A survey on antispoofing schemes for fingerprint recognition systems

E Marasco, A Ross - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …

Presentation attack detection methods for fingerprint recognition systems: a survey

C Sousedik, C Busch - Iet Biometrics, 2014 - Wiley Online Library
Nowadays, fingerprint biometrics is widely used in various applications, varying from
forensic investigations and migration control to access control as regards security sensitive …

Eardynamic: An ear canal deformation based continuous user authentication using in-ear wearables

Z Wang, S Tan, L Zhang, Y Ren, Z Wang… - Proceedings of the ACM …, 2021 - dl.acm.org
Biometric-based authentication is gaining increasing attention for wearables and mobile
applications. Meanwhile, the growing adoption of sensors in wearables also provides …

Toothsonic: Earable authentication via acoustic toothprint

Z Wang, Y Ren, Y Chen, J Yang - Proceedings of the ACM on Interactive …, 2022 - dl.acm.org
Earables (ear wearables) are rapidly emerging as a new platform encompassing a diverse
range of personal applications. The traditional authentication methods hence become less …

A novel weber local binary descriptor for fingerprint liveness detection

Z Xia, C Yuan, R Lv, X Sun, NN Xiong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In recent years, fingerprint authentication systems have been extensively deployed in
various applications, including attendance systems, authentications on smartphones, mobile …

Client-specific anomaly detection for face presentation attack detection

S Fatemifar, SR Arashloo, M Awais, J Kittler - Pattern Recognition, 2021 - Elsevier
One-class anomaly detection approaches are particularly appealing for use in face
presentation attack detection (PAD), especially in an unseen attack scenario, where the …

Open set fingerprint spoof detection across novel fabrication materials

A Rattani, WJ Scheirer, A Ross - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A fingerprint spoof detector is a pattern classifier that is used to distinguish a live finger from
a fake (spoof) one in the context of an automated fingerprint recognition system. Most spoof …

An intelligent approach for fingerprint presentation attack detection using ensemble learning with improved local image features

D Sharma, A Selwal - Multimedia Tools and Applications, 2022 - Springer
The fingerprint-based authentication systems are being extensively deployed as security
tool for providing access to the critical Cyber Physical Systems (CPS). However, this rapid …

Fingerprint liveness detection based on histograms of invariant gradients

C Gottschlich, E Marasco, AY Yang… - IEEE international joint …, 2014 - ieeexplore.ieee.org
Security of fingerprint authentication systems remains threatened by the presentation of
spoof artifacts. Most current mitigation approaches rely upon the fingerprint liveness …

Difference co-occurrence matrix using BP neural network for fingerprint liveness detection

C Yuan, X Sun, QMJ Wu - Soft Computing, 2019 - Springer
With the growing use of fingerprint identification systems in recent years, preventing
fingerprint identification systems from being spoofed by artificial fake fingerprints has …