119 research outputs found

    Fingerprint verification by fusion of optical and capacitive sensors

    Get PDF
    A few works have been presented so far on information fusion for fingerprint verification. None, however, have explicitly investigated the use of multi-sensor fusion, in other words, the integration of the information provided by multiple devices to capture fingerprint images. In this paper, a multi-sensor fingerprint verification system based on the fusion of optical and capacitive sensors is presented. Reported results show that such a multi-sensor system can perform better than traditional fingerprint matchers based on a single sensor. (C) 2004 Elsevier B.V. All rights reserved

    LivDet 2017 Fingerprint Liveness Detection Competition 2017

    Full text link
    Fingerprint Presentation Attack Detection (FPAD) deals with distinguishing images coming from artificial replicas of the fingerprint characteristic, made up of materials like silicone, gelatine or latex, and images coming from alive fingerprints. Images are captured by modern scanners, typically relying on solid-state or optical technologies. Since from 2009, the Fingerprint Liveness Detection Competition (LivDet) aims to assess the performance of the state-of-the-art algorithms according to a rigorous experimental protocol and, at the same time, a simple overview of the basic achievements. The competition is open to all academics research centers and all companies that work in this field. The positive, increasing trend of the participants number, which supports the success of this initiative, is confirmed even this year: 17 algorithms were submitted to the competition, with a larger involvement of companies and academies. This means that the topic is relevant for both sides, and points out that a lot of work must be done in terms of fundamental and applied research.Comment: presented at ICB 201

    Statistical meta-analysis of presentation attacks for secure multibiometric systems

    Get PDF
    Prior work has shown that multibiometric systems are vulnerable to presentation attacks, assuming that their matching score distribution is identical to that of genuine users, without fabricating any fake trait. We have recently shown that this assumption is not representative of current fingerprint and face presentation attacks, leading one to overestimate the vulnerability of multibiometric systems, and to design less effective fusion rules. In this paper, we overcome these limitations by proposing a statistical meta-model of face and fingerprint presentation attacks that characterizes a wider family of fake score distributions, including distributions of known and, potentially, unknown attacks. This allows us to perform a thorough security evaluation of multibiometric systems against presentation attacks, quantifying how their vulnerability may vary also under attacks that are different from those considered during design, through an uncertainty analysis. We empirically show that our approach can reliably predict the performance of multibiometric systems even under never-before-seen face and fingerprint presentation attacks, and that the secure fusion rules designed using our approach can exhibit an improved trade-off between the performance in the absence and in the presence of attack. We finally argue that our method can be extended to other biometrics besides faces and fingerprints

    LivDet in Action - Fingerprint Liveness Detection Competition 2019

    Full text link
    The International Fingerprint liveness Detection Competition (LivDet) is an open and well-acknowledged meeting point of academies and private companies that deal with the problem of distinguishing images coming from reproductions of fingerprints made of artificial materials and images relative to real fingerprints. In this edition of LivDet we invited the competitors to propose integrated algorithms with matching systems. The goal was to investigate at which extent this integration impact on the whole performance. Twelve algorithms were submitted to the competition, eight of which worked on integrated systems.Comment: Preprint version of a paper accepted at ICB 201

    Preliminary Results on a "Real" Iris Recognition System under Challenging Operational Conditions

    Get PDF
    Iris recognition algorithms have recently demonstrated excellent performance in the authentication task. In this paper, we present a technology transfer project for the development and testing of a biometric recognition system under challenging operational conditions. Due to the stringent operational requirements, the design and implementation of the system included a phase of selecting technologically advanced hardware. The lack of corresponding data sets implied a novel acquisition step. The evaluation phase is preliminary as the data set is being expanded for the acquisition of new samples capable of highlighting the system’s critical issues. Current samples were acquired in very different lighting conditions and in the presence of glasses, which was not yet done in the literature. In addition to the selected hardware, such data allowed us to simulate a realistic environmental context for the project’s final prototype

    On the interoperability of capture devices in fingerprint presentation attacks detection

    Get PDF
    Abstract A presentation attack consists in submitting to the fingerprint capture device an artificial replica of the finger of the targeted client. If the sensor is not equipped with an appropriate algorithm aimed to detect the fingerprint spoof, the system processes the obtained image as a one belonging to a real fingerprint. In order to face this problem, several presentation attacks detection (PAD) algorithms have been proposed so far. Current methods heavily rely on features extracted from a large data set of fake and real fingerprint images, and an appropriate classifier trained with such data to distinguish between live (real) and fake (spoof) fingerprint images. Building such data set requires a significant effort for fabricating samples of fake fingerprints, with the most effective materials used to circumvent the sensor. Interesting and promising results have been obtained, but they also suggest that the PAD is tailored on the particular sensor. Small and significant differences also occur when a novel version of the same sensor is released, and this may affect the PAD. Therefore, making a PAD interoperable is among the main current issues when considering fingerprints as the first level of protection and security of logical or physical resources. This paper is a first attempt to assess at which extent the sensor interoperability can be an issue for fingerprint PADs and to eventually propose a solution to this limitation. In particular, textural features will be under focus and a feature space transformation method based on the least square is proposed

    3D Face Reconstruction: the Road to Forensics

    Get PDF
    3D face reconstruction algorithms from images and videos are applied to many fields, from plastic surgery to the entertainment sector, thanks to their advantageous features. However, when looking at forensic applications, 3D face reconstruction must observe strict requirements that still make its possible role in bringing evidence to a lawsuit unclear. An extensive investigation of the constraints, potential, and limits of its application in forensics is still missing. Shedding some light on this matter is the goal of the present survey, which starts by clarifying the relation between forensic applications and biometrics, with a focus on face recognition. Therefore, it provides an analysis of the achievements of 3D face reconstruction algorithms from surveillance videos and mugshot images and discusses the current obstacles that separate 3D face reconstruction from an active role in forensic applications. Finally, it examines the underlying data sets, with their advantages and limitations, while proposing alternatives that could substitute or complement them

    3D Face Reconstruction: the Road to Forensics

    Full text link
    3D face reconstruction algorithms from images and videos are applied to many fields, from plastic surgery to the entertainment sector, thanks to their advantageous features. However, when looking at forensic applications, 3D face reconstruction must observe strict requirements that still make its possible role in bringing evidence to a lawsuit unclear. An extensive investigation of the constraints, potential, and limits of its application in forensics is still missing. Shedding some light on this matter is the goal of the present survey, which starts by clarifying the relation between forensic applications and biometrics, with a focus on face recognition. Therefore, it provides an analysis of the achievements of 3D face reconstruction algorithms from surveillance videos and mugshot images and discusses the current obstacles that separate 3D face reconstruction from an active role in forensic applications. Finally, it examines the underlying data sets, with their advantages and limitations, while proposing alternatives that could substitute or complement them.Comment: The manuscript has been accepted for publication in ACM Computing Surveys. arXiv admin note: text overlap with arXiv:2303.1116
    • …
    corecore