2020
DOI: 10.48550/arxiv.2005.08337
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Survey on Unknown Presentation Attack Detection for Fingerprint

Abstract: Fingerprint recognition systems are widely deployed in various reallife applications as they have achieved high accuracy. The widely used applications include border control, automated teller machine (ATM), and attendance monitoring systems. However, these critical systems are prone to spoofing attacks (a.k.a presentation attacks (PA)). PA for fingerprint can be performed by presenting gummy fingers made from different materials such as silicone, gelatine, play-doh, ecoflex, 2D printed paper, 3D printed materi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…We note that this paper is unique in that it aggregates and examines the main components of a trustworthy biometric recognition system into one manuscript. Indeed many surveys [13,[35][36][37][38][39][40][41][42][43] have been written in great detail on each one of these topics individually, however we posit that there is benefit in extracting the key points from each of these areas and summarizing them in one place such that researchers can very quickly and easily assess the current state of trustworthy biometric recognition systems. Furthermore, many of the existing survey papers on these individual topics have become outdated.…”
Section: Pressure Expressionmentioning
confidence: 99%
See 2 more Smart Citations
“…We note that this paper is unique in that it aggregates and examines the main components of a trustworthy biometric recognition system into one manuscript. Indeed many surveys [13,[35][36][37][38][39][40][41][42][43] have been written in great detail on each one of these topics individually, however we posit that there is benefit in extracting the key points from each of these areas and summarizing them in one place such that researchers can very quickly and easily assess the current state of trustworthy biometric recognition systems. Furthermore, many of the existing survey papers on these individual topics have become outdated.…”
Section: Pressure Expressionmentioning
confidence: 99%
“…The continued success in spoofing modern day biometric recognition systems is not a consequence of a lack of research into developing presentation attack detection (PAD) systems. Indeed the past couple of decades have seen a plethora of research into developing PAD systems which can automatically detect and flag a spoof attack prior to performing authentication or identification [35,36,[98][99][100]. Typically these approaches are divided into hardware or software based approaches detecting face, fingerprint, and iris spoofs.…”
Section: Presentation Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…A detailed overview of hardware-based fingerprint PAD is presented in [19], hence we focus on unknown attacks [20] and generalisation approaches in this work. A summary of these works is given in Table 1.…”
Section: Related Workmentioning
confidence: 99%
“…Being a binary classification problem (bona fide vs. PA), common PAD approaches are trained on both classes and hence perform only as good as the chosen training set. In this scenario, unknown attacks [7] present only in the test set can significantly trouble the classifier, as it requires good generalisation properties that are hard to achieve. In order to avoid re-training the classifier each time a new PAI species is created, one-class classifiers can be used [8].…”
Section: Introductionmentioning
confidence: 99%