




Did you find this useful? Give us your feedback
33 citations
17 citations
8 citations
7 citations
5 citations
11,674 citations
5,563 citations
2,212 citations
1,899 citations
1,709 citations
...The second attack category takes place within the digital processes of the system’s interior parts, to be specific, seven points of digital attacks in the general biometric system are exposed in [2]....
[...]
the proposed algorithm utilizes image statistics, thus, it does not require high computational cost and can be processed in real time.
DATA BASEIn order to validate the proposed mechanism, the first scenario, i.e. ordinary dynamic presentations, from Chapter 3 is used.
Non-cooperative attacks are often rather sophisticated because of the need for special expertise and adequate hardware/software tools, moreover, the targeted biometric modality plays an important role to determine the ease of the process.
On the other hand, non-subversive intents are still considered as suspicious presentations, while users are behaving24normally by wearing commercial products for cosmetic purposes, facing accidents which cause problems in engaging with a system, or need more knowledge about the use of these systems.
The same portion was used in the experiment of Chapter 4.VOLUME SEGMENTATIONTo neglect the influence of empty background on the extracted features, the authors apply 3-D segmentation to the dataset so that the features are extracted only from the part of the sensor’s surface where the presentation was applied.
Face recognition security occupies high attention since it has been deployed in many areas such as passport check and video surveillance.
even though the different PAI species have demonstrated different behaviors, other factors such as attacking tools and attacker’s level of81expertise must be taken into account to completely characterize the interaction over the sensor’s surface.
In order to compare the presented algorithm with that proposed in Chapter 4, the authors apply cross-validation data partitioning to the pressure dataset then the authors train an SVM model in the same fashion presented in Chapter 4; results are shown in Figure 6.9.