A survey on antispoofing schemes for fingerprint recognition systems

E Marasco, A Ross - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …

Presentation attack detection methods for fingerprint recognition systems: a survey

C Sousedik, C Busch - Iet Biometrics, 2014 - Wiley Online Library
Nowadays, fingerprint biometrics is widely used in various applications, varying from
forensic investigations and migration control to access control as regards security sensitive …

Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition

J Galbally, S Marcel, J Fierrez - IEEE transactions on image …, 2013 - ieeexplore.ieee.org
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured
synthetic or reconstructed sample is a significant problem in biometric authentication, which …

Fingerprint spoof buster: Use of minutiae-centered patches

T Chugh, K Cao, AK Jain - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
The primary purpose of a fingerprint recognition system is to ensure a reliable and accurate
user authentication, but the security of the recognition system itself can be jeopardized by …

An investigation of local descriptors for biometric spoofing detection

D Gragnaniello, G Poggi, C Sansone… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Biometric authentication systems are quite vulnerable to sophisticated spoofing attacks. To
keep a good level of security, reliable spoofing detection tools are necessary, preferably …

Fingerprint spoof detector generalization

T Chugh, AK Jain - IEEE Transactions on Information Forensics …, 2020 - ieeexplore.ieee.org
We present a style-transfer based wrapper, called Universal Material Generator (UMG), to
improve the generalization performance of any fingerprint spoof (presentation attack) …

A novel weber local binary descriptor for fingerprint liveness detection

Z **a, C Yuan, R Lv, X Sun, NN **ong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In recent years, fingerprint authentication systems have been extensively deployed in
various applications, including attendance systems, authentications on smartphones, mobile …

Review of the fingerprint liveness detection (LivDet) competition series: 2009 to 2015

L Ghiani, DA Yambay, V Mura, GL Marcialis… - Image and Vision …, 2017 - Elsevier
A spoof attack, a subset of presentation attacks, is the use of an artificial replica of a
biometric in an attempt to circumvent a biometric sensor. Liveness detection, or presentation …

Local contrast phase descriptor for fingerprint liveness detection

D Gragnaniello, G Poggi, C Sansone, L Verdoliva - Pattern Recognition, 2015 - Elsevier
We propose a new local descriptor for fingerprint liveness detection. The input image is
analyzed both in the spatial and in the frequency domain, in order to extract information on …

Fingerprint liveness detection using an improved CNN with image scale equalization

C Yuan, Z **a, L Jiang, Y Cao, QMJ Wu, X Sun - IEEE Access, 2019 - ieeexplore.ieee.org
Due to the lack of pre-judgment of fingerprints, fingerprint authentication systems are
frequently vulnerable to artificial replicas. Anonymous people can impersonate authorized …