Evaluation of direct attacks to fingerprint verification systems
- URL: http://arxiv.org/abs/2212.07575v1
- Date: Thu, 15 Dec 2022 01:26:09 GMT
- Title: Evaluation of direct attacks to fingerprint verification systems
- Authors: J. Galbally, J. Fierrez, F. Alonso-Fernandez, M. Martinez-Diaz
- Abstract summary: We study the vulnerabilities of fingerprint-based recognition systems to direct attacks with and without the cooperation of the user.
Two different systems, one minutiae-based and one ridge feature-based, are evaluated on a database of real and fake fingerprints.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The vulnerabilities of fingerprint-based recognition systems to direct
attacks with and without the cooperation of the user are studied. Two different
systems, one minutiae-based and one ridge feature-based, are evaluated on a
database of real and fake fingerprints. Based on the fingerprint images quality
and on the results achieved on different operational scenarios, we obtain a
number of statistically significant observations regarding the robustness of
the systems.
Related papers
- A large-scale operational study of fingerprint quality and demographics [38.25423842010087]
There is still not sufficient evidence to understand the impact that certain factors such as gender, age or finger-type may have on fingerprint quality.
The present work addresses this still under researched topic, on a large-scale database of operational data containing 10-print impressions of almost 16,000 subjects.
arXiv Detail & Related papers (2024-09-30T06:30:33Z) - Combining multiple matchers for fingerprint verification: A case study
in biosecure network of excellence [53.598636960435286]
Two reference systems for fingerprint verification have been tested together with two additional non-reference systems.
The experimental results show that the best recognition strategy involves both minutiae-based and correlation-based measurements.
arXiv Detail & Related papers (2022-12-04T19:49:05Z) - A review of schemes for fingerprint image quality computation [66.32254395574994]
This paper reviews existing approaches for fingerprint image quality computation.
We also implement, test and compare a selection of them using the MCYT database including 9000 fingerprint images.
arXiv Detail & Related papers (2022-07-12T10:34:03Z) - On the Effects of Image Quality Degradation on Minutiae- and Ridge-Based
Automatic Fingerprint Recognition [61.81926091202142]
We study the performance of two fingerprint matchers based on minutiae and ridge information under varying image quality.
The ridge-based system is found to be more robust to image quality degradation than the minutiae-based system for a number of different image quality criteria.
arXiv Detail & Related papers (2022-07-12T10:28:36Z) - On the vulnerability of fingerprint verification systems to fake
fingerprint attacks [57.36125468024803]
A medium-size fake fingerprint database is described and two different fingerprint verification systems are evaluated on it.
Results for an optical and a thermal sweeping sensors are given.
arXiv Detail & Related papers (2022-07-11T12:22:52Z) - A Comparative Study of Fingerprint Image-Quality Estimation Methods [54.84936551037727]
Poor-quality images result in spurious and missing features, thus degrading the performance of the overall system.
In this work, we review existing approaches for fingerprint image-quality estimation.
We have also tested a selection of fingerprint image-quality estimation algorithms.
arXiv Detail & Related papers (2021-11-14T19:53:12Z) - Direct attacks using fake images in iris verification [59.68607707427014]
A database of fake iris images has been created from real iris of the BioSec baseline database.
We show that the system is vulnerable to direct attacks, pointing out the importance of having countermeasures.
arXiv Detail & Related papers (2021-10-30T05:01:06Z) - A Unified Model for Fingerprint Authentication and Presentation Attack
Detection [1.9703625025720706]
We reformulate the workings of a typical fingerprint recognition system.
We propose a joint model for spoof detection and matching to simultaneously perform both tasks.
This reduces the time and memory requirements of the fingerprint recognition system by 50% and 40%, respectively.
arXiv Detail & Related papers (2021-04-07T16:57:38Z) - Mobile Touchless Fingerprint Recognition: Implementation, Performance
and Usability Aspects [13.664130356074052]
This work presents an automated touchless fingerprint recognition system for smartphones.
We provide a comprehensive description of the entire recognition pipeline and discuss important requirements for a fully automated capturing system.
arXiv Detail & Related papers (2021-03-04T13:56:16Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.