Buscar
Mostrando ítems 1-10 de 15
ON THE IMPORTANCE OF USING HIGH RESOLUTION IMAGES, THIRD LEVEL FEATURES AND SEQUENCE OF IMAGES FOR FINGERPRINT SPOOF DETECTION
(Ieee, 2015-01-01)
The successful and widespread deployment of biometric systems brings on a new challenge: the spoofing, which involves presenting an artificial or fake biometric trait to the biometric systems so that unauthorized users can ...
On the importance of using high resolution images, third level features and sequence of images for fingerprint spoof detection
(2015-01-01)
The successful and widespread deployment of biometric systems brings on a new challenge: the spoofing, which involves presenting an artificial or fake biometric trait to the biometric systems so that unauthorized users can ...
On the Learning of Deep Local Features for Robust Face Spoofing Detection
(2019-01-15)
Biometrics emerged as a robust solution for security systems. However, given the dissemination of biometric applications, criminals are developing techniques to circumvent them by simulating physical or behavioral traits ...
A New Multi-filter Framework with Statistical Dense SIFT Descriptor for Spoofing Detection in Fingerprint Authentication Systems
(2021-01-01)
Fingerprint-based authentication systems represent what is most common in biometric authentication systems. Today’s simplest tasks, such as unlocking functions on a personal cell phone, may require its owner’s fingerprint. ...
Efficient transfer learning for robust face spoofing detection
(2018-01-01)
Biometric systems are synonym of security. However, nowadays, criminals are violating them by presenting forged traits, such as facial photographs, to fool their capture sensors (spoofing attacks). In order to detect such ...
Efficient width-extended convolutional neural network for robust face spoofing detection
(2018-12-13)
Biometrics has been increasingly used as a safe and convenient technique for people identification. Despite the higher security of biometric systems, criminals have already developed methods to circumvent them, being the ...
Deep Boltzmann Machines for Robust Fingerprint Spoofing Attack Detection
(Ieee, 2017-01-01)
Biometric systems present some important advantages over the traditional knowledge- or possess-oriented identification systems, such as a guarantee of authenticity and convenience. However, due to their widespread usage ...
Deep Boltzmann machines for robust fingerprint spoofing attack detection
(2017-06-30)
Biometrie systems present some important advantages over the traditional knowledge-or possess-oriented identification systems, such as a guarantee of authenticity and convenience. However, due to their widespread usage in ...
Knowledge-Based Wavelet Filters Prominently Detect Spoofed Speech
(2021-01-01)
Although voice biometrics has been at the forefront of speech technologies, spoofing attacks have been one of the main issues responsible for avoiding its practical usage in commercial applications. Consequently, this ...
A restricted boltzmann machine-based approach for robust dimensionality reduction
(2018-01-31)
Data dimensionality is an important issue to be adressed by pattern recognition systems. Despite of storage and processing, working with high-dimensional feature vectors also requires complex optimization methods. A proper ...