2015 9th International Symposium on Image and Signal Processing and Analysis (ISPA) 2015
DOI: 10.1109/ispa.2015.7306037
|View full text |Cite
|
Sign up to set email alerts
|

Improving fingerprint alteration detection

Abstract: Abstract-Fingerprint alteration is a type of presentation attack in which the attacker strives to avoid identification, e.g. at border control or in forensic investigations. As a countermeasure, fingerprint alteration detection aims to automatically discover the occurrence of such attacks by classifying fingerprint images as 'normal' or 'altered'. In this paper, we propose four new features for improving the performance of fingerprint alteration detection modules. We evaluate the usefulness of these features o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…A typical fingerprint recognition system (FRS) performs fingerprint segmentation [ 55 ], orientation field estimation, image enhancement, minutiae extraction and fingerprint matching [ 56 60 ]. Methods for fingerprint liveness detection and fingerprint alteration detection [ 61 ] can be considered as add-on modules to a FRS which aim to protect against these two types of presentation attacks [ 24 ]. The mean computational runtime for computing a CCP histogram with n = 9 pixels patch size and b = 8 comparisons is 0.7 seconds per image for the Biometrika database and 0.8 seconds per image for the Crossmatch and Italdata databases.…”
Section: Resultsmentioning
confidence: 99%
“…A typical fingerprint recognition system (FRS) performs fingerprint segmentation [ 55 ], orientation field estimation, image enhancement, minutiae extraction and fingerprint matching [ 56 60 ]. Methods for fingerprint liveness detection and fingerprint alteration detection [ 61 ] can be considered as add-on modules to a FRS which aim to protect against these two types of presentation attacks [ 24 ]. The mean computational runtime for computing a CCP histogram with n = 9 pixels patch size and b = 8 comparisons is 0.7 seconds per image for the Biometrika database and 0.8 seconds per image for the Crossmatch and Italdata databases.…”
Section: Resultsmentioning
confidence: 99%
“…In Tables 1 and 2, we report key features for the four typical strategies. For the stopping criterion (C1), we have used κ( ⋅ ) < 0.95 with κ from (11). This can be viewed as an extrinsic…”
Section: Compression Resultsmentioning
confidence: 99%
“…3. Adjust the QD model to the initial OF by minimising a suitable objective function, given by (11), see (Fig. 3c).…”
Section: Manually Marking Of Ofsmentioning
confidence: 99%
See 2 more Smart Citations