scispace - formally typeset
Proceedings ArticleDOI

Fingerphoto spoofing in mobile devices: A preliminary study

TLDR
This research is aimed at understanding the effect of spoofing on fingerphoto spoofing, and creating a large spoofed fingerphoto database and making it publicly available for research.
Abstract
Biometric-based authentication for smart handheld devices promises to provide a reliable and alternate security mechanism compared to traditional methods such as pins, patterns, and passwords. Although fingerprints are a viable source for authentication, they generally require installation of an additional hardware such as optical and swipe sensors on mobile devices, and are only available in expensive, high-end smartphones. Alternatively, fingerphoto images captured using the smartphone camera for authentication is one of the promising biometric approaches. However, using fingerphotos for authentication brings along a major challenge of fingerphoto spoofing. This research is aimed at understanding the effect of spoofing on fingerphotos. There are three major contributions of this research: (i) create a large spoofed fingerphoto database and make it publicly available for research, (ii) to establish the effect of print attack and photo attack in fingerphoto spoofing, and (iii) understand the performance of existing spoofing detection algorithms on fingerphoto spoofing.

read more

Citations
More filters
Book ChapterDOI

Advances in Fingerprint Technology

TL;DR: This chapter focuses on how fingerprint technology can be used to improve speed and accuracy of certain processes, i.e. exams as the society accepts this as part of everyday life as well as in an educational setting where youngsters are much used to digital technologies.
Journal ArticleDOI

An overview of touchless 2D fingerprint recognition

TL;DR: In this article, the state-of-the-art in the field of touchless 2D fingerprint recognition at each stage of the recognition process is summarized and technical considerations and trade-offs of the presented methods along with open issues and challenges.
Journal ArticleDOI

On Matching Finger-Selfies Using Deep Scattering Networks

TL;DR: An algorithm which comprises segmentation, enhancement, Deep Scattering Network based feature extraction, and Random Decision Forest to authenticate finger-selfies is proposed and results and comparison with existing algorithms show the efficacy of the proposed algorithm.
Posted Content

Matching Fingerphotos to Slap Fingerprint Images.

TL;DR: The results show that fingerphotos are promising to authenticate individuals (against a national ID database) for banking, welfare distribution, and healthcare applications in developing countries.
Book ChapterDOI

A scheme for fingerphoto recognition in smartphones

TL;DR: This chapter presents a comprehensive literature review of selfie fingerprint biometrics and touchless fingerprint recognition methods, and describes the technological aspects of the different steps of the recognition process.
References
More filters
Proceedings ArticleDOI

Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera

TL;DR: A real-time liveness detection approach against photograph spoofing in face recognition, by recognizing spontaneous eyeblinks, which is a non-intrusive manner, which outperforms the cascaded Adaboost and HMM in task of eyeblink detection.
Proceedings ArticleDOI

Rotation, Scaling and Deformation Invariant Scattering for Texture Discrimination

TL;DR: An affine invariant representation is constructed with a cascade of invariants, which preserves information for classification and state-of-the-art classification results are obtained over texture databases with uncontrolled viewing conditions.
Proceedings ArticleDOI

Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect

TL;DR: The 3D Mask Attack Database (3DMAD), the first publicly available 3D spoofing database, recorded with a low-cost depth camera is introduced and it is shown that easily attainable facial masks can pose a serious threat to 2D face recognition systems and LBP is a powerful weapon to eliminate it.
Proceedings ArticleDOI

Live face video vs. spoof face video: Use of moiré patterns to detect replay video attacks

TL;DR: This work addresses the problem of facial spoofing detection against replay attacks based on the analysis of aliasing in spoof face videos and shows that the proposed approach is very effective in face spoof detection for both cross-database, and intra-database testing scenarios.
Proceedings Article

Locally Uniform Comparison Image Descriptor

TL;DR: Locally Uniform Comparison Image Descriptor (LUCID), a simple description method based on linear time permutation distances between the ordering of RGB values of two image patches, which is computable in linear time with respect to the number of pixels and does not require floating point computation.
Related Papers (5)