The growing availability of cheap and reliable fingerprint acquisition scanners is resulting in an increasing spread of Fingerprint-based Authentication Systems (FAS) in consumer electronics. This has giving rise to a new wave in research on both smarter spoofing attacks, aimed to bypass a FAS by using a counterfeit fingerprint, and on more effective Liveness Detectors (LD), aimed to discern authentic (live) fingerprints from fake ones. As in many other computer vision tasks, deep Convolutional Neural Networks (CNN) demonstrated to be very effective also for fingerprint liveness detection. However, we showed that it is possible to adapt adversarial perturbation approaches to mislead CNN-based LD. In this paper, we want to make a step furthe...
Recently, deep learning-based biometric authentication systems, especially fingerprint authenticatio...
A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is desc...
Fingerprint Liveness detection, or presentation attacks detection (PAD), that is, the ability of det...
The growing availability of cheap and reliable fingerprint acquisition scanners is resulting in an i...
The natural instinct of every human being is to want to protect themselves from their surroundings. ...
With the advent of the deep learning era, Fingerprint-based Authentication Systems (FAS) equipped wi...
Scientific literature lacks of countermeasures specifically for fingerprint presentation attacks (PA...
Fingerprint based biometric identification systems are vulnerable to spoofing attacks that involve t...
We investigated the threat level of realistic attacks using latent fingerprints against sensors equi...
With the growing use of biometric authentication systems in the recent years, spoof fingerprint dete...
Modern Fingerprint Presentation Attack Detection (FPAD) modules have been particularly successful in...
Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerabili...
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)With the growing use of biometri...
Many hybrid and multimodal biometric recognition techniques have been presented to provide secure an...
Abstract – With the new wave of affordable, small, and easy to use scanners, fingerprint-based biome...
Recently, deep learning-based biometric authentication systems, especially fingerprint authenticatio...
A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is desc...
Fingerprint Liveness detection, or presentation attacks detection (PAD), that is, the ability of det...
The growing availability of cheap and reliable fingerprint acquisition scanners is resulting in an i...
The natural instinct of every human being is to want to protect themselves from their surroundings. ...
With the advent of the deep learning era, Fingerprint-based Authentication Systems (FAS) equipped wi...
Scientific literature lacks of countermeasures specifically for fingerprint presentation attacks (PA...
Fingerprint based biometric identification systems are vulnerable to spoofing attacks that involve t...
We investigated the threat level of realistic attacks using latent fingerprints against sensors equi...
With the growing use of biometric authentication systems in the recent years, spoof fingerprint dete...
Modern Fingerprint Presentation Attack Detection (FPAD) modules have been particularly successful in...
Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerabili...
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)With the growing use of biometri...
Many hybrid and multimodal biometric recognition techniques have been presented to provide secure an...
Abstract – With the new wave of affordable, small, and easy to use scanners, fingerprint-based biome...
Recently, deep learning-based biometric authentication systems, especially fingerprint authenticatio...
A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is desc...
Fingerprint Liveness detection, or presentation attacks detection (PAD), that is, the ability of det...