Scientific literature lacks of countermeasures specifically for fingerprint presentation attacks (PAs) realized with non-cooperative methods; even though, in realistic scenarios, it is unlikely that individuals would agree to duplicate their fingerprints. For example, replicas can be created from finger marks left on a surface without the person's knowledge. Existing anti-spoofing mechanisms are trained to detect presentation attacks realized with cooperation of the user and are assumed to be able to identify non-cooperative spoofs as well. In this regard, latent prints are perceived to be of low quality and less likely to succeed in gaining unauthorized access. Thus, they are expected to be blocked without the need of a particular presenta...
Using mobile devices, people leave latent fingerprints on the screen that can be photographed and us...
A fingerprint verification system is vulnerable to attacks led through the fingertip replica of an e...
The rapid growth of fingerprint authentication-based applications makes presentation attack detectio...
Scientific literature lacks of countermeasures specifically for fingerprint presentation attacks (PA...
Fingerprint presentation attack detection has become significant due to a wide-spread usage of finge...
We investigated the threat level of realistic attacks using latent fingerprints against sensors equi...
Modern Fingerprint Presentation Attack Detection (FPAD) modules have been particularly successful in...
The growing availability of cheap and reliable fingerprint acquisition scanners is resulting in an i...
A presentation attack consists in submitting to the fingerprint capture device an artificial replica o...
With the advent of the deep learning era, Fingerprint-based Authentication Systems (FAS) equipped wi...
This chapter provides an introduction to Presentation Attack Detection (PAD), also coined anti-spoof...
The diffusion of fingerprint verification systems for security applications makes it urgent to inves...
Fingerprint Liveness detection, or presentation attacks detection (PAD), that is, the ability of det...
Several issues related to the vulnerability of fingerprint recognition systems to attacks have been ...
The natural instinct of every human being is to want to protect themselves from their surroundings. ...
Using mobile devices, people leave latent fingerprints on the screen that can be photographed and us...
A fingerprint verification system is vulnerable to attacks led through the fingertip replica of an e...
The rapid growth of fingerprint authentication-based applications makes presentation attack detectio...
Scientific literature lacks of countermeasures specifically for fingerprint presentation attacks (PA...
Fingerprint presentation attack detection has become significant due to a wide-spread usage of finge...
We investigated the threat level of realistic attacks using latent fingerprints against sensors equi...
Modern Fingerprint Presentation Attack Detection (FPAD) modules have been particularly successful in...
The growing availability of cheap and reliable fingerprint acquisition scanners is resulting in an i...
A presentation attack consists in submitting to the fingerprint capture device an artificial replica o...
With the advent of the deep learning era, Fingerprint-based Authentication Systems (FAS) equipped wi...
This chapter provides an introduction to Presentation Attack Detection (PAD), also coined anti-spoof...
The diffusion of fingerprint verification systems for security applications makes it urgent to inves...
Fingerprint Liveness detection, or presentation attacks detection (PAD), that is, the ability of det...
Several issues related to the vulnerability of fingerprint recognition systems to attacks have been ...
The natural instinct of every human being is to want to protect themselves from their surroundings. ...
Using mobile devices, people leave latent fingerprints on the screen that can be photographed and us...
A fingerprint verification system is vulnerable to attacks led through the fingertip replica of an e...
The rapid growth of fingerprint authentication-based applications makes presentation attack detectio...