A survey on antispoofing schemes for fingerprint recognition systems

E Marasco, A Ross - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …

Presentation attack detection methods for fingerprint recognition systems: a survey

C Sousedik, C Busch - Iet Biometrics, 2014 - Wiley Online Library
Nowadays, fingerprint biometrics is widely used in various applications, varying from
forensic investigations and migration control to access control as regards security sensitive …

Fingerprint spoof buster: Use of minutiae-centered patches

T Chugh, K Cao, AK Jain - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
The primary purpose of a fingerprint recognition system is to ensure a reliable and accurate
user authentication, but the security of the recognition system itself can be jeopardized by …

Attacks and defenses in user authentication systems: A survey

X Wang, Z Yan, R Zhang, P Zhang - Journal of Network and Computer …, 2021 - Elsevier
User authentication systems (in short authentication systems) have wide utilization in our
daily life. Unfortunately, existing authentication systems are prone to various attacks while …

An investigation of local descriptors for biometric spoofing detection

D Gragnaniello, G Poggi, C Sansone… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Biometric authentication systems are quite vulnerable to sophisticated spoofing attacks. To
keep a good level of security, reliable spoofing detection tools are necessary, preferably …

EarDynamic: An ear canal deformation based continuous user authentication using in-ear wearables

Z Wang, S Tan, L Zhang, Y Ren, Z Wang… - Proceedings of the ACM …, 2021 - dl.acm.org
Biometric-based authentication is gaining increasing attention for wearables and mobile
applications. Meanwhile, the growing adoption of sensors in wearables also provides …

Toothsonic: Earable authentication via acoustic toothprint

Z Wang, Y Ren, Y Chen, J Yang - Proceedings of the ACM on Interactive …, 2022 - dl.acm.org
Earables (ear wearables) are rapidly emerging as a new platform encompassing a diverse
range of personal applications. The traditional authentication methods hence become less …

A novel weber local binary descriptor for fingerprint liveness detection

Z **a, C Yuan, R Lv, X Sun, NN **ong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In recent years, fingerprint authentication systems have been extensively deployed in
various applications, including attendance systems, authentications on smartphones, mobile …

Fingerprint liveness detection by local phase quantization

L Ghiani, GL Marcialis, F Roli - Proceedings of the 21st …, 2012 - ieeexplore.ieee.org
Fingerprint liveness detection consists in verifying if an input fingerprint image, acquired by a
fingerprint verification system, belongs to a genuine user or is an artificial replica. Although …

Local contrast phase descriptor for fingerprint liveness detection

D Gragnaniello, G Poggi, C Sansone, L Verdoliva - Pattern Recognition, 2015 - Elsevier
We propose a new local descriptor for fingerprint liveness detection. The input image is
analyzed both in the spatial and in the frequency domain, in order to extract information on …