A Survey on Unknown Presentation Attack Detection for Fingerprint
نویسندگان
چکیده
Fingerprint recognition systems are widely deployed in various real-life applications as they have achieved high accuracy. The used include border control, automated teller machine (ATM), and attendance monitoring systems. However, these critical prone to spoofing attacks (a.k.a presentation (PA)). PA for fingerprint can be performed by presenting gummy fingers made from different materials such silicone, gelatine, play-doh, ecoflex, 2D printed paper, 3D material, or latex. Biometrics Researchers developed Presentation Attack Detection (PAD) methods a countermeasure PA. PAD is usually done training learning classifier known given dataset, achieve accuracy this task. generalizing unknown an essential problem applicability real-world systems, mainly because cannot exhaustively listed advance. In survey we present comprehensive on existing algorithms specifically detecting PAD. We categorize algorithms, point out their advantages/disadvantages, future directions area.
منابع مشابه
Practical View on Face Presentation Attack Detection
Face recognition is one of the most socially accepted forms of biometric recognition. The recent availability of very accurate and efficient face recognition algorithms leaves the vulnerability to presentation attacks as the major challenge to face recognition solutions. Previous works have shown high preforming presentation attack detection PAD solutions under controlled evaluation scenarios. ...
متن کاملA survey of Cyber Attack Detection Strategies
Homeland security field deals with diverse subjects, audio processing, video surveillance, image detection, geolocation determination, and cyber attack detection. Audio processing and video surveillance area are significant for public places safety and land border area. However the big threat for homeland security is cyber attacks. Cyber terror attacks and cyber crime attacks may move over virt...
متن کاملA Survey of Insider Attack Detection Research
This paper surveys proposed solutions for the problem of insider attack detection appearing in the computer security research literature. We distinguish between masqueraders and traitors as two distinct cases of insider attack. After describing the challenges of this problem and highlighting current approaches and techniques pursued by the research community for insider attack detection, we sug...
متن کاملA survey on Pharming attack Detection and prevention methodology
Pharming is an advance phishing attack. It is also known as “phishing without a lure”. A hacker's attempt to change/exploit the DNS settings of a server so that when you enter the address of a legitimate website, it redirects you to a fake/copy of the original site hosted somewhere else. It is a classy edition of phishing attacks – endeavor to take users’ identification like username and passwo...
متن کاملPresentation attack detection in voice biometrics
Recent years have shown an increase in both the accuracy of biometric systems and their practical use. The application of biometrics is becoming widespread with fingerprint sensors in smartphones, automatic face recognition in social networks and video-based applications, and speaker recognition in phone banking and other phone-based services. The popularization of the biometric systems, howeve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communications in computer and information science
سال: 2021
ISSN: ['1865-0937', '1865-0929']
DOI: https://doi.org/10.1007/978-3-030-71711-7_16