Nothing Special   »   [go: up one dir, main page]

Yambay et al., 2019 - Google Patents

Review of fingerprint presentation attack detection competitions

Yambay et al., 2019

Document ID
10344803581688643110
Author
Yambay D
Ghiani L
Marcialis G
Roli F
Schuckers S
Publication year
Publication venue
Handbook of Biometric Anti-Spoofing: Presentation Attack Detection

External Links

Snippet

A spoof or artifact is a counterfeit biometric that is used in an attempt to circumvent a biometric sensor. Presentation attacks using an artifact have proven to still be effective against fingerprint recognition systems. Liveness detection aims to distinguish between live …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00087Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • G06K9/2018Identifying/ignoring parts by sensing at different wavelengths
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00154Reading or verifying signatures; Writer recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00885Biometric patterns not provided for under G06K9/00006, G06K9/00154, G06K9/00335, G06K9/00362, G06K9/00597; Biometric specific functions not specific to the kind of biometric
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6288Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
    • G06K9/6292Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of classification results, e.g. of classification results related to same input data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party

Similar Documents

Publication Publication Date Title
Ghiani et al. Review of the fingerprint liveness detection (LivDet) competition series: 2009 to 2015
Grother et al. Face recognition vendor test (fvrt): Part 3, demographic effects
Yambay et al. Review of fingerprint presentation attack detection competitions
Marasco et al. A survey on antispoofing schemes for fingerprint recognition systems
Matsumoto et al. Impact of artificial" gummy" fingers on fingerprint systems
Maltoni et al. Handbook of fingerprint recognition
Jain et al. Biometrics: a tool for information security
AU2018292176A1 (en) Detection of manipulated images
US20190147218A1 (en) User specific classifiers for biometric liveness detection
Micheletto et al. Review of the fingerprint liveness detection (livdet) competition series: from 2009 to 2021
Albakri et al. The effectiveness of depth data in liveness face authentication using 3D sensor cameras
Agrawal et al. Fake fingerprint liveness detection based on micro and macro features
Casula et al. Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Girelli Laterally Reversed Fingerprints Detected in Fake Documents.
Pala et al. On the accuracy and robustness of deep triplet embedding for fingerprint liveness detection
Micheletto Fusion of fingerprint presentation attacks detection and matching: a real approach from the LivDet perspective
Clarkson Breaking assumptions: distinguishing between seemingly identical items using cheap sensors
Shende et al. Soft computing approach for feature extraction of palm biometric
Iorliam et al. Using benford’s law divergence and neural networks for classification and source identification of biometric images
Rajakumar et al. A deep review and state-of-the-art performance on fingerprint liveness detection databases
Gafurov et al. Guc100 multisensor fingerprint database for in-house (semipublic) performance test
Meuwly et al. Biometrics in the aliens' identity chain
CN111429156A (en) Artificial intelligence recognition system for mobile phone and application thereof
Kumar et al. A brief review of image quality enhancement techniques based multi-modal biometric fusion systems
Lodrová Security of biometric systems