2021
DOI: 10.1049/bme2.12023
|View full text |Cite
|
Sign up to set email alerts
|

Local feature encoding for unknown presentation attack detection: An analysis of different local feature descriptors

Abstract: In spite of the advantages of using fingerprints for subject authentication, several works have shown that fingerprint recognition systems can be easily circumvented by means of artificial fingerprints or presentation attack instruments (PAIs). In order to address that threat, the existing presentation attack detection (PAD) methods have reported a high detection performance when materials used for the fabrication of PAIs and capture devices are known. However, for more complex and realistic scenarios where on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 48 publications
0
8
0
Order By: Relevance
“…Ghiani et al [78] conducted experiments with features based on pore detection, ridge wavelets and several textural features. They concluded that the best method was LBP, although it has the disadvantages of being sensitive to image rotation and the need for longer computational time due to its long histogram.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Ghiani et al [78] conducted experiments with features based on pore detection, ridge wavelets and several textural features. They concluded that the best method was LBP, although it has the disadvantages of being sensitive to image rotation and the need for longer computational time due to its long histogram.…”
Section: Discussionmentioning
confidence: 99%
“…Researchers have found that the textural features [Figure 7] of the fingertip, such as smoothness and morphology, can be used to distinguish real fingerprints from artificial ones [78,79] . Methods belonging to this category make use of such textural features.…”
Section: Textural Featuresmentioning
confidence: 99%
“…For this purpose, the SVM [ 52 ] is used as a classifier, since it constantly achieved remarkable performances across different fingerprint PAD studies [ 34 , 35 , 53 , 54 , 55 , 56 , 57 ]. The SVM is designed to work on high-dimensional input data and derive binary decisions by defining a hyperplane that separates both classes.…”
Section: Presentation Attack Detection Methodsmentioning
confidence: 99%
“…However, when focussing on unknown attacks and cross-sensor and cross-database scenarios, it is clear that handcrafted methods are able to outperform deep learning approaches, as was shown by the winner of the LivDet 2019 competition [34]. This work was further extended in [35] to include even more features into the fisher vector encoding before classifying these with a support vector machine (SVM). In the area of deep learning, Chugh and Jain [40] proposed their Fingerprint Spoof Buster as a patch-based convolutional neural network (CNN) together with two datasets, MSU-FPAD and PBSKD.…”
Section: Related Workmentioning
confidence: 99%
“…To tackle those issues, we focus on a different approach that has shown remarkable results for challenging scenarios such as cross‐dataset and unknown PAI species for fingerprint PAD [21, 22]. That work used a combination of local feature descriptors and global feature representation models with a new feature space in which the generalisation capabilities of the PAD module are enhanced.…”
Section: Introductionmentioning
confidence: 99%