Filters








16,961 Hits in 7.6 sec

Altered Fingerprints: Detection and Localization [article]

Elham Tabassi, Tarang Chugh, Debayan Deb, Anil K. Jain
2018 arXiv   pre-print
The synthetically generated altered fingerprint dataset will be open-sourced.  ...  Our main contributions are: (i) design and train CNN models on fingerprint images and minutiae-centered local patches in the image to detect and localize regions of fingerprint alterations, and (ii) train  ...  The network hyperparameters used to train the CNN models are presented in Generating synthetic altered fingerprints One major constraint of studies on altered fingerprint detection is the limited amount  ... 
arXiv:1805.00911v2 fatcat:eitieaa7pjecfbjfr6lle2qrpi

Sokoto Coventry Fingerprint Dataset [article]

Yahaya Isah Shehu, Ariel Ruiz-Garcia, Vasile Palade, Anne James
2018 arXiv   pre-print
SOCOFing contains unique attributes such as labels for gender, hand and finger name as well as synthetically altered versions with three different levels of alteration for obliteration, central rotation  ...  SOCOFing is made up of 6,000 fingerprint images from 600 African subjects.  ...  STRANGE is a novel framework for the generation of realistic synthetic alterations on fingerprint images [1] .  ... 
arXiv:1807.10609v1 fatcat:h5ou27gxdbbeviwdpswlphil6a

Detection of Fingerprint Alterations Using Deep Convolutional Neural Networks [chapter]

Yahaya Isah Shehu, Ariel Ruiz-Garcia, Vasile Palade, Anne James
2018 Lecture Notes in Computer Science  
We also provide a total of 55,249 images with three levels of alteration for z-cut, obliteration and central rotation synthetic alterations, which are the most common types of obfuscation and distortion  ...  However, non-existence of publicly available datasets that contain obfuscation and distortion of fingerprints makes it difficult to identify the type of alteration and thus the study and development of  ...  Techniques to generate synthetic altered fingerprints and to prove the utility of the generated dataset for developing, tuning and evaluating algorithms for altered fingerprint detection/matching were  ... 
doi:10.1007/978-3-030-01418-6_6 fatcat:s7ojsovu3vflrpklzi5yxmimtq

Altered Fingerprint Matching Using Ridge Texture and Frequency in the Unaltered Region

T.R. Anoop, M.G. Mini
2015 Bonfring International Journal of Advances in Image Processing  
Results of one to many matching between synthetically altered fingerprints and its unaltered mates shows that this method is suitable for altered fingerprint matching.  ...  Fingerprint alteration is the process of changing the regularly spaced ridge structure by mechanical or chemical means to hide the identity from Automated Fingerprint Identification System.  ...  RESULTS AND DISCUSSION An altered FP database consisting of 70 synthetically altered fingerprints is used for the experiments.  ... 
doi:10.9756/bijaip.10401 fatcat:5ksfvydr4zfs5ormafydt37mbq

SVM-Based Synthetic Fingerprint Discrimination Algorithm and Quantitative Optimization Strategy

Suhang Chen, Sheng Chang, Qijun Huang, Jin He, Hao Wang, Qiangui Huang, Rongrong Ji
2014 PLoS ONE  
Synthetic fingerprints are a potential threat to automatic fingerprint identification systems (AFISs). In this paper, we propose an algorithm to discriminate synthetic fingerprints from real ones.  ...  After the optimization of our synthetic fingerprint discrimination task, the polynomial kernel with a training sample proportion of 5% is the optimized value when the minimum accuracy requirement is 95%  ...  Wrote the paper: S. Chen S. Chang.  ... 
doi:10.1371/journal.pone.0111099 pmid:25347063 pmcid:PMC4210264 fatcat:yoyuhj4xpnfvzkwl4ha2aw7cmi

SynCoLFinGer: Synthetic Contactless Fingerprint Generator [article]

Jannis Priesnitz, Christian Rathgeb, Nicolas Buchmann, Christoph Busch
2022 arXiv   pre-print
We present the first method for synthetic generation of contactless fingerprint images, referred to as SynCoLFinGer.  ...  The resemblance of the synthetically generated contactless fingerprints to real fingerprints is confirmed by evaluating biometric sample quality using an adapted NFIQ 2.0 algorithm and biometric utility  ...  ACKNOWLEDGEMENTS This research work has been funded by the German Federal Ministry of Education and Research and the Hessian Ministry of Higher Education, Research, Science and the Arts within their joint  ... 
arXiv:2110.09144v2 fatcat:kdsui5bb5fdqnhucbdri7lt2t4

Detecting Altered Fingerprints

Jianjiang Feng, Anil K. Jain, Arun Ross
2010 2010 20th International Conference on Pattern Recognition  
Experiments were conducted on both real-world altered fingerprints and synthetically generated altered fingerprints.  ...  At a false alarm rate of 7%, the proposed algorithm detected 92% of the altered fingerprints, while a well-known fingerprint quality software, NFIQ, only detected 20% of the altered fingerprints.  ...  We would like to thank John Manzo of the FBI during the course of this study.  ... 
doi:10.1109/icpr.2010.401 dblp:conf/icpr/FengJR10 fatcat:22czs626azhmpnudzhthya4p4i

