byeongjin Yu;Seungwoo Seo
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.2
    • /
    • pp.101-111
    • /
    • 2023
  • Many spoofing detection studies have been conducted to cope with the most difficult types of deception among various disturbances of GPS, such as jamming, spoofing, and meaconing. In this paper, we propose a spoofing detection scheme based on elevation masked-relative received power between GPS L1 and L2 signals in a system using a multi-band array antenna. The proposed scheme focuses on enabling spoofing to be normally detected and minimizes the possibility of false detection in an environment where false alarms may occur due to pattern distortion among elements of an array antenna. The pattern distortion weakens the GPS signal strength at low elevation. It becomes confusing to detect a spoofing signal based on the relative power difference between GPS L1 and L2, especially when GPS L2 has weak signal strength. We propose design parameters for the relative power threshold including beamforming gain, the minimum received power difference between L1 and L2, and the patch antenna gain difference between L1 and L2. In addition, in order to eliminate the weak signal strength of GPS L2 in the spoofing detection process, we propose a rotation matrix that sets the elevation mask based on platform coordinates. Array antennas generally do not have high usefulness in commercial areas where receivers are operated alone, but are considered essential in military areas where GPS receivers are used together with signal processing for beamforming in the direction of GPS satellites. Through laboratory and live sky tests using the device under test, the proposed scheme with an elevation mask detects spoofing signals well and reduces the probability of false detection relative to that without the elevation mask.

Simulation of GNSS Spoofing Detection Method Using Encrypted Ranging Signal (암호화 신호원을 이용한 위성항법 기만 검출기법 모의)

  • So, Hyoungmin
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.5
    • /
    • pp.394-400
    • /
    • 2016
  • It is well known that the encrypted ranging signal, such as GPS P(Y) code, is immune to spoofing attack. However, in order for users to use the signal, there needs permission from the operator. And also there are many restrictions for use because of security issues. In this paper, a ground reference station equipped with high-gain directional antenna and a user receiver were simulated. In the reference station, the encrypted code can be demodulated from the high-gain signal. And then the code can be used to detect spoofing attack in the user receiver. This paper proposes the spoofing detection method using the encrypted signal and deals with simulation results.

Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor

  • Ali, Zahid;Park, Unsang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.892-911
    • /
    • 2019
  • Biometric recognition systems have been widely used for information security. Among the most popular biometric traits, there are fingerprint and face due to their high recognition accuracies. However, the security system that uses face recognition as the login method are vulnerable to face-spoofing attacks, from using printed photo or video of the valid user. In this study, we propose a fast and robust method to detect face-spoofing attacks based on the analysis of spatial frequency differences between the real and fake videos. We found that the effect of a spoofing attack stands out more prominently in certain regions of the 2D Fourier spectra and, therefore, it is adequate to use the information about those regions to classify the input video or image as real or fake. We adopt a divide-conquer-aggregate approach, where we first divide the frequency domain image into local blocks, classify each local block independently, and then aggregate all the classification results by the weighted-sum approach. The effectiveness of the methodology is demonstrated using two different publicly available databases, namely: 1) Replay Attack Database and 2) CASIA-Face Anti-Spoofing Database. Experimental results show that the proposed method provides state-of-the-art performance by processing fewer frames of each video.

Ranging Performance for Spoofer Localization using Receiver Clock Offset

  • Lee, Byung-Hyun;Seo, Seong-Hun;Jee, Gyu-In;Yeom, Dong-Jin
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.5 no.3
    • /
    • pp.137-144
    • /
    • 2016
  • In this paper, the performance of ranging measurement, which is generated using two receiver clock offsets in one receiver, was analyzed. A spoofer transmits a counterfeited spoofing signal which is similar to the GPS signal with hostile purposes, so the same tracking technique can be applied to the spoofing signal. The multi-correlator can generate two receiver clock offsets in one receiver. The difference between these two clock offsets consists of the path length from the spoofer to the receiver and the delay of spoofer system. Thus, in this paper, the ranging measurement was evaluated by the spoofer localization performance based on the time-of-arrival (TOA) technique. The results of simulation and real-world experiments show that the position and the system clock offset of the spoofer could be estimated successfully.

Anti-Drone System using GPS-Spoofing (GPS-Spoofing을 이용한 Anti-Drone)

  • Kwon, Jun-Woo;Oh, Hyeong-Seok;Seo, Seung-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.338-341
    • /
    • 2020
  • 최근 무인이동체 기술과 IoT(사물인터넷)의 발전에 따라 드론에 대한 관심과 사용이 꾸준히 증가하고 있다. 드론은 취미용으로 사람들에게 재미를 주는 것에서 나아가 긴급서비스, 조기정보, 모니터링 등 이용되는 분야가 다양하고 사람들의 편의에 맞게 분야와 활용목적이 점점 늘어나고 있는 추세이다. 하지만 이에 따라 불법몰카나 드론을 사용한 테러 등 악의적으로 드론을 악용하는 사례 역시 빈번하게 발생하고 있다. 이를 예방하고 사전에 차단하기 위하여 본 논문에서는 주파수 송수신기인 Hack-RF One과 라즈베리파이, 안테나를 활용하여 Anti-Drone 시스템 프로토타입을 구현하였다.

Susceptibility of Spoofing On A GPS L1 C/A Signal Tracking Loop (GPS L1 C/A 신호추적루프에서의 기만에 의한 영향)

  • Im, Sung-Hyuck;Im, Jun-Hyuck;Song, Jong-Hwa;Baek, Seung-Woock;Lee, In-Won;Lee, Dae-Yearl;Jee, Gyu-In
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.32-38
    • /
    • 2011
  • In this paper, code and carrier tracking error which resulted from spoofing signal was analyzed by simulation. For a start, the types of spoofing signals and methods were classified. For the simulation, search spoofing method is assumed because a perfect position and velocity are not generally informed to spoofing device. In most cases, the tracking error is increased but a complete deception does not happen because of the inherent anti-spoofing characteristics of the GPS signal.