[go: up one dir, main page]

Galbally et al., 2014 - Google Patents

Fingerprint anti-spoofing in biometric systems

Galbally et al., 2014

Document ID
7340527832460763030
Author
Galbally J
Fierrez J
Ortega-Garcia J
Cappelli R
Publication year
Publication venue
Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks

External Links

Snippet

This chapter is focused on giving a comprehensive description of the state-of-the-art in biometric-based fingerprint anti-spoofing and the big advances that have been reached in this field over the last decade. In addition, after a comprehensive review of the available …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores

Similar Documents

Publication Publication Date Title
Galbally et al. Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition
Galbally et al. A high performance fingerprint liveness detection method based on quality related features
Uhl State of the art in vascular biometrics
Bowyer et al. A survey of iris biometrics research: 2008–2010
Sousedik et al. Presentation attack detection methods for fingerprint recognition systems: a survey
Han et al. Palm vein recognition using adaptive Gabor filter
Genovese et al. Touchless palmprint recognition systems
Lee et al. Dorsal hand vein recognition based on 2D Gabor filters
CN111201537A (en) Distinguish between live and spoofed fingers through machine learning in fingerprint analysis
Ghiani et al. Experimental results on fingerprint liveness detection
Pravallika et al. SVM classification for fake biometric detection using image quality assessment: Application to iris, face and palm print
Labati et al. Touchless fingerprint biometrics
Galbally et al. An introduction to fingerprint presentation attack detection
Karampidis et al. A comprehensive survey of fingerprint presentation attack detection
Galbally et al. Fingerprint anti-spoofing in biometric systems
Alonso-Fernandez et al. Fingerprint recognition
Galbally et al. Introduction to presentation attack detection in fingerprint biometrics
Bakshi et al. An efficient face anti-spoofing and detection model using image quality assessment parameters
El-Naggar et al. Which dataset is this iris image from?
Kolivand et al. Improved methods for finger vein identification using composite Median-Wiener filter and hierarchical centroid features extraction
Anjos et al. An introduction to vein presentation attacks and detection
Benlamoudi Multi-modal and anti-spoofing person identification
Askarin et al. Planting attack on latent fingerprints
Akintoye et al. Challenges of finger vein recognition system: a theoretical perspective
Farzadpour et al. Adaptive thresholding pattern for fingerprint forgery detection