2014
DOI: 10.1145/2617756
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Antispoofing Schemes for Fingerprint Recognition Systems

Abstract: Several issues related to the vulnerability of fingerprint recognition systems to attacks have been highlighted in the biometrics literature. One such vulnerability involves the use of artificial fingers, where materials such as Play-Doh, silicone, and gelatin are inscribed with fingerprint ridges. Researchers have demonstrated that some commercial fingerprint recognition systems can be deceived when these artificial fingers are placed on the sensor; that is, the system successfully processes the ensuing finge… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
164
0
5

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 271 publications
(179 citation statements)
references
References 101 publications
0
164
0
5
Order By: Relevance
“…for fingerprint recognition [3], face recognition [4] and speaker recognition [5]. The intention is also to stimulate further work, particularly the development of standard metrics, protocols and datasets for evaluating progress.…”
Section: Introductionmentioning
confidence: 99%
“…for fingerprint recognition [3], face recognition [4] and speaker recognition [5]. The intention is also to stimulate further work, particularly the development of standard metrics, protocols and datasets for evaluating progress.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, they 38 focus on local minutiae-based matching algorithms, which provide good performance with 39 an excellent trade-off between efficacy and efficiency. EmanuelaMarasco et al, 2014 [10] numerous issues related to the exposure of fingerprint recognition systems to attacks had been high-lighted in the biometrics nonfiction. One such susceptibility comprises the use of artificial fingers, where materials such as playdoh, silicone, and gel were decorated with fingerprint ridges.…”
Section: Figure-1 Convolution Based Filtration Of Latent Fingerprintsmentioning
confidence: 99%
“…Two dimensional DWT decays an image into sub-bands that are localized in frequency and orientation. The [10] decomposition of images into different frequency ranges documents the isolation of the frequency mechanisms introduced by "essential distortions" or "extrinsic factors" into certain sub-bands. These process consequences in isolating small changes in an image mainly in high occurrence sub-band images.…”
Section: Pre-processing Various Techniquesmentioning
confidence: 99%