Biometric Presentation Attack Detection: Beyond the Visible Spectrum
نویسندگان
چکیده
منابع مشابه
Face Recognition Beyond the Visible Spectrum
The facial vascular network is highly characteristic to the individual, much like the way his fingerprint is. A non-obtrusive way to capture this information is through thermal imaging. The convective heat transfer effect from the flow of “hot” arterial blood in superficial vessels creates characteristic thermal imprints, which are at a gradient with the surrounding tissue. This casts sigmoid e...
متن کاملBiometrics beyond the Visible Spectrum: Imaging Technologies and Applications
Human body images acquired at visible spectrum have inherent restrictions that hinder the performance of person recognition systems built using that kind of information (e.g. scene artefacts under varying illumination conditions). One promising approach for dealing with those limitations is using images acquired beyond the visible spectrum. This paper reviews some of the existing human body ima...
متن کاملPractical View on Face Presentation Attack Detection
Face recognition is one of the most socially accepted forms of biometric recognition. The recent availability of very accurate and efficient face recognition algorithms leaves the vulnerability to presentation attacks as the major challenge to face recognition solutions. Previous works have shown high preforming presentation attack detection PAD solutions under controlled evaluation scenarios. ...
متن کاملPresentation attack detection in voice biometrics
Recent years have shown an increase in both the accuracy of biometric systems and their practical use. The application of biometrics is becoming widespread with fingerprint sensors in smartphones, automatic face recognition in social networks and video-based applications, and speaker recognition in phone banking and other phone-based services. The popularization of the biometric systems, howeve...
متن کاملBiometric attack vectors and defences
Much has been reported on attempts to fool biometric sensors with false fingerprints, facial overlays and a myriad of other spoofing approaches. Other attack vectors on biometric systems have, however, had less prominence. This paper seeks to present a broader and more practical view of biometric system attack vectors, placing them in the context of a risk-based systems approach to security and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2020
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2019.2934867