Deep learning based fingerprint presentation attack detection: A comprehensive Survey
H Li, R Ramachandra - arxiv preprint arxiv:2305.17522, 2023 - arxiv.org
The vulnerabilities of fingerprint authentication systems have raised security concerns when
adapting them to highly secure access-control applications. Therefore, Fingerprint …
adapting them to highly secure access-control applications. Therefore, Fingerprint …
A new approach in automated fingerprint presentation attack detection using optical coherence tomography
Presentation attack detection (PAD) is a critical component of automated fingerprint
recognition systems (AFRSs). However, existing PAD technologies based on optical …
recognition systems (AFRSs). However, existing PAD technologies based on optical …
Fingerprint presentation attack detection by channel-wise feature denoising
Due to the diversity of attack materials, fingerprint recognition systems (AFRSs) are
vulnerable to malicious attacks. It is thus important to propose effective fingerprint …
vulnerable to malicious attacks. It is thus important to propose effective fingerprint …
Parametric study of hand dorsal vein biometric recognition vulnerability to spoofing attacks
PV Mizinov, NS Konnova, MA Basarab… - Journal of Computer …, 2024 - Springer
Biometric vein recognition systems are vulnerable to presentation attacks. Traditionally,
researchers have used a near-infrared (NIR) drawing of the user's vascular bed to create a …
researchers have used a near-infrared (NIR) drawing of the user's vascular bed to create a …
Effective presentation attack detection driven by face related task
The robustness and generalization ability of Presentation Attack Detection (PAD) methods is
critical to ensure the security of Face Recognition Systems (FRSs). However, in a real …
critical to ensure the security of Face Recognition Systems (FRSs). However, in a real …
A Comprehensive Review of Unimodal and Multimodal Fingerprint Biometric Authentication Systems: Fusion, Attacks, and Template Protection
U Sumalatha, KK Prakasha, S Prabhu… - IEEE Access, 2024 - ieeexplore.ieee.org
In the contemporary technological landscape, biometrics, encompassing the analysis of
biological data, have gained significance. Biometrics is a methodology that utilize unique …
biological data, have gained significance. Biometrics is a methodology that utilize unique …
A uniform representation model for OCT-based fingerprint presentation attack detection and reconstruction
Abstract In current Optical Coherence Tomography (OCT)-based fingerprint recognition
systems, Presentation Attack Detection (PAD) and subsurface fingerprint reconstruction are …
systems, Presentation Attack Detection (PAD) and subsurface fingerprint reconstruction are …
Methods and applications of fingertip subcutaneous biometrics based on optical coherence tomography
Degraded skin conditions and advanced forgery technologies have reduced the stability and
security of identity authentication based on external biometrics of the fingertip, including …
security of identity authentication based on external biometrics of the fingertip, including …
MsMemoryGAN: A Multi-scale Memory GAN for Palm-vein Adversarial Purification
Deep neural networks have recently achieved promising performance in the vein
recognition task and have shown an increasing application trend, however, they are prone …
recognition task and have shown an increasing application trend, however, they are prone …
Decoupled mixup for out-of-distribution visual recognition
Convolutional neural networks (CNN) have demonstrated remarkable performance, when
the training and testing data are from the same distribution. However, such trained CNN …
the training and testing data are from the same distribution. However, such trained CNN …