A survey on antispoofing schemes for fingerprint recognition systems
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …
been highlighted in the biometrics literature. One such vulnerability involves the use of …
Presentation attack detection methods for fingerprint recognition systems: a survey
C Sousedik, C Busch - Iet Biometrics, 2014 - Wiley Online Library
Nowadays, fingerprint biometrics is widely used in various applications, varying from
forensic investigations and migration control to access control as regards security sensitive …
forensic investigations and migration control to access control as regards security sensitive …
Cyber security in smart cities: a review of deep learning-based applications and case studies
On the one hand, smart cities have brought about various changes, aiming to revolutionize
people's lives. On the other hand, while smart cities bring better life experiences and great …
people's lives. On the other hand, while smart cities bring better life experiences and great …
ASVspoof: the automatic speaker verification spoofing and countermeasures challenge
Concerns regarding the vulnerability of automatic speaker verification (ASV) technology
against spoofing can undermine confidence in its reliability and form a barrier to exploitation …
against spoofing can undermine confidence in its reliability and form a barrier to exploitation …
Deep representations for iris, face, and fingerprint spoofing detection
Biometrics systems have significantly improved person identification and authentication,
playing an important role in personal, national, and global security. However, these systems …
playing an important role in personal, national, and global security. However, these systems …
Multimodal biometric authentication systems using convolution neural network based on different level fusion of ECG and fingerprint
A multimodal biometric system integrates information from more than one biometric modality
to improve the performance of each individual biometric system and make the system robust …
to improve the performance of each individual biometric system and make the system robust …
Fingerprint liveness detection using convolutional neural networks
With the growing use of biometric authentication systems in the recent years, spoof
fingerprint detection has become increasingly important. In this paper, we use convolutional …
fingerprint detection has become increasingly important. In this paper, we use convolutional …
Biometric antispoofing methods: A survey in face recognition
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …
pioneering works in face and voice recognition to the current state of development wherein a …
Fingerprint spoof buster: Use of minutiae-centered patches
The primary purpose of a fingerprint recognition system is to ensure a reliable and accurate
user authentication, but the security of the recognition system itself can be jeopardized by …
user authentication, but the security of the recognition system itself can be jeopardized by …
Biometrics systems under spoofing attack: an evaluation methodology and lessons learned
Biometrics already form a significant component of current and emerging identification
technologies. Biometrics systems aim to determine or verify the identity of an individual from …
technologies. Biometrics systems aim to determine or verify the identity of an individual from …