A new approach in automated fingerprint presentation attack detection using optical coherence tomography

H Sun, Y Zhang, P Chen, H Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Presentation attack detection (PAD) is a critical component of automated fingerprint
recognition systems (AFRSs). However, existing PAD technologies based on optical …

[HTML][HTML] Useless or used less? Poroscopy: The evidence of sweat pores

J Kaur, M Dhall - Heliyon, 2023 - cell.com
Poroscopy is the study of sweat pores present on the papillary ridges of the skin. This review
paper aims to examine existing literature on poroscopy so that its relevance as a tool in …

ZJUT-EIFD: A synchronously collected external and internal fingerprint database

H Sun, H Wang, Y Zhang, R Liang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
External fingerprints (EFs) based only on epidermal information are vulnerable to spoofing
attacks and non-ideal skin conditions. To solve such shortcomings, internal fingerprints (IFs) …

[HTML][HTML] 3D CNN-based fingerprint anti-spoofing through optical coherence tomography

Y Zhang, S Yu, S Pu, Y Wang, K Wang, H Sun, H Wang - Heliyon, 2023 - cell.com
Optical coherence tomography (OCT) is a noninvasive high-resolution imaging technology
that can accurately acquire the internal characteristics of tissues within a few millimeters …

The Self-Detection Method of the Puppet Attack in Biometric Fingerprinting

G Li, Y Ma, W Wang, J Zhang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Fingerprint authentication has become a staple in securing access to personal devices and
sensitive information in our daily lives, with the security level of such systems being …