2019
DOI: 10.1007/978-3-319-92627-8_3
|View full text |Cite
|
Sign up to set email alerts
|

Optical Coherence Tomography for Fingerprint Presentation Attack Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…However, the utilised capture device does not acquire the fingerprint for biometric recognition purpose. An extensive review on OCT for fingerprint PAD is published by Moolla et al [31]. It should be noted that the high costs of OCT scanners are an explicit disadvantage in contrast to other methods.…”
Section: Hardware-based Fingerprint Padmentioning
confidence: 99%
“…However, the utilised capture device does not acquire the fingerprint for biometric recognition purpose. An extensive review on OCT for fingerprint PAD is published by Moolla et al [31]. It should be noted that the high costs of OCT scanners are an explicit disadvantage in contrast to other methods.…”
Section: Hardware-based Fingerprint Padmentioning
confidence: 99%
“…Based on work in literature [66][71] [72] [73], the use of blue lighting with polarized filters may reduce reflections and allow for a clearer fingerprint. Another alternative is the use of optical coherence tomography (OCT) which could acquire the subsurface fingerprints in a contactless manner and is invariant to moisture and reflection on the surface of the skin [85][86] [87]. However, further improvements in speed, depth of field and component costs would need to be made before OCT is suitable for mass production and usage.…”
Section: ) Device Designmentioning
confidence: 99%
“…Other hardware-based solutions, such as the capture means of biological signals of life, like blood flow and pulse rate detection [45] and electrocardiogram (ECG) [46] or electroencephalogram (EEG) signals [47] , are also discussed in the literature. However, all the biological signals either require expensive capture equipment or in some cases [48] may add a time delay to the user authentication process.…”
Section: Hardware-based Presentation Attack Detectionmentioning
confidence: 99%