22 Hits in 2.3 sec

Fingerprint Liveness Detection Using Difference Co-occurrence Matrix Based Texture Features

Zhihua Xia, Chengsheng Yuan, Xingming Sun, Rui Lv, Decai Sun, Guangyong Gao
2016 International Journal of Multimedia and Ubiquitous Engineering  
Certainly, these issues have been handled through designing a series of anti-spoofing mechanism based on fingerprint vitality detection methods.  ...  under fraudulent attempts through artificial spoof fingerprints.  ...  Image Quality-based methods: Generally, because artificial spoofed fingerprint material can agglomerate during the processing, the surface of spoofed fingerprints is coarser than real fingerprints.  ... 
doi:10.14257/ijmue.2016.11.11.01 fatcat:hkblt2bgwnah5d2fculiahlomm

Spoofing protection for fingerprint scanner by fusing ridge signal and valley noise

Bozhao Tan, Stephanie Schuckers
2010 Pattern Recognition  
The proposed anti-spoofing method is purely software based and integration of this method can provide protection for fingerprint scanners against gelatin, Play-Doh and silicone spoof fingers.  ...  In this paper, an anti-spoofing detection method is proposed which is based on ridge signal and valley noise analysis, to quantify perspiration patterns along ridges in live subjects and noise patterns  ...  Conclusion A new method based on combining ridge signal and valley noise analysis is proposed for anti-spoofing in fingerprint sensors.  ... 
doi:10.1016/j.patcog.2010.01.023 fatcat:3oqhmcgx3rcqxn64timnqbrqfi

Anti-Forensic Resistant Likelihood Ratio Computation

Anthony Ho, Aamo Iorliam, Norman Poh, Nik Suki
2014 Zenodo  
The LBP features have been shown to outperform other competing liveness measures based on pores detection, Curvelet, Power spectrum, Wavelet energy signature evaluated on the LivDet 2011 fingerprint database  ...  a fingerprint to gain illegitimate access or benefits.  ... 
doi:10.5281/zenodo.44058 fatcat:4tsiyhbwynfd5enh77dvyvpcqy

Fingerprint Liveness Detection Using Gray Level Co-Occurrence Matrix Based Texture Feature

Chengsheng Yuan, Zhihua Xia, Xingming Sun, Decai Sun, Rui Lv
2016 International Journal of Grid and Distributed Computing  
In this paper, we propose a novel software-based fingerprint liveness detection algorithm based on gray level co-occurrence matrix (GLCM), from which we can calculate the texture features of fingerprint  ...  Fingerprint-based recognition systems have been widely deployed in numerous civilian and government applications.  ...  a fake fingerprint using the anti-spoofing method.  ... 
doi:10.14257/ijgdc.2016.9.10.06 fatcat:4oiujfkp6ncrpkk7hhsnwtqjqa

Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition

Javier Galbally, Sebastien Marcel, Julian Fierrez
2014 IEEE Transactions on Image Processing  
In this work we present a novel software-based fake detection method which can be used in multiple biometric systems to detect different types of fraudulent access attempts.  ...  The experimental results, obtained on publicly available datasets of fingerprint, iris and 2-D face, show that the proposed method is highly competitive compared to other state-of-the-art approaches and  ...  and anti-spoofing.  ... 
doi:10.1109/tip.2013.2292332 pmid:26270913 fatcat:2hra4h2bybh6fjyraphghic7ju

Fingerprint Presentation Attack Detection by Channel-wise Feature Denoising [article]

Feng Liu, Zhe Kong, Haozhe Liu, Wentian Zhang, Linlin Shen
2021 arXiv   pre-print
Specifically, a PA-Adaption loss is designed to constrain the feature distribution so as to make the feature distribution of live fingerprints more aggregate and spoof fingerprints more disperse.  ...  Besides, our model is simpler, lighter and, more efficient and has achieved a 74.76% reduction in time-consuming compared with the state-of-the-art multiple model based method.  ...  Meanwhile, to deal with the threat and promote anti-spoofing techniques, a series of fingerprint LivDet competitions have been held since 2009 [12] . Many public datasets e.g.  ... 
arXiv:2111.07620v1 fatcat:tzdnunscvzgwnb3j3if6gjufga

Fingerprint Liveness Detection in the Presence of Capable Intruders

Ana Sequeira, Jaime Cardoso
2015 Sensors  
Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks.  ...  Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics  ...  [27] proposed two general-purpose approaches to build image-based anti-spoofing systems with convolutional networks for several attack types in three biometric modalities, namely iris, face, and fingerprint  ... 
doi:10.3390/s150614615 pmid:26102491 pmcid:PMC4507655 fatcat:fffeigau7zaytcvcmyeatkk5jy


Amruta P. Dharmadhikari .
2014 International Journal of Research in Engineering and Technology  
The system presented in this paper acquires the finger-vein and low resolution fingerprint images simultaneously.  ...  In is quite complicated and largely responsible for the individuality of fingerprints and stead the score-level combination allows each of the observation to operate asynchronously, which is not possible  ...  Second the use of finger-vein biometric offers strong anti spoofing capabilities as it can also ensure liveless in the presented fingers during the imaging.  ... 
doi:10.15623/ijret.2014.0305154 fatcat:oxqrfmmxifevndrm7yz2c3tpwq

