A survey on antispoofing schemes for fingerprint recognition systems
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …
been highlighted in the biometrics literature. One such vulnerability involves the use of …
Presentation attack detection methods for fingerprint recognition systems: a survey
C Sousedik, C Busch - Iet Biometrics, 2014 - Wiley Online Library
Nowadays, fingerprint biometrics is widely used in various applications, varying from
forensic investigations and migration control to access control as regards security sensitive …
forensic investigations and migration control to access control as regards security sensitive …
Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured
synthetic or reconstructed sample is a significant problem in biometric authentication, which …
synthetic or reconstructed sample is a significant problem in biometric authentication, which …
Fingerprint spoof buster: Use of minutiae-centered patches
The primary purpose of a fingerprint recognition system is to ensure a reliable and accurate
user authentication, but the security of the recognition system itself can be jeopardized by …
user authentication, but the security of the recognition system itself can be jeopardized by …
An investigation of local descriptors for biometric spoofing detection
Biometric authentication systems are quite vulnerable to sophisticated spoofing attacks. To
keep a good level of security, reliable spoofing detection tools are necessary, preferably …
keep a good level of security, reliable spoofing detection tools are necessary, preferably …
Fingerprint spoof detector generalization
We present a style-transfer based wrapper, called Universal Material Generator (UMG), to
improve the generalization performance of any fingerprint spoof (presentation attack) …
improve the generalization performance of any fingerprint spoof (presentation attack) …
A novel weber local binary descriptor for fingerprint liveness detection
In recent years, fingerprint authentication systems have been extensively deployed in
various applications, including attendance systems, authentications on smartphones, mobile …
various applications, including attendance systems, authentications on smartphones, mobile …
Review of the fingerprint liveness detection (LivDet) competition series: 2009 to 2015
A spoof attack, a subset of presentation attacks, is the use of an artificial replica of a
biometric in an attempt to circumvent a biometric sensor. Liveness detection, or presentation …
biometric in an attempt to circumvent a biometric sensor. Liveness detection, or presentation …
Local contrast phase descriptor for fingerprint liveness detection
We propose a new local descriptor for fingerprint liveness detection. The input image is
analyzed both in the spatial and in the frequency domain, in order to extract information on …
analyzed both in the spatial and in the frequency domain, in order to extract information on …
Fingerprint liveness detection using an improved CNN with image scale equalization
Due to the lack of pre-judgment of fingerprints, fingerprint authentication systems are
frequently vulnerable to artificial replicas. Anonymous people can impersonate authorized …
frequently vulnerable to artificial replicas. Anonymous people can impersonate authorized …