Deep Features Extraction for Robust Fingerprint Spoofing Attack Detection

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deep Representations for Iris, Face, and Fingerprint Spoofing Detection

In biometrics, Fingerprint is widely used in identification of individual’s identity. Biometric recognition is leading technology for identification and security systems. Fingerprint has unique identification among all other biometric modalities. Use of the fingerprints as biometric characteristics is extensively used and developed for fingerprint recognition in forensic, civilian and commercia...

متن کامل

Implementation of Deep Representation for Iris, Face and Fingerprint Spoofing Detection Open Source Platform

In this Paper, the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect differ...

متن کامل

Robust Deep Feature for Spoofing Detection - The SJTU System for ASVspoof

Recently there have been wide interests in speaker verification for various applications. Although the reported equal error rate (EER) is relatively low, many evidences show that the present speaker verification technologies can be susceptible to malicious spoofing attacks. Inspired by the great success of deep learning in the automatic speech recognition, deep neural network (DNN) based approa...

متن کامل

Robust deep feature for spoofing detection - the SJTU system for ASVspoof 2015 challenge

Recently there have been wide interests in speaker verification for various applications. Although the reported equal error rate (EER) is relatively low, many evidences show that the present speaker verification technologies can be susceptible to malicious spoofing attacks. Inspired by the great success of deep learning in the automatic speech recognition, deep neural network (DNN) based approa...

متن کامل

Fingerprint Features Extraction and Matching

The proposed ridge features are composed of four elements: ridge count, ridge length, ridge curvature direction, and ridge type. For extracting ridge features, we also define the ridge-based coordinate system in a skeletonized image With the proposed ridge features and conventional minutiae features(minutiae type, orientation, and position), we propose a novel matching scheme using a breadth-fi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Artificial Intelligence and Soft Computing Research

سال: 2018

ISSN: 2083-2567

DOI: 10.2478/jaiscr-2018-0023