2021
DOI: 10.1109/tifs.2021.3121201
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprint Recognition With Embedded Presentation Attacks Detection: Are We Ready?

Abstract: on the probabilistic modeling of the relationships among the Receiver Operating Characteristics (ROC) of the two individual systems when PAD and verification stages are implemented sequentially. As a matter of fact, this is the most straightforward, flexible, and widespread approach. We carry out simulations on the PAD algorithms' ROCs submitted to the most recent editions of LivDet (2017-2019), the state-of-the-art NIST Bozorth3, and the top-level Veryfinger 12 matchers. Reported experiments explore significa… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(15 citation statements)
references
References 30 publications
1
11
0
Order By: Relevance
“…However, the current version of Bio-WISE and, in general, the findings of Ref. [12] and related previous works [6]- [10], [13], [14] do not allow assessing for which PAD's operational points the overall GAR degradation can be still acceptable, with the advantage of handling presentation attacks. The key question is: what is the best way to embed a PAD into a recognition system so that the final product is robust to spoofing (IAPAR low enough), without suffering from significantly reduced gen-uine recognition accuracy (GAR still acceptable)?…”
Section: Introductionmentioning
confidence: 90%
See 3 more Smart Citations
“…However, the current version of Bio-WISE and, in general, the findings of Ref. [12] and related previous works [6]- [10], [13], [14] do not allow assessing for which PAD's operational points the overall GAR degradation can be still acceptable, with the advantage of handling presentation attacks. The key question is: what is the best way to embed a PAD into a recognition system so that the final product is robust to spoofing (IAPAR low enough), without suffering from significantly reduced gen-uine recognition accuracy (GAR still acceptable)?…”
Section: Introductionmentioning
confidence: 90%
“…Up to date, it is difficult to draw the effect on several possible scenarios; in other words, having a clear idea of the conditions for which this embedding may lead to a real gain, that is, an advantage with respect to neglect the presentation attack problem. To fill this gap, we presented in [12] a novel simulation approach based on the probability modeling of receiver operating characteristic (ROC) curves of PADs and verification systems. The goal was to simulate the performance of a sequentially integrated system.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…• assessing the robustness of anti-spoofing methods against novel presentation attacks in terms of fabrication strategy, adopted materials, sensor technology; for instance, in [27] it has been shown that the PAD error rates of software-based approaches can show a three-fold increase when tested on PA materials not seen during training; • designing effective methods to embed PAD in fingerprint verification systems [68], including the need for computationally efficient PAD techniques, to be used on low-resources systems such as embedded devices and low-cost smartphones; • improving explainability of PAD systems; the use of CNNs is providing great benefits to fingerprint PAD performance, but such solutions are usually considered as "black boxes" shedding little light on how and why they actually work.…”
Section: Early Work In Fingerprint Presentation Attack Detectionmentioning
confidence: 99%