Fingerprint liveness detection schemes: A review on presentation attack

DS Ametefe, SS Sarnin, DM Ali… - Computer Methods in …, 2022 - Taylor & Francis
Extant literature has highlighted the vulnerability of Automatic Fingerprint Identification
System (AFIS) to various forms of attacks, indicating presentation attack as the most …

New hierarchical finger-vein feature extraction method for iVehicles

CH Hsia, CH Liu - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
With the advancement of multimedia and digital technology, traditional vehicles are
gradually replaced by intelligent ones. As people attach increasing importance to …

Query2set: Single-to-multiple partial fingerprint recognition based on attention mechanism

S Chen, Z Guo, X Li, D Yang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Currently, fingerprint authentication systems in mobile devices, which have limited-size
fingerprint sensors, are mainly based on partial fingerprint matching algorithms. To cover all …

Sweat gland extraction from optical coherence tomography using convolutional neural network

Y Zhang, X Li, H Wang, R Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
As the Level 3 features of fingerprint, sweat pores have attracted attention in the field of
fingerprint recognition and have been successfully applied to automatic fingerprint …

Reproducibility of fingerprint microfeatures

J Kaur, M Dhall - Egyptian Journal of Forensic Sciences, 2022 - Springer
Background Poroscopy, as a means of personal identification, is largely unexplored. The
present study aims at assessing the reproducibility of fingerprint microfeatures namely, pore …

Variants of neural networks: a review

BH Nayef, SNHS Abdullah, R Sulaiman… - Malaysian Journal of …, 2022 - mojem.um.edu.my
Abstract Machine learning (ML) techniques are part of artificial intelligence. ML involves
imitating human behavior in solving different problems, such as object detection, text …

Methods and applications of fingertip subcutaneous biometrics based on optical coherence tomography

Y Yu, H Wang, Y Zhang, R Liang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Degraded skin conditions and advanced forgery technologies have reduced the stability and
security of identity authentication based on external biometrics of the fingertip, including …

A novel high-resolution fingerprint representation method

F Liu, G Liu, W Zhang, L Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Current high-resolution fingerprints are almost entirely represented by sweat pores, resulting
in information loss and weak robustness. This is caused by dividing fingerprint …

Fingerprint analysis and representation

D Maltoni, D Maio, AK Jain, J Feng - Handbook of fingerprint recognition, 2022 - Springer
This chapter introduces classical domain knowledge-based and emerging learning-based
techniques for feature extraction in fingerprints. Specific sections are dedicated to explain …

Fingerprint Pore Detection: A Survey

A Ibragimov, MP Segundo - arXiv preprint arXiv:2211.14716, 2022 - arxiv.org
This work presents the first survey on fingerprint pore detection. The survey provides a
general overview of the field and discusses methods, datasets, and evaluation protocols. We …