A survey on antispoofing schemes for fingerprint recognition systems
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …
been highlighted in the biometrics literature. One such vulnerability involves the use of …
Fingerprint liveness detection schemes: A review on presentation attack
DS Ametefe, SS Sarnin, DM Ali… - Computer Methods in …, 2022 - Taylor & Francis
Extant literature has highlighted the vulnerability of Automatic Fingerprint Identification
System (AFIS) to various forms of attacks, indicating presentation attack as the most …
System (AFIS) to various forms of attacks, indicating presentation attack as the most …
Fingerprint classification and identification algorithms for criminal investigation: A survey
Fingerprint plays a fundamental role in community security and criminal investigation, such
as forensic investigation, law enforcement, customs access and public security organs. This …
as forensic investigation, law enforcement, customs access and public security organs. This …
A preliminary study on continuous authentication methods for photoplethysmographic biometrics
Recent studies in biometrics focus on one dimensional physiological signals commonly
acquired in medical applications, like electrocardiogram (ECG), electroencephalograms …
acquired in medical applications, like electrocardiogram (ECG), electroencephalograms …
Noise modeling, synthesis and classification for generic object anti-spoofing
J Stehouwer, A Jourabloo, Y Liu… - Proceedings of the IEEE …, 2020 - openaccess.thecvf.com
Using printed photograph and replaying videos of biometric modalities, such as iris,
fingerprint and face, are common attacks to fool the recognition systems for granting access …
fingerprint and face, are common attacks to fool the recognition systems for granting access …
Vulnerabilities of fingerprint reader to fake fingerprints attacks
M Espinoza, C Champod, P Margot - Forensic science international, 2011 - Elsevier
The purpose of this research is to assess the vulnerabilities of a high resolution fingerprint
sensor when confronted with fake fingerprints. The study has not been focused on the …
sensor when confronted with fake fingerprints. The study has not been focused on the …
Fingerprint presentation attack detection using a novel multi-spectral capture device and patch-based convolutional neural networks
We introduce a novel capture device that provides two new powerful sensing modalities for
fingerprint presentation attack detection (FPAD): multi-spectral short-wave infrared (SWIR) …
fingerprint presentation attack detection (FPAD): multi-spectral short-wave infrared (SWIR) …
A review on presentation attack detection system for fake fingerprint
Fingerprint recognition systems are susceptible to artificial spoof fingerprint attacks, like
molds manufactured from polymer, gelatin or Play-Doh. Presentation attack is an open issue …
molds manufactured from polymer, gelatin or Play-Doh. Presentation attack is an open issue …
An incremental learning method for spoof fingerprint detection
JB Kho, W Lee, H Choi, J Kim - Expert systems with applications, 2019 - Elsevier
Spoof fingerprint detectors based on static features are built by learning a set of live and fake
fingerprint images. These learning-based spoof detectors cannot accurately classify new or …
fingerprint images. These learning-based spoof detectors cannot accurately classify new or …
Multi-modal fingerprint presentation attack detection: Evaluation on a new dataset
Fingerprint presentation attack detection is becoming an increasingly challenging problem
due to the continuous advancement of attack preparation techniques, which generate …
due to the continuous advancement of attack preparation techniques, which generate …