A survey on antispoofing schemes for fingerprint recognition systems

E Marasco, A Ross - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …

Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

[책][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

Comparing passwords, tokens, and biometrics for user authentication

L O'Gorman - Proceedings of the IEEE, 2003 - ieeexplore.ieee.org
For decades, the password has been the standard means for user authentication on
computers. However, as users are required to remember more, longer, and changing …

[책][B] The Electrical Engineering Handbook-Six Volume Set

RC Dorf - 2018 - api.taylorfrancis.com
In two editions spanning more than a decade, The Electrical Engineering Handbook stands
as the definitive reference to the multidisciplinary field of electrical engineering. Our …

Presentation attack detection methods for fingerprint recognition systems: a survey

C Sousedik, C Busch - Iet Biometrics, 2014 - Wiley Online Library
Nowadays, fingerprint biometrics is widely used in various applications, varying from
forensic investigations and migration control to access control as regards security sensitive …

Attacks and defenses in user authentication systems: A survey

X Wang, Z Yan, R Zhang, P Zhang - Journal of Network and Computer …, 2021 - Elsevier
User authentication systems (in short authentication systems) have wide utilization in our
daily life. Unfortunately, existing authentication systems are prone to various attacks while …

Attacks on biometric systems: a case study in fingerprints

U Uludag, AK Jain - Security, steganography, and …, 2004 - spiedigitallibrary.org
In spite of numerous advantages of biometrics-based personal authentication systems over
traditional security systems based on token or knowledge, they are vulnerable to attacks that …

Biometrics: a grand challenge

AK Jain, S Pankanti, S Prabhakar… - Proceedings of the …, 2004 - ieeexplore.ieee.org
Reliable person identification is an important problem in diverse businesses. Biometrics,
identification based on distinctive personal traits, has the potential to become an …

A high performance fingerprint liveness detection method based on quality related features

J Galbally, F Alonso-Fernandez, J Fierrez… - Future Generation …, 2012 - Elsevier
A new software-based liveness detection approach using a novel fingerprint
parameterization based on quality related features is proposed. The system is tested on a …