Topic
Identity theft
About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.
Papers published on a yearly basis
Papers
More filters
•
01 Jan 2012TL;DR: This thesis addresses digital identity for biometric / face recognition screening and cyberspace security subject to denial and deception characteristic of adversarial behavior and proposes the use of multi-layer data fusion.
Abstract: This thesis addresses digital identity for biometric / face recognition screening and cyberspace security subject to denial and deception characteristic of adversarial behavior. The adversarial aspect concerns defense and offense operations that involve impostors and identity theft. Denial and deception correspond to occlusion and disguise for biometrics, while for cyberspace security they correspond to spoofing and obfuscation. To prevent or mitigate the impacts of adversarial behavior from offensive attacks this thesis proposes the use of multi-layer data fusion. Multi-layer aspect of fusion refers to features, representations, algorithms, decision-making, adversarial aspects and their purposeful combinations. This novelty, feasibility, and utility of our research is illustrated in the physical and cyber worlds: (i) robust face recognition in the presence of occlusion and disguise, and (ii) phishing detection to prevent identity theft through spoofing and obfuscation.
The novel face recognition methodologies include: (i) Adaptive and Robust Correlation Filters (ARCF) built around match filters and recognition-by-parts, and (ii) hybrid anthropometric and appearance based biometric authentication using boosting for feature level fusion and backpropagation learning for decision level fusion. The cluster and strength of the ARCF correlation peaks indicate the confidence in the face authentications. Experimental evidence using the AR benchmark database shows that our methods are highly reliable in the presence of occlusion, disguise, and illumination, expression and temporal variability.
The novel phishing detection methodologies address: (i) phishing email detection using semantic topics and Probabilistic Latent Semantic Analysis (PLSA), boosting, and Co-Training for both labeled and unlabeled examples, (ii) phishing website detection using Latent Dirichlet Allocation (LDA) and boosting, and (iii) impersonated entity discovery using LDA, boosting, and Condition Random Field (CRF). The phishing detection methodology handles the adversarial use of synonyms, polysemy (words with multiple meanings) and other linguistic variations. In addition, the same methodology requires only a small percentage of data to be annotated thus saving time, labor, and avoiding errors incurred during human annotation. The phishing website detection methodology is device and language neutral. The impersonated entity discovery methodology automatically extracts the entity the attacker is trying to spoof. This helps service providers to collaborate with each other to exchange attack information and protect their customers. Experimental results on SPAM Archive, which is one of the largest public corpus, show that our phishing detection methodology outperforms state of the art phishing detection methods.
1 citations
01 Jan 2015
TL;DR: This work introduces one method that does continuous verification of user according to the interaction with mouse and proposes hierarchy of mouse action in which features are extracted.
Abstract: Data security is much more important issue now a day; because hacker’s are much more intelligent. Identity theft is a crime in which hackers does the unauthorized activity. Hackers can steal the identity of user by using credential things such as password, username. User verification technique provide security to the user in terms if their username and password or also by continuously validating the identity of logged-on user and Continuous verification done through users behavioral and physiological characteristics. We introduce one method that does continuous verification of user according to the interaction with mouse. Their search contribution is in three parts. First, user verification is based on result of individual mouse action and the methods which aggregate mouse action. Second we propose hierarchy of mouse action in which features are extracted. Last, we take decision about to continue the log in or log out the logged user.
1 citations
•
TL;DR: The new idea of merging multiple biometric identification technologies has so-called multimodal biometric recognition systems have been introduced that use two or more biometric data characteristics of the individual that can be identified as a real user or not.
Abstract: Cause of a rapid increase in technological development, increasing identity theft, consumer fraud, the threat to personal data is also increasing every day. Methods developed earlier to ensure personal the information from the thefts was not effective and safe. Biometrics were introduced when it was needed technology for more efficient security of personal information. Old-fashioned traditional approaches like Personal identification number( PIN), passwords, keys, login ID can be forgotten, stolen or lost. In biometric authentication system, user may not remember any passwords or carry any keys. As people they recognize each other by the physical appearance and behavioral characteristics that biometric systems use physical characteristics, such as fingerprints, facial recognition, voice recognition, in order to distinguish between the actual user and scammer. In order to increase safety in 2005, biometric identification methods were developed government and business sectors, but today it has reached almost all private sectors as Banking, Finance, home security and protection, healthcare, business security and security etc. Since biometric samples and templates of a biometric system having one biometric character to detect and the user can be replaced and duplicated, the new idea of merging multiple biometric identification technologies has so-called multimodal biometric recognition systems have been introduced that use two or more biometric data characteristics of the individual that can be identified as a real user or not.
1 citations
01 Jan 2013
TL;DR: A structured guide to support the current status of the literature that is based on the anti-phishing mechanism, and a comparative study and analysis of various phishing detection mechanisms.
Abstract: Abstract— Phishing attacks have been a significant threat to the Internet users and business organizations across the globe causing billions of dollars loss. Phishing is a type of internet fraud that uses emails or websites, which is designed to look like from legitimate organizations, to take in users into disclosing their personal or financial information. This information can be used by hostile party for scandalous and criminal purposes, such as identity theft and fraud. The inability of an end user to accurately sense legitimate and fraudulent emails or websites apart results into a successful phishing attack .The current paper focuses on a comparative study and analysis of various phishing detection mechanisms. This survey is a structured guide to support the current status of the literature that is based on the anti-phishing mechanism.
1 citations
••
20 Feb 2015
TL;DR: This research investigates the weak points of SNG through memory manipulation experiments based on the currently provided SNG services and presents counter measures and security enforcements that are light in service load and simplistic which can be applied in the developing process.
Abstract: As the smart phone market is drastically expanding, there is a steady growth of recent vicious activities such as data manipulation, billing fraud, identity theft, and leakage of personal information that are security threats to Social Network Games(SNG). Due to the threats, Strong development standard is required for security enhancement of SNG. Nonetheless, short life-spans, additional expenses, and the necessities to provide a sound game service hinders developers from reaching their security goals. Therefore, this research investigates the weak points of SNG through memory manipulation experiments based on the currently provided SNG services. In addition, the research presents counter measures and security enforcements that are light in service load and simplistic which can be applied in the developing process.Keywords : Social Network Games, Android Game Security, Memory Manipulation Received: Nov. 13, 2014 Revised: Dec. 15, 2014 Accepted: Dec. 29, 2014Corresponding Author: Eun Jin Kim(Kyonggi University)E-mail: ejkim777@kgu.ac.krISSN: 1598-4540 / eISSN: 2287-8211Ⓒ The Korea Game Society. All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.otg/licenses/by-nc/3.0), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
1 citations