Fingerprint spoof detector generalization
We present a style-transfer based wrapper, called Universal Material Generator (UMG), to
improve the generalization performance of any fingerprint spoof (presentation attack) …
improve the generalization performance of any fingerprint spoof (presentation attack) …
Biometric recognition of infants using fingerprint, iris, and ear biometrics
Y Moolla, A De Kock, G Mabuza-Hocquet… - IEEE …, 2021 - ieeexplore.ieee.org
Biometric recognition is often used for adults for a variety of purposes where an individual's
identity must be ascertained. However, the biometric recognition of children is an unsolved …
identity must be ascertained. However, the biometric recognition of children is an unsolved …
Anomaly detection with convolutional autoencoders for fingerprint presentation attack detection
In recent years, the popularity of fingerprint-based biometric authentication systems
significantly increased. However, together with many advantages, biometric systems are still …
significantly increased. However, together with many advantages, biometric systems are still …
Fingerprint presentation attack detection by channel-wise feature denoising
Due to the diversity of attack materials, fingerprint recognition systems (AFRSs) are
vulnerable to malicious attacks. It is thus important to propose effective fingerprint …
vulnerable to malicious attacks. It is thus important to propose effective fingerprint …
Advancements and challenges in fingerprint presentation attack detection: a systematic literature review
In the rapidly evolving domain of biometric security, the significance of Fingerprint
Presentation Attack Detection (FPAD) has become increasingly paramount, given the …
Presentation Attack Detection (FPAD) has become increasingly paramount, given the …
OCT fingerprints: Resilience to presentation attacks
Optical coherent tomography (OCT) fingerprint technology provides rich depth information,
including internal fingerprint (papillary junction) and sweat (eccrine) glands, in addition to …
including internal fingerprint (papillary junction) and sweat (eccrine) glands, in addition to …
Prototype-guided autoencoder for OCT-based fingerprint presentation attack detection
YP Liu, W Zuo, R Liang, H Sun… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Anti-spoofing ability is vital for fingerprint identification systems. Conventional fingerprint
scanning devices can only obtain information from the fingertip surfaces, and their …
scanning devices can only obtain information from the fingertip surfaces, and their …
Fingerprint spoof generalization
We present a style-transfer based wrapper, called Universal Material Generator (UMG), to
improve the generalization performance of any fingerprint spoof detector against spoofs …
improve the generalization performance of any fingerprint spoof detector against spoofs …
{InfinityGauntlet}: Expose Smartphone Fingerprint Authentication to Brute-force Attack
Y Chen, Y Yu, L Zhai - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Billions of smartphone fingerprint authentications (SFA) occur daily for unlocking, privacy
and payment. Existing threats to SFA include presentation attacks (PA) and some case-by …
and payment. Existing threats to SFA include presentation attacks (PA) and some case-by …
[PDF][PDF] InfinityGauntlet: brute-force attack on smartphone fingerprint authentication
Y Chen, Y Yu, L Zhai - Proceedings of the 32nd USENIX Conference on …, 2023 - usenix.org
Billions of smartphone fingerprint authentications (SFA) occur daily for unlocking, privacy
and payment. Existing threats to SFA include presentation attacks (PA) and some case …
and payment. Existing threats to SFA include presentation attacks (PA) and some case …