A survey on antispoofing schemes for fingerprint recognition systems

E Marasco, A Ross - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …

Presentation attack detection methods for fingerprint recognition systems: a survey

C Sousedik, C Busch - Iet Biometrics, 2014 - Wiley Online Library
Nowadays, fingerprint biometrics is widely used in various applications, varying from
forensic investigations and migration control to access control as regards security sensitive …

Attacks and defenses in user authentication systems: A survey

X Wang, Z Yan, R Zhang, P Zhang - Journal of Network and Computer …, 2021 - Elsevier
User authentication systems (in short authentication systems) have wide utilization in our
daily life. Unfortunately, existing authentication systems are prone to various attacks while …

A novel weber local binary descriptor for fingerprint liveness detection

Z Xia, C Yuan, R Lv, X Sun, NN Xiong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In recent years, fingerprint authentication systems have been extensively deployed in
various applications, including attendance systems, authentications on smartphones, mobile …

[HTML][HTML] A comprehensive survey of fingerprint presentation attack detection

K Karampidis, M Rousouliotis, E Linardos… - … , Security and Safety, 2021 - oaepublish.com
Nowadays, the number of people that utilize either digital applications or machines is
increasing exponentially. Therefore, trustworthy verification schemes are required to ensure …

A comparative study of shallow learning and deep transfer learning techniques for accurate fingerprints vitality detection

D Impedovo, V Dentamaro, G Abbattista… - Pattern Recognition …, 2021 - Elsevier
This work inspects deep learning architectures and shallow learning techniques to
determine whether the image of a fingerprint is real (Live) or not (Fake). It is known that …

An incremental learning method for spoof fingerprint detection

JB Kho, W Lee, H Choi, J Kim - Expert systems with applications, 2019 - Elsevier
Spoof fingerprint detectors based on static features are built by learning a set of live and fake
fingerprint images. These learning-based spoof detectors cannot accurately classify new or …

[HTML][HTML] A-iLearn: An adaptive incremental learning model for spoof fingerprint detection

S Agarwal, A Rattani, CR Chowdary - Machine Learning with Applications, 2022 - Elsevier
Incremental learning enables the learner to accommodate new knowledge without retraining
the existing model. It is a challenging task that requires learning from new data and …

Low-cost and efficient hardware solution for presentation attack detection in fingerprint biometrics using special lighting microscopes

I Goicoechea-Telleria, K Kiyokawa, J Liu-Jimenez… - IEEE …, 2019 - ieeexplore.ieee.org
Biometric recognition is already a big player in how we interact with our phones and access
control systems. This is a result of its comfort of use, speed, and security. For the case of …

A pore-based method for fingerprint liveness detection

M Lu, Z Chen, W Sheng - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Fingerprint scanners usually suffer from spoofing attack of fake fingerprints. To address this
issue, a pore based liveness detection method has been proposed in this paper. The …