Galbally et al., 2014 - Google Patents
Fingerprint anti-spoofing in biometric systemsGalbally et al., 2014
- Document ID
- 7340527832460763030
- Author
- Galbally J
- Fierrez J
- Ortega-Garcia J
- Cappelli R
- Publication year
- Publication venue
- Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks
External Links
Snippet
This chapter is focused on giving a comprehensive description of the state-of-the-art in biometric-based fingerprint anti-spoofing and the big advances that have been reached in this field over the last decade. In addition, after a comprehensive review of the available …
- 238000000034 method 0 abstract description 37
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Galbally et al. | Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition | |
Galbally et al. | A high performance fingerprint liveness detection method based on quality related features | |
Uhl | State of the art in vascular biometrics | |
Bowyer et al. | A survey of iris biometrics research: 2008–2010 | |
Sousedik et al. | Presentation attack detection methods for fingerprint recognition systems: a survey | |
Han et al. | Palm vein recognition using adaptive Gabor filter | |
Genovese et al. | Touchless palmprint recognition systems | |
Lee et al. | Dorsal hand vein recognition based on 2D Gabor filters | |
CN111201537A (en) | Distinguish between live and spoofed fingers through machine learning in fingerprint analysis | |
Ghiani et al. | Experimental results on fingerprint liveness detection | |
Pravallika et al. | SVM classification for fake biometric detection using image quality assessment: Application to iris, face and palm print | |
Labati et al. | Touchless fingerprint biometrics | |
Galbally et al. | An introduction to fingerprint presentation attack detection | |
Karampidis et al. | A comprehensive survey of fingerprint presentation attack detection | |
Galbally et al. | Fingerprint anti-spoofing in biometric systems | |
Alonso-Fernandez et al. | Fingerprint recognition | |
Galbally et al. | Introduction to presentation attack detection in fingerprint biometrics | |
Bakshi et al. | An efficient face anti-spoofing and detection model using image quality assessment parameters | |
El-Naggar et al. | Which dataset is this iris image from? | |
Kolivand et al. | Improved methods for finger vein identification using composite Median-Wiener filter and hierarchical centroid features extraction | |
Anjos et al. | An introduction to vein presentation attacks and detection | |
Benlamoudi | Multi-modal and anti-spoofing person identification | |
Askarin et al. | Planting attack on latent fingerprints | |
Akintoye et al. | Challenges of finger vein recognition system: a theoretical perspective | |
Farzadpour et al. | Adaptive thresholding pattern for fingerprint forgery detection |