2011 International Conference on Hand-Based Biometrics 2011
DOI: 10.1109/ichb.2011.6094347
|View full text |Cite
|
Sign up to set email alerts
|

Using the Number of Pores on Fingerprint Images to Detect Spoofing Attacks

Abstract: Due to the growing use of biometric technologies in our modern society, spoofing attacks are becoming a serious concern. Many solutions have been proposed to detect the use of fake "fingerprints" on an acquisition device. In this paper, we propose to take advantage of intrinsic features of friction ridge skin: pores. The aim of this study is to investigate the potential of using pores to detect spoofing attacks.Results show that the use of pores is a promising approach. Four major observations were made: First… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0
1

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 48 publications
(29 citation statements)
references
References 24 publications
0
28
0
1
Order By: Relevance
“…Given that most of the previous proposals focused on fingerprint spoofing detection, we compare our proposal with three contact-based fingerprint aliveness detection approaches [15][16][17] and one [9] contactless one. The authors in [15,16] present approaches based on 2D imaging and fingerprint ridge-line pattern information. The performance achieved is less competitive but these approaches present the advantage of not needing a dedicated sensor for spoofing detection and that the recognition and the spoofing detection are made by using the same sensor.…”
Section: Summary Of Results and Comparisonmentioning
confidence: 99%
“…Given that most of the previous proposals focused on fingerprint spoofing detection, we compare our proposal with three contact-based fingerprint aliveness detection approaches [15][16][17] and one [9] contactless one. The authors in [15,16] present approaches based on 2D imaging and fingerprint ridge-line pattern information. The performance achieved is less competitive but these approaches present the advantage of not needing a dedicated sensor for spoofing detection and that the recognition and the spoofing detection are made by using the same sensor.…”
Section: Summary Of Results and Comparisonmentioning
confidence: 99%
“…Fingerprint features can be classified into three levels: (i) Level 1: coarse features such as orientation field, (ii) Level 2: minutiae (ends or bifurcations of the ridges), and (iii) Level 3: micro level characteristics of the fingerprints, such as pores and dots. In the liveness detection problem, the interest in the level 3 features ([6, 7,8]) is due to the increased difficulty in faking such micro details in the spoof.…”
Section: Proposed Spoof Detection Methodsmentioning
confidence: 99%
“…Memon et al extended Manivanan's study by attempting to determine the optimum threshold value to detect the correlation peaks corresponding to active pores [Memon et al 2011;Memon 2012]. Espinoza and Champod [2011b] proposed a spoof detection method based on comparing pore quantity between spoof and live fingerprint images .…”
Section: Quality Basedmentioning
confidence: 98%