A survey on antispoofing schemes for fingerprint recognition systems
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …
been highlighted in the biometrics literature. One such vulnerability involves the use of …
Surveying the development of biometric user authentication on mobile phones
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …
important task to protect users' private information and data. Since biometric approaches can …
[책][B] Handbook of fingerprint recognition
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …
Comparing passwords, tokens, and biometrics for user authentication
L O'Gorman - Proceedings of the IEEE, 2003 - ieeexplore.ieee.org
For decades, the password has been the standard means for user authentication on
computers. However, as users are required to remember more, longer, and changing …
computers. However, as users are required to remember more, longer, and changing …
[책][B] The Electrical Engineering Handbook-Six Volume Set
RC Dorf - 2018 - api.taylorfrancis.com
In two editions spanning more than a decade, The Electrical Engineering Handbook stands
as the definitive reference to the multidisciplinary field of electrical engineering. Our …
as the definitive reference to the multidisciplinary field of electrical engineering. Our …
Presentation attack detection methods for fingerprint recognition systems: a survey
C Sousedik, C Busch - Iet Biometrics, 2014 - Wiley Online Library
Nowadays, fingerprint biometrics is widely used in various applications, varying from
forensic investigations and migration control to access control as regards security sensitive …
forensic investigations and migration control to access control as regards security sensitive …
Attacks and defenses in user authentication systems: A survey
X Wang, Z Yan, R Zhang, P Zhang - Journal of Network and Computer …, 2021 - Elsevier
User authentication systems (in short authentication systems) have wide utilization in our
daily life. Unfortunately, existing authentication systems are prone to various attacks while …
daily life. Unfortunately, existing authentication systems are prone to various attacks while …
Attacks on biometric systems: a case study in fingerprints
In spite of numerous advantages of biometrics-based personal authentication systems over
traditional security systems based on token or knowledge, they are vulnerable to attacks that …
traditional security systems based on token or knowledge, they are vulnerable to attacks that …
Biometrics: a grand challenge
Reliable person identification is an important problem in diverse businesses. Biometrics,
identification based on distinctive personal traits, has the potential to become an …
identification based on distinctive personal traits, has the potential to become an …
A high performance fingerprint liveness detection method based on quality related features
A new software-based liveness detection approach using a novel fingerprint
parameterization based on quality related features is proposed. The system is tested on a …
parameterization based on quality related features is proposed. The system is tested on a …