A survey on antispoofing schemes for fingerprint recognition systems
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …
been highlighted in the biometrics literature. One such vulnerability involves the use of …
Presentation attack detection methods for fingerprint recognition systems: a survey
C Sousedik, C Busch - Iet Biometrics, 2014 - Wiley Online Library
Nowadays, fingerprint biometrics is widely used in various applications, varying from
forensic investigations and migration control to access control as regards security sensitive …
forensic investigations and migration control to access control as regards security sensitive …
Eardynamic: An ear canal deformation based continuous user authentication using in-ear wearables
Biometric-based authentication is gaining increasing attention for wearables and mobile
applications. Meanwhile, the growing adoption of sensors in wearables also provides …
applications. Meanwhile, the growing adoption of sensors in wearables also provides …
Toothsonic: Earable authentication via acoustic toothprint
Earables (ear wearables) are rapidly emerging as a new platform encompassing a diverse
range of personal applications. The traditional authentication methods hence become less …
range of personal applications. The traditional authentication methods hence become less …
A novel weber local binary descriptor for fingerprint liveness detection
In recent years, fingerprint authentication systems have been extensively deployed in
various applications, including attendance systems, authentications on smartphones, mobile …
various applications, including attendance systems, authentications on smartphones, mobile …
Client-specific anomaly detection for face presentation attack detection
One-class anomaly detection approaches are particularly appealing for use in face
presentation attack detection (PAD), especially in an unseen attack scenario, where the …
presentation attack detection (PAD), especially in an unseen attack scenario, where the …
Open set fingerprint spoof detection across novel fabrication materials
A fingerprint spoof detector is a pattern classifier that is used to distinguish a live finger from
a fake (spoof) one in the context of an automated fingerprint recognition system. Most spoof …
a fake (spoof) one in the context of an automated fingerprint recognition system. Most spoof …
An intelligent approach for fingerprint presentation attack detection using ensemble learning with improved local image features
The fingerprint-based authentication systems are being extensively deployed as security
tool for providing access to the critical Cyber Physical Systems (CPS). However, this rapid …
tool for providing access to the critical Cyber Physical Systems (CPS). However, this rapid …
Fingerprint liveness detection based on histograms of invariant gradients
Security of fingerprint authentication systems remains threatened by the presentation of
spoof artifacts. Most current mitigation approaches rely upon the fingerprint liveness …
spoof artifacts. Most current mitigation approaches rely upon the fingerprint liveness …
Difference co-occurrence matrix using BP neural network for fingerprint liveness detection
With the growing use of fingerprint identification systems in recent years, preventing
fingerprint identification systems from being spoofed by artificial fake fingerprints has …
fingerprint identification systems from being spoofed by artificial fake fingerprints has …