Biometric Presentation Attack Detection: Beyond the Visible Spectrum

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Face Recognition Beyond the Visible Spectrum

The facial vascular network is highly characteristic to the individual, much like the way his fingerprint is. A non-obtrusive way to capture this information is through thermal imaging. The convective heat transfer effect from the flow of “hot” arterial blood in superficial vessels creates characteristic thermal imprints, which are at a gradient with the surrounding tissue. This casts sigmoid e...

متن کامل

Biometrics beyond the Visible Spectrum: Imaging Technologies and Applications

Human body images acquired at visible spectrum have inherent restrictions that hinder the performance of person recognition systems built using that kind of information (e.g. scene artefacts under varying illumination conditions). One promising approach for dealing with those limitations is using images acquired beyond the visible spectrum. This paper reviews some of the existing human body ima...

متن کامل

Practical View on Face Presentation Attack Detection

Face recognition is one of the most socially accepted forms of biometric recognition. The recent availability of very accurate and efficient face recognition algorithms leaves the vulnerability to presentation attacks as the major challenge to face recognition solutions. Previous works have shown high preforming presentation attack detection PAD solutions under controlled evaluation scenarios. ...

متن کامل

Presentation attack detection in voice biometrics

Recent years have shown an increase in both the accuracy of biometric systems and their practical use. The application of biometrics is becoming widespread with fingerprint sensors in smartphones, automatic face recognition in social networks and video-based applications, and speaker recognition in phone banking and other phone-based services. The popularization of the biometric systems, howeve...

متن کامل

Biometric attack vectors and defences

Much has been reported on attempts to fool biometric sensors with false fingerprints, facial overlays and a myriad of other spoofing approaches. Other attack vectors on biometric systems have, however, had less prominence. This paper seeks to present a broader and more practical view of biometric system attack vectors, placing them in the context of a risk-based systems approach to security and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2020

ISSN: 1556-6013,1556-6021

DOI: 10.1109/tifs.2019.2934867