Fingerprint spoof detector generalization

T Chugh, AK Jain - IEEE Transactions on Information Forensics …, 2020 - ieeexplore.ieee.org
We present a style-transfer based wrapper, called Universal Material Generator (UMG), to
improve the generalization performance of any fingerprint spoof (presentation attack) …

Biometric recognition of infants using fingerprint, iris, and ear biometrics

Y Moolla, A De Kock, G Mabuza-Hocquet… - IEEE …, 2021 - ieeexplore.ieee.org
Biometric recognition is often used for adults for a variety of purposes where an individual's
identity must be ascertained. However, the biometric recognition of children is an unsolved …

Anomaly detection with convolutional autoencoders for fingerprint presentation attack detection

J Kolberg, M Grimmer… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In recent years, the popularity of fingerprint-based biometric authentication systems
significantly increased. However, together with many advantages, biometric systems are still …

Fingerprint presentation attack detection by channel-wise feature denoising

F Liu, Z Kong, H Liu, W Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Due to the diversity of attack materials, fingerprint recognition systems (AFRSs) are
vulnerable to malicious attacks. It is thus important to propose effective fingerprint …

Advancements and challenges in fingerprint presentation attack detection: a systematic literature review

DS Ametefe, SS Sarnin, DM Ali, GD Ametefe… - Neural Computing and …, 2024 - Springer
In the rapidly evolving domain of biometric security, the significance of Fingerprint
Presentation Attack Detection (FPAD) has become increasingly paramount, given the …

OCT fingerprints: Resilience to presentation attacks

T Chugh, AK Jain - arXiv preprint arXiv:1908.00102, 2019 - arxiv.org
Optical coherent tomography (OCT) fingerprint technology provides rich depth information,
including internal fingerprint (papillary junction) and sweat (eccrine) glands, in addition to …

Prototype-guided autoencoder for OCT-based fingerprint presentation attack detection

YP Liu, W Zuo, R Liang, H Sun… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Anti-spoofing ability is vital for fingerprint identification systems. Conventional fingerprint
scanning devices can only obtain information from the fingertip surfaces, and their …

Fingerprint spoof generalization

T Chugh, AK Jain - arXiv preprint arXiv:1912.02710, 2019 - arxiv.org
We present a style-transfer based wrapper, called Universal Material Generator (UMG), to
improve the generalization performance of any fingerprint spoof detector against spoofs …

{InfinityGauntlet}: Expose Smartphone Fingerprint Authentication to Brute-force Attack

Y Chen, Y Yu, L Zhai - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Billions of smartphone fingerprint authentications (SFA) occur daily for unlocking, privacy
and payment. Existing threats to SFA include presentation attacks (PA) and some case-by …

[PDF][PDF] InfinityGauntlet: brute-force attack on smartphone fingerprint authentication

Y Chen, Y Yu, L Zhai - Proceedings of the 32nd USENIX Conference on …, 2023 - usenix.org
Billions of smartphone fingerprint authentications (SFA) occur daily for unlocking, privacy
and payment. Existing threats to SFA include presentation attacks (PA) and some case …