A comprehensive overview of biometric fusion
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …
fingerprints only) is often stymied by various factors such as poor data quality or limited …
Adaptive biometric systems: Review and perspectives
With the widespread of computing and mobile devices, authentication using biometrics has
received greater attention. Although biometric systems usually provide good solutions, the …
received greater attention. Although biometric systems usually provide good solutions, the …
Fingerprint spoof buster: Use of minutiae-centered patches
The primary purpose of a fingerprint recognition system is to ensure a reliable and accurate
user authentication, but the security of the recognition system itself can be jeopardized by …
user authentication, but the security of the recognition system itself can be jeopardized by …
LivDet 2017 fingerprint liveness detection competition 2017
Fingerprint Presentation Attack Detection (FPAD) deals with distinguishing images coming
from artificial replicas of the fingerprint characteristic, made up of materials like silicone …
from artificial replicas of the fingerprint characteristic, made up of materials like silicone …
t-DCF: a detection cost function for the tandem assessment of spoofing countermeasures and automatic speaker verification
The ASVspoof challenge series was born to spearhead research in anti-spoofing for
automatic speaker verification (ASV). The two challenge editions in 2015 and 2017 involved …
automatic speaker verification (ASV). The two challenge editions in 2015 and 2017 involved …
[HTML][HTML] Anti-spoofing method for fingerprint recognition using patch based deep learning machine
Today's with increasing identity theft, biometric systems based on fingerprints have a
growing importance in protection and access restrictions. Malicious users violate them by …
growing importance in protection and access restrictions. Malicious users violate them by …
Biometric presentation attack detection: Beyond the visible spectrum
The increased need for unattended authentication in multiple scenarios has motivated a
wide deployment of biometric systems in the last few years. This has in turn led to the …
wide deployment of biometric systems in the last few years. This has in turn led to the …
A novel weber local binary descriptor for fingerprint liveness detection
In recent years, fingerprint authentication systems have been extensively deployed in
various applications, including attendance systems, authentications on smartphones, mobile …
various applications, including attendance systems, authentications on smartphones, mobile …
[HTML][HTML] Multimodal approach for enhancing biometric authentication
Unimodal biometric systems rely on a single source or unique individual biological trait for
measurement and examination. Fingerprint-based biometric systems are the most common …
measurement and examination. Fingerprint-based biometric systems are the most common …
[HTML][HTML] Biometric template attacks and recent protection mechanisms: A survey
SM Abdullahi, S Sun, B Wang, N Wei, H Wang - Information Fusion, 2024 - Elsevier
It is an undeniable fact that biometric recognition systems are susceptible to different
software-related or template attacks at different vulnerable points in the biometric …
software-related or template attacks at different vulnerable points in the biometric …