2017 International Joint Conference on Neural Networks (IJCNN) 2017
DOI: 10.1109/ijcnn.2017.7966077
|View full text |Cite
|
Sign up to set email alerts
|

Deep Boltzmann machines for robust fingerprint spoofing attack detection

Abstract: Biometric systems have been widely considered as a synonym of security. However, in recent years, malicious people are violating them by presenting forged traits, such as gelatin fingers, to fool their capture sensors (spoofing attacks). To detect such frauds, methods based on traditional image descriptors have been developed, aiming liveness detection from the input data. However, due to their handcrafted approaches, most of them present low accuracy rates in challenging scenarios. In this work, we propose a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 14 publications
0
14
0
Order By: Relevance
“…In this Section, we briefly describe an approach that we previously proposed in [5] for fingerprint spoofing detection, also based on a DBM for deep features extraction. Actually, in such previous work and different from the actual one, after learning the parameters of the DBM, a final layer was added at the top of such a structure with two softmax units, forming an MLP (Multilayer Perceptron) network, i.e., a complete classifier, to identify normal (class "0") or attack fingerprint patterns (class "1").…”
Section: Previous Workmentioning
confidence: 99%
See 4 more Smart Citations
“…In this Section, we briefly describe an approach that we previously proposed in [5] for fingerprint spoofing detection, also based on a DBM for deep features extraction. Actually, in such previous work and different from the actual one, after learning the parameters of the DBM, a final layer was added at the top of such a structure with two softmax units, forming an MLP (Multilayer Perceptron) network, i.e., a complete classifier, to identify normal (class "0") or attack fingerprint patterns (class "1").…”
Section: Previous Workmentioning
confidence: 99%
“…Basically, given an initial training set of grayscale fingerprint images, the first step consisted in the extraction of their relevant regions [5]. After that, resizing and database augmentation techniques were also applied to improve the network performance and avoid lack of data in training.…”
Section: Previous Workmentioning
confidence: 99%
See 3 more Smart Citations