Yambay et al., 2019 - Google Patents
Review of fingerprint presentation attack detection competitionsYambay et al., 2019
- Document ID
- 10344803581688643110
- Author
- Yambay D
- Ghiani L
- Marcialis G
- Roli F
- Schuckers S
- Publication year
- Publication venue
- Handbook of Biometric Anti-Spoofing: Presentation Attack Detection
External Links
Snippet
A spoof or artifact is a counterfeit biometric that is used in an attempt to circumvent a biometric sensor. Presentation attacks using an artifact have proven to still be effective against fingerprint recognition systems. Liveness detection aims to distinguish between live …
- 238000001514 detection method 0 title abstract description 63
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
- G06K9/2018—Identifying/ignoring parts by sensing at different wavelengths
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00154—Reading or verifying signatures; Writer recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00885—Biometric patterns not provided for under G06K9/00006, G06K9/00154, G06K9/00335, G06K9/00362, G06K9/00597; Biometric specific functions not specific to the kind of biometric
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6288—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
- G06K9/6292—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of classification results, e.g. of classification results related to same input data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ghiani et al. | Review of the fingerprint liveness detection (LivDet) competition series: 2009 to 2015 | |
Grother et al. | Face recognition vendor test (fvrt): Part 3, demographic effects | |
Yambay et al. | Review of fingerprint presentation attack detection competitions | |
Marasco et al. | A survey on antispoofing schemes for fingerprint recognition systems | |
Matsumoto et al. | Impact of artificial" gummy" fingers on fingerprint systems | |
Maltoni et al. | Handbook of fingerprint recognition | |
Jain et al. | Biometrics: a tool for information security | |
AU2018292176A1 (en) | Detection of manipulated images | |
US20190147218A1 (en) | User specific classifiers for biometric liveness detection | |
Micheletto et al. | Review of the fingerprint liveness detection (livdet) competition series: from 2009 to 2021 | |
Albakri et al. | The effectiveness of depth data in liveness face authentication using 3D sensor cameras | |
Agrawal et al. | Fake fingerprint liveness detection based on micro and macro features | |
Casula et al. | Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors? | |
Girelli | Laterally Reversed Fingerprints Detected in Fake Documents. | |
Pala et al. | On the accuracy and robustness of deep triplet embedding for fingerprint liveness detection | |
Micheletto | Fusion of fingerprint presentation attacks detection and matching: a real approach from the LivDet perspective | |
Clarkson | Breaking assumptions: distinguishing between seemingly identical items using cheap sensors | |
Shende et al. | Soft computing approach for feature extraction of palm biometric | |
Iorliam et al. | Using benford’s law divergence and neural networks for classification and source identification of biometric images | |
Rajakumar et al. | A deep review and state-of-the-art performance on fingerprint liveness detection databases | |
Gafurov et al. | Guc100 multisensor fingerprint database for in-house (semipublic) performance test | |
Meuwly et al. | Biometrics in the aliens' identity chain | |
CN111429156A (en) | Artificial intelligence recognition system for mobile phone and application thereof | |
Kumar et al. | A brief review of image quality enhancement techniques based multi-modal biometric fusion systems | |
Lodrová | Security of biometric systems |