Biometric Template Security: Challenges And Solutions

Anil Jain, Arun Ross, Umut Uludag
2005 Zenodo  
Publication in the conference proceedings of EUSIPCO, Antalya, Turkey, 2005  ...  The STG begins by generating a fixed number of synthetic templates each comprising of randomly generated minutiae points.  ...  [9] ) to generate fingerprints based on the orientation map (Figure 3 ).  ... 
doi:10.5281/zenodo.39287 fatcat:4sqemkqlevexhhdzmr7jfgu6fu

Fingerprint Distortion Rectification using Deep Convolutional Neural Networks [article]

Ali Dabouei, Hadi Kazemi, Seyed Mehdi Iranmanesh, Jeremi Dawson, Nasser M. Nasrabadi
2018 arXiv   pre-print
Elastic distortion of fingerprints has a negative effect on the performance of fingerprint recognition systems. This negative effect brings inconvenience to users in authentication applications.  ...  Evaluating the proposed method on public databases of distorted samples shows that it can significantly improve the matching performance of distorted samples.  ...  ACKNOWLEDGEMENT This work is based upon a work supported by the Center for Identification Technology Research and the National Science Foundation under Grant #1650474  ... 
arXiv:1801.01198v1 fatcat:vushxzimrje37er6ybphpkjy3a

Synthesis and Reconstruction of Fingerprints using Generative Adversarial Networks [article]

Rafael Bouzaglo, Yosi Keller
2022 arXiv   pre-print
It significantly improved the realism of the generated fingerprints, both visually and in terms of their ability to spoof fingerprint-based verification systems.  ...  We also derive a computational approach to modify the attributes of the generated fingerprint while preserving their identity.  ...  The goal of fingerprint synthesis is to generate synthetic fingerprints that are as realistic as possible, while the goal of fingerprint reconstruction is to generate synthetic fingerprints resembling  ... 
arXiv:2201.06164v1 fatcat:vzmep63igbbrrpcwvdrvkqqf44

Security in biometric systems [article]

Francesc Serratosa
2020 arXiv   pre-print
The second part of the chapter describes several attacks that can be made on systems based on fingerprinting, face recognition, and iris recognition (Sections 4 and 5).  ...  The first part of the chapter gives an overview of the basic types of attacks and describes the usual protection measures (Sections 1, 2 and 3).  ...  Fingerprint In this section, we discuss two ways of generating synthetic fingerprints, the first considering that the target user collaborates in the reading of their fingerprints and the second considering  ... 
arXiv:2011.05679v1 fatcat:7cplsn72wrcnlkxnwaqms7bt4m

Attacks on biometric systems: a case study in fingerprints

Umut Uludag, Anil K. Jain, Edward J. Delp III, Ping W. Wong
2004 Security, Steganography, and Watermarking of Multimedia Contents VI  
In this paper, we analyze these attacks in the realm of a fingerprint biometric system.  ...  We propose an attack system that uses a hill climbing procedure to synthesize the target minutia templates and evaluate its feasibility with extensive experimental results conducted on a large fingerprint  ...  As an example of the former, Adler [11] proposed an attack on a face recognition system where the account of a specific user enrolled in the system is attacked via synthetically generated face images  ... 
doi:10.1117/12.530907 dblp:conf/sswmc/UludagJ04 fatcat:3zrdloimnnbzzkcsfpcshv6yza

Fingerprint Quality Assessment Using A No-Reference Image Quality Metric

Christophe Charrier, Mohamad El-Abed, Alexandre Ninassi, C. Rosenberger
2013 Zenodo  
Publication in the conference proceedings of EUSIPCO, Marrakech, Morocco, 2013  ...  From this benchmark, we generated a synthetic altered fingerprint database simulating several acquisition artefacts.  ...  In total, we generated 300.000 altered fingerprints.  ... 
doi:10.5281/zenodo.43594 fatcat:gsaaszhe45bhtcwj36jxkqsatm

Quality-Dependent Fusion System using No-reference Image Quality Metrics for Multimodal Biometrics

Pravin G. Gawande
2018 Periodicals of Engineering and Natural Sciences (PEN)  
We Presents work, on a novel quality assessment metrics for Fingerprint, Palmprint, and Iris. The originality of this work contributing with blind image quality measures.  ...  Result shows the efficiency of detecting the kind of alterations. Kolmogorov-Smirnov (KS) test statistics shows 0.84 to 0.94 outperformed as compared to NFIQ.  ...  (2015) and we introduce one synthetic motion based alteration. So there are three planes of alterations. We have used MATLAB tool for alteration process.  ... 
doi:10.21533/pen.v6i1.282 fatcat:wpmx726zonfh3ganfdythow2he

Hiding biometric data

Anil K. Jain, U. Uludag
2003 IEEE Transactions on Pattern Analysis and Machine Intelligence  
Feature analysis of host images guarantees high verification accuracy on watermarked (e.g., fingerprint) images.  ...  This method has the ability to increase the security of both the hidden biometric data (e.g., eigen-face coefficients) and host images (e.g., fingerprints).  ...  The synthetic fingerprint image (360 x 280) is obtained after a postprocessing of the image generated using the algorithm described by Cappelli et al. [13] .  ... 
doi:10.1109/tpami.2003.1240122 fatcat:dwoavznvrfhb3mtaihu2yrin44
« Previous Showing results 1 — 15 out of 16,961 results