2018 International Carnahan Conference on Security Technology (ICCST) 2018
DOI: 10.1109/ccst.2018.8585605
|View full text |Cite
|
Sign up to set email alerts
|

Presentation Attack Detection Evaluation on Mobile Devices: Simplest Approach for Capturing and Lifting a Latent Fingerprint

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 2 publications
0
11
0
Order By: Relevance
“…The effectiveness of this new spoofing technique was confirmed later by [7], in which the authors simulated an attack against five different smartphones by collectiong the latent fingerprints from the device screens. In particular, the technique used by [7] was based on a scanner app to take the picture with flash of the latent fingerprint. The acquired image was then improved by removing the background and other adjustments.…”
Section: Spoofing By Snapshot Pictures Of Latent Printsmentioning
confidence: 84%
See 3 more Smart Citations
“…The effectiveness of this new spoofing technique was confirmed later by [7], in which the authors simulated an attack against five different smartphones by collectiong the latent fingerprints from the device screens. In particular, the technique used by [7] was based on a scanner app to take the picture with flash of the latent fingerprint. The acquired image was then improved by removing the background and other adjustments.…”
Section: Spoofing By Snapshot Pictures Of Latent Printsmentioning
confidence: 84%
“…On the other hand, this kind of attack has a low probability to be executed since it requires the cooperation of the victim; therefore, it can be considered a high-risk attack with a very low probability of execution. Recently, several videos posted on social networks have shown that very good spoofs can be obtained from latent fingerprints, and such spoofs allowed to crack smartphones of famous brands [4,9,7]. Worth noting, the spoofs lifted from latent prints were also investigated in the 2013 edition of LivDet [5].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…They provide the possibility of integrating fingerprint with GPS via Arduino and achieved 1.39 seconds average response time. Goicoechea-Telleria et al [11] investigate how fingerprint adoption in smartphones becomes a worry some due to sensor issues. Hwang et al [12] provide a template for achieving higher accuracy in fingerprint recognition for mobile devices.…”
Section: 1fingerprint Biometric Authenticationmentioning
confidence: 99%