2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops 2009
DOI: 10.1109/cvprw.2009.5204312
|View full text |Cite
|
Sign up to set email alerts
|

Identifying sensors from fingerprint images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 30 publications
(14 citation statements)
references
References 6 publications
0
14
0
Order By: Relevance
“…Though this decrease in accuracy is minor but considering that both the cameras are from the same vendor and this variation is caused due to technological advancements (i.e., LG 4000 is an advanced version of LG 2200 camera), this is still significant. Figure 9 shows that on pre-processing the images using the proposed algorithm (with feature set II), 4 Figure 7. ROC curves illustrating the performance of the proposed algorithm using feature set I for cross-camera matching using COTS1 and COTS2 matchers on the IIITD MSI database.…”
Section: Iris Recognition With Camera Interoperabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Though this decrease in accuracy is minor but considering that both the cameras are from the same vendor and this variation is caused due to technological advancements (i.e., LG 4000 is an advanced version of LG 2200 camera), this is still significant. Figure 9 shows that on pre-processing the images using the proposed algorithm (with feature set II), 4 Figure 7. ROC curves illustrating the performance of the proposed algorithm using feature set I for cross-camera matching using COTS1 and COTS2 matchers on the IIITD MSI database.…”
Section: Iris Recognition With Camera Interoperabilitymentioning
confidence: 99%
“…Ross and Nadgir [13] used a thin-plate spine model to address fingerprint sensor interoperability. Bartlow et al [4], on the other hand, generated noise residual reference patterns for different fingerprint sensors. These patterns were used for identifying the sensor using which the test image was captured.…”
Section: Introductionmentioning
confidence: 99%
“…Here is the place to mention the only work on identifying biometric scanners [Bartlow et al 2009] that we are aware of because it uses exactly the same algorithm as the one proposed in [Lukas et al 2006] for identifying digital cameras. Barlow et al applied the algorithm of [Lukas et al 2006] to 16 optical and 4 capacitive fingerprint scanners.…”
Section: Digital Forensicsmentioning
confidence: 99%
“…The admissibility of such evidence is contingent on its integrity, i.e., it should not have been tampered with. The chain of custody [6] of the digital evidence can be established via (i) hardware identification (the device used to acquire the biometric sample) [7], and (ii) analysis at the image level. IPT construction involves imagelevel analysis and can be leveraged to determine the authenticity between a pair of biometric samples i.e., the original versus the tampered.…”
Section: Introductionmentioning
confidence: 99%