2012
DOI: 10.1109/tpami.2011.161
|View full text |Cite
|
Sign up to set email alerts
|

Altered Fingerprints: Analysis and Detection

Abstract: Abstract-The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that these systems are not compromised. While several issues related to fingerprint system security have been investigated, including the use of fake fingerprints for masquerading identity, the problem of fingerprint alteration or obfuscation has received very little attention. Fingerprint obfuscation refers to the deliberate alteratio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 113 publications
(12 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…It involves both intentional and unintentional changes on a face through which one can either obfuscate his/her identity and/or impersonate someone else's identity. In either case, facial disguise falls under the broader category of biometric obfuscation [22]. Figure 1 shows an example of face obfuscation where the appearance of a subject can vary by using different disguise accessories.…”
Section: Introductionmentioning
confidence: 99%
“…It involves both intentional and unintentional changes on a face through which one can either obfuscate his/her identity and/or impersonate someone else's identity. In either case, facial disguise falls under the broader category of biometric obfuscation [22]. Figure 1 shows an example of face obfuscation where the appearance of a subject can vary by using different disguise accessories.…”
Section: Introductionmentioning
confidence: 99%
“…It can also be observed that the insignificant features of truncated fingerprints may easily disappear after performing image reconstruction and enhancement procedures. Nevertheless, existing detection algorithms [10,11] for fingerprint image analysis always focused on checking the adequate feature number of minutiae/ridges [12,13] or image qualities [14,15,16], and most of algorithms spend a lot of time on determining the validity of a fingerprint [17,18,19]. For example, one of the most reliable fingerprint quality inspection systems is the Fingerprint Image Quality (NFIQ) [20] which was developed and maintained by National Institute of Standard and Technology (NIST) in United States.…”
Section: Introductionmentioning
confidence: 99%
“…Compared with other biometric techniques, brain recognition is more resistant to forgery (e.g., fake fingerprints [15]) and spoofing (e.g., face disguise [16]). Brain recognition is also more reliable to identify the escapee since one's brain can hardly be modified, whereas other biologic traits may be altered, such as altered fingerprints [17]. Palaniappan and Mandic [18] established a Visual Evoked Potential- (VEP-) based biometrics, and simulations have indicated the significant potential of brain electrical activity as a biometric tool.…”
Section: Introductionmentioning
confidence: 99%