2021
DOI: 10.1109/access.2020.3048756
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks

Abstract: Fingerprint-based biometric systems have experienced a large development in the past. In spite of many advantages, they are still vulnerable to attack presentations (APs). Therefore, the task of determining whether a sample stems from a live subject (i.e., bona fide) or from an artificial replica is a mandatory requirement which has recently received a considerable attention. Nowadays, when the materials for the fabrication of the Presentation Attack Instruments (PAIs) have been used to train the Presentation … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
5

Relationship

5
5

Authors

Journals

citations
Cited by 46 publications
(31 citation statements)
references
References 40 publications
0
30
0
Order By: Relevance
“…For this purpose, the SVM [ 52 ] is used as a classifier, since it constantly achieved remarkable performances across different fingerprint PAD studies [ 34 , 35 , 53 , 54 , 55 , 56 , 57 ]. The SVM is designed to work on high-dimensional input data and derive binary decisions by defining a hyperplane that separates both classes.…”
Section: Presentation Attack Detection Methodsmentioning
confidence: 99%
“…For this purpose, the SVM [ 52 ] is used as a classifier, since it constantly achieved remarkable performances across different fingerprint PAD studies [ 34 , 35 , 53 , 54 , 55 , 56 , 57 ]. The SVM is designed to work on high-dimensional input data and derive binary decisions by defining a hyperplane that separates both classes.…”
Section: Presentation Attack Detection Methodsmentioning
confidence: 99%
“…Therefore, to assign a new point to a cluster, K-means calculates its distance with the closest centroids. The K-means computational complexity is O(kN ) and due to its rapid convergence, this clustering algorithm has been widely used in numerous computer vision and pattern recognition tasks [58]- [60]. In our work, the centroids represent a codebook for a particular sub-space.…”
Section: K-meansmentioning
confidence: 99%
“…The test sample is then processed in the same way and the classifier validates whether the current sample is similar enough to the ones seen during training. The idea is that PA samples differ from bona fide ones [11] 2016 One-class SVMs + score fusion [12] CNNs, unknown PAs, cross sensor/DB [13] 2019 One-class GANs [14] Patch-based LSTM + CNN, LOO [15] Fingerprint Spoof Buster, LOO + best subset [16,17] Feature encoding, unknown PAs, cross sensor/DB [18] 2020 CNN, ARL, unknown PAs, cross sensor/DB [19] One-class convolutional autoencoder [20] and thus can be detected. Using one-class support vector machines (SVMs), Ding and Ross [12] trained on twelve different feature sets of the LivDet 2011 database [23].…”
Section: Related Workmentioning
confidence: 99%