2017 International Conference on Communication and Signal Processing (ICCSP) 2017
DOI: 10.1109/iccsp.2017.8286604
|View full text |Cite
|
Sign up to set email alerts
|

Haar wavelet transform based histogram concatenation model for finger print spoofing detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…Because of this, most security systems provide some kind of protection such as hashing, digital signature or encryption that are ineffective in spoof attacks [5]. In the last few years there has been an intensive research to provide reliable anti-spoofing systems for biometric traits, including fingerprints [6,7], face [8][9][10], and other biometric features [11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…Because of this, most security systems provide some kind of protection such as hashing, digital signature or encryption that are ineffective in spoof attacks [5]. In the last few years there has been an intensive research to provide reliable anti-spoofing systems for biometric traits, including fingerprints [6,7], face [8][9][10], and other biometric features [11][12][13].…”
Section: Introductionmentioning
confidence: 99%