A fingerprint presentation attacks detector (FPAD) is designed to obtain a certain performance regardless of the targeted user population. However, two recent works on facial traits showed that a PAD system can exploit very useful information from the targeted user population. In this paper, we explored the existence of that kind of information in fingerprints when textural features are adopted. We show by experiments that such features embed not only intrinsic differences of the given fingerprint replica with respect to a generic live fingerprint, but also contains characteristics present in other fingers of the same user, and characteristics extracted directly from spoofs of the targeted fingerprint itself. These interesting evidences cou...
A presentation attack consists in submitting to the fingerprint capture device an artificial replica o...
Abstract: Nowadays, biometric recognition systems are widely implemented in many personal devices li...
Fingerprints have been used for decades to verify the identity of an individual for various security...
The similarities among different acquisitions of the same fingerprint have never been taken into acco...
Modern Fingerprint Presentation Attack Detection (FPAD) modules have been particularly successful in...
A fingerprint verification system is vulnerable to attacks led through the fingertip replica of an e...
Fingerprint Liveness detection, or presentation attacks detection (PAD), that is, the ability of det...
This chapter provides an introduction to Presentation Attack Detection (PAD), also coined anti-spoof...
Fingerprint recognition systems have been widely deployed in authentication and verification applica...
With the advent of the deep learning era, Fingerprint-based Authentication Systems (FAS) equipped wi...
The diffusion of fingerprint verification systems for security applications makes it urgent to inves...
Nowadays, the number of people that utilize either digital applications or machines is increasing ex...
This chapter provides an introduction to Presentation Attack Detection (PAD) in fingerprint biometri...
Scientific literature lacks of countermeasures specifically for fingerprint presentation attacks (PA...
The problem of interoperability is still open in fingerprint presentation attack detection (PAD) sys...
A presentation attack consists in submitting to the fingerprint capture device an artificial replica o...
Abstract: Nowadays, biometric recognition systems are widely implemented in many personal devices li...
Fingerprints have been used for decades to verify the identity of an individual for various security...
The similarities among different acquisitions of the same fingerprint have never been taken into acco...
Modern Fingerprint Presentation Attack Detection (FPAD) modules have been particularly successful in...
A fingerprint verification system is vulnerable to attacks led through the fingertip replica of an e...
Fingerprint Liveness detection, or presentation attacks detection (PAD), that is, the ability of det...
This chapter provides an introduction to Presentation Attack Detection (PAD), also coined anti-spoof...
Fingerprint recognition systems have been widely deployed in authentication and verification applica...
With the advent of the deep learning era, Fingerprint-based Authentication Systems (FAS) equipped wi...
The diffusion of fingerprint verification systems for security applications makes it urgent to inves...
Nowadays, the number of people that utilize either digital applications or machines is increasing ex...
This chapter provides an introduction to Presentation Attack Detection (PAD) in fingerprint biometri...
Scientific literature lacks of countermeasures specifically for fingerprint presentation attacks (PA...
The problem of interoperability is still open in fingerprint presentation attack detection (PAD) sys...
A presentation attack consists in submitting to the fingerprint capture device an artificial replica o...
Abstract: Nowadays, biometric recognition systems are widely implemented in many personal devices li...
Fingerprints have been used for decades to verify the identity of an individual for various security...