The purpose of this research is to assess the vulnerabilities of a high resolution fingerprint sensor when confronted with fake fingerprints. The study has not been focused on the decision outcome of the biometric device, but essentially on the scores obtained following the comparison between a query (genuine or fake) and a template using an AFIS system. To do this, fake fingerprints of 12 subjects have been produced with and without their cooperation. These fake fingerprints have been used alongside with real fingers. The study led to three major observations: First, genuine fingerprints produced scores higher than fake fingers (translating a closer proximity) and this tendency is observed considering each subject separately. Second, score...
The natural instinct of every human being is to want to protect themselves from their surroundings. ...
Several issues related to the vulnerability of fingerprint recognition systems to attacks have been ...
The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or...
The purpose of this research is to assess the vulnerabilities of a high resolution fingerprint senso...
A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is desc...
A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is desc...
Fingerprints have been used for decades to verify the identity of an individual for various security...
Biometrics deals with identifying individuals with help of their biological data. Fingerprint scanni...
Biometrics deals with identifying individuals with help of their biological data. Fingerprint scanni...
Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric ide...
Biometric recognition deals with the use of distinctive physiological and behavioral characteristic...
Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric ide...
Attacking fingerprint-based biometric systems by presenting fake fingers at the sensor could be a se...
Attacking fingerprint-based biometric systems by presenting fake fingers at the sensor could be a se...
Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerabili...
The natural instinct of every human being is to want to protect themselves from their surroundings. ...
Several issues related to the vulnerability of fingerprint recognition systems to attacks have been ...
The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or...
The purpose of this research is to assess the vulnerabilities of a high resolution fingerprint senso...
A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is desc...
A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is desc...
Fingerprints have been used for decades to verify the identity of an individual for various security...
Biometrics deals with identifying individuals with help of their biological data. Fingerprint scanni...
Biometrics deals with identifying individuals with help of their biological data. Fingerprint scanni...
Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric ide...
Biometric recognition deals with the use of distinctive physiological and behavioral characteristic...
Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric ide...
Attacking fingerprint-based biometric systems by presenting fake fingers at the sensor could be a se...
Attacking fingerprint-based biometric systems by presenting fake fingers at the sensor could be a se...
Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerabili...
The natural instinct of every human being is to want to protect themselves from their surroundings. ...
Several issues related to the vulnerability of fingerprint recognition systems to attacks have been ...
The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or...