Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security 2022
DOI: 10.1145/3560830.3563722
|View full text |Cite
|
Sign up to set email alerts
|

Video is All You Need

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…One example is the use of stealthy recording of PPG signals from non-genuine measurement sites (also known as presentation attacks) to deceive PPG-based authentication systems [12]. Another approach is to remotely steal PPG signals from video recordings of the victim, known as remote PPG (rPPG), which can be used to breach the authentication system [13].…”
Section: Introductionmentioning
confidence: 99%
“…One example is the use of stealthy recording of PPG signals from non-genuine measurement sites (also known as presentation attacks) to deceive PPG-based authentication systems [12]. Another approach is to remotely steal PPG signals from video recordings of the victim, known as remote PPG (rPPG), which can be used to breach the authentication system [13].…”
Section: Introductionmentioning
confidence: 99%
“…One example is the use of stealthy recording of PPG signals from non-genuine measurement sites (also known as presentation attacks) to deceive PPG-based authentication systems [12]. Another approach is to remotely steal PPG signals from video recordings of the victim, known as remote PPG (rPPG), which can be used to breach the authentication system [13].…”
Section: Introductionmentioning
confidence: 99%