2018
DOI: 10.2478/jaiscr-2018-0023
|View full text |Cite
|
Sign up to set email alerts
|

Deep Features Extraction for Robust Fingerprint Spoofing Attack Detection

Abstract: Biometric systems have been widely considered as a synonym of security. However, in recent years, malicious people are violating them by presenting forged traits, such as gelatin fingers, to fool their capture sensors (spoofing attacks). To detect such frauds, methods based on traditional image descriptors have been developed, aiming liveness detection from the input data. However, due to their handcrafted approaches, most of them present low accuracy rates in challenging scenarios. In this work, we propose a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…In the proposed method, the running time for 18,000 features is increased to 45 s which is slightly high which is still the future direction to reduce the time computation. While, the running time of UniNap1 [31], ATVS [32], Dermalog [31], CAoS [32] time of the proposed method is faster than other methods.…”
Section: Resultsmentioning
confidence: 89%
See 1 more Smart Citation
“…In the proposed method, the running time for 18,000 features is increased to 45 s which is slightly high which is still the future direction to reduce the time computation. While, the running time of UniNap1 [31], ATVS [32], Dermalog [31], CAoS [32] time of the proposed method is faster than other methods.…”
Section: Resultsmentioning
confidence: 89%
“…Table 3 demonstrates the detection accuracy evaluated with Biometrika, Italdata, Crossmatch, and Swipe datasets. The average classification error (ACE) is used to evaluate the performance of the UniNap1 [31], ATVS [32], Dermalog [31], CAoS [32], and proposed methods. From Table 3, we note that the proposed method is better than other methods.…”
Section: Resultsmentioning
confidence: 99%
“…Ehret et al in [19] introduced a technique that relies on SIFT, which provides sparse keypoints with scale, rotation, and illumination invariant descriptors for forgery detection. A method for fingerprint faking detection utilizing deep Boltzmann machines (DBM) for image analysis of high-level characteristics is proposed in [20]. Balsa et al in [21] compared the DCT, Walsh-Hadamard transform (WHT), Haar wavelet transform (DWT), and discrete Fourier transform (DFT) for analog image transmission, changing compression and comparing quality.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The system's task is to monitor the activity within a network of connected computers so as to analyze the activity of intrusive patterns. In [23], an attempt was made to detect fraud in biometric systems. To detect this type of fraud, the authors propose a novel method for fingerprint spoofing detection using the Deep Boltzmann Machines (DBM) for the extraction of high-level features from images.…”
Section: Related Workmentioning
confidence: 99%