A comprehensive survey of fingerprint presentation attack detection

Konstantinos Karampidis, Minas Rousouliotis, Euangelos Linardos, Ergina Kavallieratou
2021 Journal of Surveillance, Security and Safety  
Both hardware-and software-based state-of-the-art methods are thoroughly presented and analyzed for identifying real fingerprints from artificial ones to help researchers to design securer biometric systems  ...  Fingerprints represent one of the most utilized biometric factors. In contrast to popular opinion, fingerprint recognition is not an inviolable technique.  ...  -Spoof, spoofing and anti-spoofing: terms used in the literature instead of PAI, PA and PAD before the adoption of the ISO/IEC 30107-3 standard.  ... 
doi:10.20517/jsss.2021.07 fatcat:arkgqtjmhfgqzgmwiuo4pc3squ

Review on Face, Ear and Signature for Human Identification

Suvarnsing G., Sumegh Tharewal, Hanumant Gite, Siddharth Dabhade, K. V.
2018 International Journal of Computer Applications  
Biometric-based personal identification is high applicability in an extensive range of security application but Multimodal biometrics is the way to reduce time density and give better recognition rate.  ...  Further, multibiometrics systems provide anti-spoofing measures by making it difficult for an intruder to spoof multiple biometric traits simultaneously.  ...  Multimodal biometric recognition system fingerprint, palmprint and face base on score level fusion (SLF).  ... 
doi:10.5120/ijca2018916250 fatcat:g5bxxtbqtnc6jl6tjhqz3f5lgm

Feature Level Fusion of Multispectral Palmprint

Ankita Kumari, Bhavya Alankar, Jyotsana Grover
2016 International Journal of Computer Applications  
To overcome this we have extracted the information set based features from the Gabor features. Till now the hybrid of Gabor filter and information set based features has not been implemented.  ...  The score level fusion is also performed to achieve high accuracy with anti-spoofing capability.  ...  So to increase accuracy and anti-spoofing capability multispectral palmprint with fusion technique is used.  ... 
doi:10.5120/ijca2016910175 fatcat:mujs6tmoevakzm54g7tfx3qdbq

Contourlet-Based Fingerprint Antispoofing

Shankar Bhausaheb Nikam, Suneeta Agarwal
2013 Computer Science & Information Technology ( CS & IT )   unpublished
We propose an image-based method using Contourlet transform [5] to detect liveness in fingerprint biometric systems.  ...  We observe that real and spoof fingerprint images exhibit different textural characteristics. Wavelet transform although widely used for liveness detection is not the ideal one.  ...  Comparison with Curvelet-based method [18] and Abhyankar and Schuckers' method [19] for real and spoof fingerprint classification.  ... 
doi:10.5121/csit.2013.3516 fatcat:56y5m5hxrnfstjkphhc46qiurm

Feature Fusion for Fingerprint Liveness Detection: a Comparative Study

Amirhosein Toosi, Andrea Bottino, Sandro Cumani, Pablo Negri, Pietro Luca Sottile
2017 IEEE Access  
Spoofing attacks carried out using artificial replicas are a severe threat for fingerprint based biometric systems and, thus, require the development of effective countermeasures.  ...  Most of the static software-based approaches in the literature are based on various image features, each with its own strengths, weaknesses and discriminative power.  ...  Based on this observation, the rationale of the current work is to analyze the effectiveness of feature fusion approaches as anti-spoofing methods and to compare them with the state of the art.  ... 
doi:10.1109/access.2017.2763419 fatcat:tgbj2xyiejb6bcvky7l4uhj4se

A digital signature system based on hand geometry - Survey

Mais Mudhafer Taher Al Mossawy, Loay E. George
2022 Wasit Journal of Computer and Mathematics Science  
This article aims to survey several articles found in literature about hand based biometric system, and to compare different methods of biometric recognition that based on hand geometry.  ...  Nowadays, Biometric recognition is used, it can be used as automatic identification or automatic verification of persons based on their physiological or behavioral characteristics.  ...  The results achieved 0.6% Equal Error Rate (EER) without spoofing attack and 3.4% EER with spoofing data.  ... 
doi:10.31185/wjcm.vol1.iss1.18 fatcat:d3inlqf6i5b5bpfbejnrdi3ekm

An Analysis of the Encryption Fusion Approach based on Face Recognition and Prime Numbers

Shinde Prashant
2020 International Journal of Computer Applications  
The primary algorithm utilizes fingerprint as the biometric segment and the FIF algorithm utilizes a face image of the user.  ...  First, one is FIF-Biometric and Numerical Information Fusion algorithm, which consolidates fingerprint and prime number to frame a hybrid fusion code.  ...  Any three types of facial recognition strategies are available: 1) An approach basing on local face feature recognition: These algos for example have strong anti-interference and good rotation and explanatory  ... 
doi:10.5120/ijca2020920230 fatcat:rhtcz6gn3ja2ldqp5nz7zepvpm
« Previous Showing results 1 — 15 out of 22 results