258 research outputs found

    A Study on Automatic Latent Fingerprint Identification System

    Get PDF
    Latent fingerprints are the unintentional impressions found at the crime scenes and are considered crucial evidence in criminal identification. Law enforcement and forensic agencies have been using latent fingerprints as testimony in courts. However, since the latent fingerprints are accidentally leftover on different surfaces, the lifted prints look inferior. Therefore, a tremendous amount of research is being carried out in automatic latent fingerprint identification to improve the overall fingerprint recognition performance. As a result, there is an ever-growing demand to develop reliable and robust systems. In this regard, we present a comprehensive literature review of the existing methods utilized in latent fingerprint acquisition, segmentation, quality assessment, enhancement, feature extraction, and matching steps. Later, we provide insight into different benchmark latent datasets available to perform research in this area. Our study highlights various research challenges and gaps by performing detailed analysis on the existing state-of-the-art segmentation, enhancement, extraction, and matching approaches to strengthen the research

    Interpol review of fingermarks and other body impressions 2016–2019

    Get PDF
    This review paper covers the forensic-relevant literature in fingerprint and bodily impression sciences from 2016 to 2019 as a part of the 19th Interpol International Forensic Science Managers Symposium. The review papers are also available at the Interpol website at: https://www.interpol.int/content/download/ 14458/file/Interpol%20 Review%20 Papers%202019. pdf

    Fusion of fingerprint presentation attacks detection and matching: a real approach from the LivDet perspective

    Get PDF
    The liveness detection ability is explicitly required for current personal verification systems in many security applications. As a matter of fact, the project of any biometric verification system cannot ignore the vulnerability to spoofing or presentation attacks (PAs), which must be addressed by effective countermeasures from the beginning of the design process. However, despite significant improvements, especially by adopting deep learning approaches to fingerprint Presentation Attack Detectors (PADs), current research did not state much about their effectiveness when embedded in fingerprint verification systems. We believe that the lack of works is explained by the lack of instruments to investigate the problem, that is, modelling the cause-effect relationships when two systems (spoof detection and matching) with non-zero error rates are integrated. To solve this lack of investigations in the literature, we present in this PhD thesis a novel performance simulation model based on the probabilistic relationships between the Receiver Operating Characteristics (ROC) of the two systems when implemented sequentially. As a matter of fact, this is the most straightforward, flexible, and widespread approach. We carry out simulations on the PAD algorithms’ ROCs submitted to the editions of LivDet 2017-2019, the NIST Bozorth3, and the top-level VeriFinger 12.0 matchers. With the help of this simulator, the overall system performance can be predicted before actual implementation, thus simplifying the process of setting the best trade-off among error rates. In the second part of this thesis, we exploit this model to define a practical evaluation criterion to assess whether operational points of the PAD exist that do not alter the expected or previous performance given by the verification system alone. Experimental simulations coupled with the theoretical expectations confirm that this trade-off allows a complete view of the sequential embedding potentials worthy of being extended to other integration approaches

    Taming Self-Supervised Learning for Presentation Attack Detection: De-Folding and De-Mixing

    Full text link
    Biometric systems are vulnerable to Presentation Attacks (PA) performed using various Presentation Attack Instruments (PAIs). Even though there are numerous Presentation Attack Detection (PAD) techniques based on both deep learning and hand-crafted features, the generalization of PAD for unknown PAI is still a challenging problem. In this work, we empirically prove that the initialization of the PAD model is a crucial factor for the generalization, which is rarely discussed in the community. Based on such observation, we proposed a self-supervised learning-based method, denoted as DF-DM. Specifically, DF-DM is based on a global-local view coupled with De-Folding and De-Mixing to derive the task-specific representation for PAD. During De-Folding, the proposed technique will learn region-specific features to represent samples in a local pattern by explicitly minimizing generative loss. While De-Mixing drives detectors to obtain the instance-specific features with global information for more comprehensive representation by minimizing interpolation-based consistency. Extensive experimental results show that the proposed method can achieve significant improvements in terms of both face and fingerprint PAD in more complicated and hybrid datasets when compared with state-of-the-art methods. When training in CASIA-FASD and Idiap Replay-Attack, the proposed method can achieve an 18.60% Equal Error Rate (EER) in OULU-NPU and MSU-MFSD, exceeding baseline performance by 9.54%. The source code of the proposed technique is available at https://github.com/kongzhecn/dfdm.Comment: Accepted by IEEE Transactions on Neural Networks and Learning Systems (TNNLS

    The human mediodorsal thalamus: Organization, connectivity, and function

    Get PDF
    The human mediodorsal thalamic nucleus (MD) is crucial for higher cognitive functions, while the fine anatomical organization of the MD and the function of each subregion remain elusive. In this study, using high-resolution data provided by the Human Connectome Project, an anatomical connectivity-based method was adopted to unveil the topographic organization of the MD. Four fine-grained subregions were identified in each hemisphere, including the medial (MDm), central (MDc), dorsal (MDd), and lateral (MDl), which recapitulated previous cytoarchitectonic boundaries from histological studies. The subsequent connectivity analysis of the subregions also demonstrated distinct anatomical and functional connectivity patterns, especially with the prefrontal cortex. To further evaluate the function of MD subregions, partial least squares analysis was performed to examine the relationship between different prefrontal-subregion connectivity and behavioral measures in 1012 subjects. The results showed subregion-specific involvement in a range of cognitive functions. Specifically, the MDm predominantly subserved emotional-cognition domains, while the MDl was involved in multiple cognitive functions especially cognitive flexibility and inhibition. The MDc and MDd were correlated with fluid intelligence, processing speed, and emotional cognition. In conclusion, our work provides new insights into the anatomical and functional organization of the MD and highlights the various roles of the prefrontal-thalamic circuitry in human cognition
    corecore