Fingerprint Orientation Estimation: Challenges and Opportunities
- URL: http://arxiv.org/abs/2010.11563v1
- Date: Thu, 22 Oct 2020 09:41:18 GMT
- Title: Fingerprint Orientation Estimation: Challenges and Opportunities
- Authors: Amit Kumar Trivedi
- Abstract summary: A person has a limited number of fingerprints and it remains unchanged throughout his lifetime, once leaked to the adversary, it leaks for a lifetime.
This survey provides a comprehensive study of template protection techniques for fingerprint biometric systems.
- Score: 2.28438857884398
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: There is an exponential increase in portable electronic devices with
biometric security mechanisms, in particular fingerprint biometric. A person
has a limited number of fingerprints and it remains unchanged throughout his
lifetime, once leaked to the adversary, it leaks for a lifetime. So, there is a
need to secure the biometric template itself. In this survey paper, we review
the different security models and fingerprint template protection techniques.
The research challenges in different fingerprint template protection techniques
are also highlighted in respective sections of the paper. This survey provides
a comprehensive study of template protection techniques for fingerprint
biometric systems and highlights the challenges and future opportunities.
Related papers
- Fingerprinting and Tracing Shadows: The Development and Impact of Browser Fingerprinting on Digital Privacy [55.2480439325792]
Browser fingerprinting is a growing technique for identifying and tracking users online without traditional methods like cookies.
This paper gives an overview by examining the various fingerprinting techniques and analyzes the entropy and uniqueness of the collected data.
arXiv Detail & Related papers (2024-11-18T20:32:31Z) - Fingerprint Liveness Detection using Minutiae-Independent Dense Sampling
of Local Patches [0.0]
Fingerprint recognition and matching is a common form of user authentication.
Spoof detection and liveness detection algorithms are being researched as countermeasures to this security vulnerability.
This paper introduces a fingerprint anti-spoofing mechanism using machine learning.
arXiv Detail & Related papers (2023-04-11T16:11:44Z) - Deep Learning in the Field of Biometric Template Protection: An Overview [18.016337076888924]
Deep learning has revolutionised the field of pattern recognition, including biometric recognition.
The interrelation between improved biometric performance rates and security in biometric template protection is elaborated.
The use of deep learning for obtaining feature representations that are suitable for biometric template protection is discussed.
arXiv Detail & Related papers (2023-03-05T17:06:40Z) - Secure and Privacy Preserving Proxy Biometrics Identities [25.272389610447856]
This work proposes a novel approach for generating new artificial fingerprints also called proxy fingerprints.
These proxy biometrics can be generated from original ones only with the help of a user-specific key.
Using the proposed approach a proxy dataset is generated from samples belonging to Anguli fingerprint database.
Matching experiments were performed on the new set which is 5 times larger than the original, and it was found that their performance is at par with 0 FAR and 0 FRR in the stolen key, safe key scenarios.
arXiv Detail & Related papers (2022-12-21T07:02:11Z) - Face Presentation Attack Detection [59.05779913403134]
Face recognition technology has been widely used in daily interactive applications such as checking-in and mobile payment.
However, its vulnerability to presentation attacks (PAs) limits its reliable use in ultra-secure applicational scenarios.
arXiv Detail & Related papers (2022-12-07T14:51:17Z) - Hierarchical Perceptual Noise Injection for Social Media Fingerprint
Privacy Protection [106.5308793283895]
fingerprint leakage from social media raises a strong desire for anonymizing shared images.
To guard the fingerprint leakage, adversarial attack emerges as a solution by adding imperceptible perturbations on images.
We propose FingerSafe, a hierarchical perceptual protective noise injection framework to address the mentioned problems.
arXiv Detail & Related papers (2022-08-23T02:20:46Z) - On the vulnerability of fingerprint verification systems to fake
fingerprint attacks [57.36125468024803]
A medium-size fake fingerprint database is described and two different fingerprint verification systems are evaluated on it.
Results for an optical and a thermal sweeping sensors are given.
arXiv Detail & Related papers (2022-07-11T12:22:52Z) - OTB-morph: One-Time Biometrics via Morphing applied to Face Templates [8.623680649444212]
This paper introduces a new scheme for cancelable biometrics aimed at protecting the templates against potential attacks.
An experimental implementation of the proposed scheme is given for face biometrics.
arXiv Detail & Related papers (2021-11-25T18:35:34Z) - Responsible Disclosure of Generative Models Using Scalable
Fingerprinting [70.81987741132451]
Deep generative models have achieved a qualitatively new level of performance.
There are concerns on how this technology can be misused to spoof sensors, generate deep fakes, and enable misinformation at scale.
Our work enables a responsible disclosure of such state-of-the-art generative models, that allows researchers and companies to fingerprint their models.
arXiv Detail & Related papers (2020-12-16T03:51:54Z) - Artificial Fingerprinting for Generative Models: Rooting Deepfake
Attribution in Training Data [64.65952078807086]
Photorealistic image generation has reached a new level of quality due to the breakthroughs of generative adversarial networks (GANs)
Yet, the dark side of such deepfakes, the malicious use of generated media, raises concerns about visual misinformation.
We seek a proactive and sustainable solution on deepfake detection by introducing artificial fingerprints into the models.
arXiv Detail & Related papers (2020-07-16T16:49:55Z) - An Overview of Fingerprint-Based Authentication: Liveness Detection and
Beyond [0.0]
We focus on methods to detect physical liveness, defined as techniques that can be used to ensure that a living human user is attempting to authenticate on a system.
We analyze how effective these methods are at preventing attacks where a malicious entity tries to trick a fingerprint-based authentication system to accept a fake finger as a real one.
arXiv Detail & Related papers (2020-01-24T20:07:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.